• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 533
  • 89
  • 70
  • 53
  • 27
  • 25
  • 18
  • 10
  • 9
  • 8
  • 7
  • 7
  • 7
  • 5
  • 3
  • Tagged with
  • 1064
  • 391
  • 315
  • 308
  • 232
  • 195
  • 184
  • 179
  • 132
  • 120
  • 114
  • 111
  • 108
  • 88
  • 86
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

On the Security of Distributed Power System State Estimation under Targeted Attacks

Vuković, Ognjen, Dán, György January 2013 (has links)
State estimation plays an essential role in the monitoring and control of power transmission systems. In modern, highly inter-connected power systems the state estimation should be performed in a distributed fashion and requires information exchange between the control centers of directly connected systems. Motivated by recent reportson trojans targeting industrial control systems, in this paper we investigate how a single compromised control center can affect the outcome of distributed state estimation. We describe five attack strategies, and evaluate their impact on the IEEE 118 benchmark power system. We show that that even if the state estimation converges despite the attack, the estimate can have up to 30% of error, and bad data detection cannot locate theattack. We also show that if powerful enough, the attack can impede the convergence of the state estimation, and thus it can blind the system operators. Our results show that it is important to provide confidentiality for the measurement data in order to prevent the most powerful attacks. Finally, we discuss a possible way to detect and to mitigate these attacks. / <p>QC 20130522</p>
62

The Application of Integrated Marketing Communication to the Cyber University

Jen, Liu-Kang 26 June 2003 (has links)
The cyber university has become a new trend in personal learning systems. At present, many universities in Taiwan have set up cyber universities that provide lots of online courses for more students or working people. What are the main goals when the cyber university promotes it¡¦s products¡H What kinds of the marketing mix strategy it uses to achieve the goals¡H And how does the cyber university make use of IMC tools to promote it¡¦s products¡H The case study method has been utilized in this research. The objectives including National Sun Yat-Sen Cyber University of National Sun Yat-sen University (NSYU)¡BNational Taiwan University¡BE-college of National Chengchi University¡BNational Tsing Hua University and Go2school of Chinese Culture University are studied to realize the product position¡Btarget audience¡Bthe relation between marketing mix and marketing goals, and the successful or obstructive factors etc. This research has the following findings¡G 1. The every part of the application of IMC in the cyber university forms a cycle. Although the products of the cyber university have no local limitation, they also have the differences in marketing strategy in different areas. 2. Because the cyber university is still on the stage of development, the business model is not completely established. At present, making profit is not the only goal in marketing, and building brand visibility is the most important for all cyber universities. 3. In the initial stage, the cyber university applies many marketing tools¡]advertising¡Bpublic relations etc.¡^to promote it¡¦s products, and then keeps on regulating to a perfect marketing mix strategy. Besides, internet marketing¡]through e-mail sending¡^is the most effective way and can be used with the database to interact with customers or convey personalized information. 4. No matter in the beginning or for the final achievement, the application of IMC tools in the cyber university must take customers into the main consideration. That means IMC not only makes profits for business corporation but also accumulates invisible brand image in customer¡¦s mind as well as establishes a long relationship with every customer. At last, my research has the following contributions¡G 1. Setting up an IMC model of the cyber university. 2. With the study of cases, we know how cyber universities make use of IMC to promote it¡¦s products and provide a reference for new investors to market their products.
63

Exploring factors affecting social presence in a synchronous cyber classroom

Jui, Mao 06 August 2008 (has links)
As a result of personal computers and broadband Internet connections become very popular, online learning converts asynchronous learning into synchronous learning or blended learning. This implies that synchronous communication becomes an essential part of online learning and learners now are able to see others face-to-face online just like in traditional classrooms. In the past, the major difference between cyber classroom and traditional classroom is that cyber classroom cannot provide face to face interaction. However, a synchronous cyber classroom features real-time and multiple video communication channels can overcome this shortage and even promoted better attention and engagement for learners. Social presence is an indicator to measure the degree of social interaction, determined by the perception of an individual to environments and other individuals. The prior researches have indicated that increasing social presence is helpful to enhancing learning participation and satisfaction in a synchronous cyber classroom. Hence, we argue that promoting social presence in a synchronous cyber classroom would have a positive effect on learners¡¦ learning participation and satisfaction. The aim of this study is to explore the factors affecting social presence in a synchronous cyber classroom. We will apply social learning theory as a basis to verify if social presence does have a positive effect on learning outcome and what factors affect social presence in a synchronous cyber classroom learning environment. Because the perception about social presence is accumulated as time goes by, a questionnaire survey is used in this study. The target population is drawn upon the learners who have had real experiences of participations in learning with synchronous cyber classrooms. The questionnaires were carried out on the Web. The subjects were learners from the National Sun Yan-Sen Cyber University, the K12 digital school and some others from the PTT BBS. The total number of valid questionnaires is 252. The research result indicates that the factors affecting social presence in a synchronous cyber classroom are intimacy, user friendliness, responsiveness, extraversion, and cue richness. Moreover, social presence does have a positive effect on learning participation and satisfaction. The contribution of this study is finding out the factors affecting social presence from the social learning theory perspective. If teachers could pay attention to these factors and try to apply them for enhancing learners¡¦ social presence, learners¡¦ learning outcome is greatly improved in a synchronous cyber classroom environment. This study is concluded by pointing out some suggestions for practice and future research.
64

the study of the measure of the cyber university service quality-the case of NSYSU

Liao, Tung-hua 26 August 2009 (has links)
With the increasing popularization and progress of the Internet in recent years, people have become more and more accustomed to obtain knowledge through e-leaning. By using e-learning, lecturers and students can have classes not only in a physical classroom but also in a virtual classroom on the Internet. Moreover, due to the Internet is virtual and unlimited by region, making use of the two characteristics can make both sides of teachers and students have more channels and conveniences for their interaction. Among them, the formation of the Cyber University is the model for the mutual application of learning in a physical classroom and on the Internet. Based on the most part of the recent studies have been focused on the measures of the service quality of the whole e-learning system, and a considerable number of literatures have offered measuring methods; however, the specialized measures of the service quality of the Cyber University have been in shortage. Therefore, the study was in the hope of finding out what factors had an influence on the service quality of the Cyber university, and what characteristics of the Cyber University students cared about when they were using it. The study aimed to develop specialized indicators for measuring the service quality of the Cyber university by applying the past structure of e-learning.The study adopted the questionnaire survey method, and the main participants were those students at National Sun Yat-Sen University (NSYSU) who had ever used National Sun Yat -Sen Cyber University. Furthermore, the study used the measuring research of the e-learning system satisfaction which designed by Sun et al. (2008) as the main structure. And to probe the measuring indicators of the service quality of the Cyber Universi t y, the study was divided into six different aspects from areas such as learner, lecturer, curriculum, science and technology,design, and environment.The results showed that the Learner¡¦s perceptive satisfaction with the service quality of the Cyber University was affected by those following factors: the learner¡¦s attitude toward the Cyber University; the learner¡¦s anxiety; the curriculum flexibility of the Cyber University; the usability of the Cyber University; and the level of the learner¡¦s interaction with the lecturer or other students at Cyber University.Thus, the results of this study can be used as the thinking directions for the designers of a Cyber University platform, and also can be used as a reference to enhance the teaching quality and tudents¡¦ satisfaction for the Cyber University lecturers.
65

Nätmobbning - vem bär ansvaret? : En kvalitativ studie om lärares syn på ansvarsfördelningen mellan föräldrar och lärare vid förekomsten av nätmobbning

Southern, Sophie January 2013 (has links)
The phenomena of cyber bullying is relatively new, but it is now more prevalent than ever as children today have access to the internet on a daily basis, in school as well as at home. Although cyber bullying is an increasing problem in today’s society, there seem to be few guidelines for teachers to follow when using the internet with their students in school. The purpose of this study is to investigate who, according to six teachers, has the responsibilities revolving cyber bullying – teachers or parents. There has not been very much research done revolving the issue. The questions that are going to be raised in this study are who the six interviewed teachers think is responsible for taking actions revolving cyber bullying, if there are any guidelines about how to work with the problem, if teachers and parent work together to prevent and act against cyber bullying and what kind of education teachers and parents get to increase their awareness about bullying and cyber bullying. This study is built on interviews with six teachers from three different schools. Two of the schools work with a bullying program that is based on Olweus methods against bullying. The third school has a collaboration with the organisation Friends. This study has its theoretical outcome in Olweus’ methods against bullying in general and Campbell’s definition of what cyber bullying means. Regarding responsibility this study is built on the definition of two different kinds of responsibilities, the moral kind and the legal kind. The conclusions of this study are that the responsibility is not something you can put on either the parents or the teachers, it is a shared responsibility between both parts since the children have access to the internet almost anywhere. There is also a need of guidelines regarding how to act in a case of cyber bullying as there are no known guidelines to turn to today. Some schools seem to have a collaboration between parents and teachers to prevent and act against cyber bullying, where other schools do not. The same schools that have that collaboration also seem to educate both teachers and parents about cyber bullying.
66

Traditionell strategi : Mot bokhyllan eller cyberrymden?

Lindfors, Jonny January 2014 (has links)
Den traditionella strategiska skolan består av en uppdelning mellan civilt och militärt. Begreppspar som offensiv/ defensiv, avskräckning/ påtvingande, direkt eller indirekt strategi i kombination med miljö och geografi är viktiga utgångspunkter. Men går det teoretiska ramverk som till stor del här-stammar från von Clausewitz att tillämpa på cyberrymden? En miljö som präglas av att den för-ändras så fort någon ansluter en ny dator, till stor del saknar geografiska gränser och där skillnaden mellan militärt och civilt suddats ut. Detta prövas genom att analysera begreppens tillämpning på Estlands, Finlands, Norges och EU:s cybersäkerhetsstrategier. Syftet med denna uppsats är att pröva hur väl den traditionella strategiska skolan erbjuder analys-verktyg för strategier inom cyberrymden, samt att studera hur olika aktörer hanteras och samord-nas. Vidare syftar uppsatsen till att försöka utröna hur närliggande nationer och viktiga samarbets-organisationers strategier kan ge vägledning vid utformning av en svensk cyberhetssäkerhetsstra-tegi. Detta gäller avseende såväl teoriutveckling avseende strategi samt formuleringen av mål, me-del och metoder. Resultatet visar att teorierna fortsatt är tillämpbara, även om en viss förskjutning av begreppens innebörd förekommer. Samtliga av de studerade strategierna är defensiva till sin karaktär och kan anses utgöra exempel på indirekta strategier. Finland och EU:s strategier är mer tydligt hållna än Estlands och Norges och bör kunna ge god vägledning vid utformningen av en svensk cybersäker-hetsstrategi.
67

Weaponized malware, physical damage, zero casualties – what informal norms are emerging in targeted state sponsored cyber-attacks? : The dynamics beyond causation: an interpretivist-constructivist analysis of the US media discourse regarding offensive cyber operations and cyber weapons between 2010 and 2020

Sallinen, Margarita January 2021 (has links)
In 2010, the discovery of the malicious computer worm Stuxnet shocked the world by its sophistication and unpredictability. Stuxnet was deemed as the world’s first cyber weapon and started discussions concerning offensive cyber operations – often called “cyber warfare” – globally. Due to Stuxnet, rapid digitalisation and evolving technology, it became vital for decision makers in the US to consider formal norms such as laws, agreements, and policy decisions regarding cyber security. Yet, to obtain a holistic understanding of cyber security, this thesis uses constructivism as its theoretical framework to understand changing informal norms and social factors including the ideas and morals of the US society regarding offensive cyber operations. This thesis critically analyses the discourse of three of the largest US newspapers by circulation: the New York Times, the Washington Post and The Wall Street Journal. A significant shift was discovered in the US media’s publications and in informal norms regarding offensive cyber operations and the use of cyber weapons in just one decade, by comparing the discourses relating to Stuxnet in 2010 and the US presidential election in 2020. This thesis concludes that it is equally important to consider ideas and morals when researching a technical field such as cyber security by arguing that informal norms guide the choices actors make when developing formal norms at the international level. The findings of this thesis are intended to provoke a normative, urgent, and focused discussion about cyber security. The findings are also intended to shift attention to how language is used in discussions about the cyber sphere, offensive cyber operations and cyber weapons as components of the traditional battlefield.
68

National Resilience in Cyberspace: an analysis of the evolution of the United Kingdom's National Cyber Security Strategy and its response to dynamic cyber security challenges / National Resilience in CyberSpace: The UK's National Cyber Security Strategy Evolving Response to Dynamic Cyber Security Challenges

Johnson, Kailyn January 2018 (has links)
Criminals and other threat actors are adapting to the growing reliance individuals, organisations, and nations have upon technology and the internet and have augmented their capabilities to be oriented in that direction for malevolent purposes. Cyberspace has become an extremely large vulnerability for countries because it facilitates any person with access to a computer or other technology along with malicious intent, to cause harm. The increased risk people and organisations now face in cyberspace is not isolated to just them. Nations now are also at an increased risk because of the evolving ubiquity of cyberspace and technology. States are at risk of cyber threats because of vulnerabilities in individual citizens and organisations. Nations have now become intended targets by a larger spectrum of threat actors. This research examines how the United Kingdom has developed their specific national cyber security strategy to improve national resilience to threats, and how well the UK government adapts to an ever- changing threat landscape. The UK is still deficient in the appropriate and thorough execution of their proposed strategies and strategic policies to attain national resilience and security. There have been strides to achieve that goal, but the national strategy continues to fail to...
69

Hybridní válka v kybernetickém prostředí:Případová studie hybridních hrozeb v kyberentickém prostoru / Hybrid Warfare in Cyber domain: Case Study of hybrid threats in cyberspace

Tsiklauri, Giorgi January 2021 (has links)
Cyberspace has penetrated every facet of society's life and the nation's security. It entangled the whole world together, providing exceptional opportunities and threats. One of these threats is a new kind of warfare known as Hybrid warfare; Its nature is to deploy all unconventional means to achieve objectives given by its user. Additionally, means used in cyberspace and capabilities it offers have a complementary effect on Hybrid warfare strategies creating a positive feedback loop. Targets of this new type of warfare are usually Western democracies or nations affiliated with them. The western open approach to cyberspace proved to be readily exploitable by malicious actors. These actors are nations such as Russia or China. However, private entities or individuals have, too, proved to be capable of employing Hybrid tactics. These tactics employed are cyberattacks, data gathering and exploitation, and disinformation. There is a case period for each of them: Cyberattacks during 2007 Estonia, Data gathering and exploitation, the Chinese model and its dissemination, and disinformation throughout the recent COVID-19 pandemic. Each case will attempt to examine the effects of Cyberspace on Hybrid warfare; Which proved to be a complementary effect, cyberspace amplifying Hybrid warfare and providing it...
70

Design and Analysis of Intrusion Detection Protocols in Cyber Physical Systems

Mitchel, Robert Raymondl III 23 April 2013 (has links)
In this dissertation research we aim to design and validate intrusion detection system (IDS) protocols for a cyber physical system (CPS) comprising sensors, actuators, control units, and physical objects for controlling and protecting physical infrastructures.<br />The design part includes host IDS, system IDS and IDS response designs. The validation part includes a novel model-based analysis methodology with simulation validation. Our objective is to maximize the CPS reliability or lifetime in the presence of malicious nodes performing attacks which can cause security failures. Our host IDS design results in a lightweight, accurate, autonomous and adaptive protocol that runs on every node in the CPS to detect misbehavior of neighbor nodes based on state-based behavior specifications. Our system IDS design results in a robust and resilient protocol that can cope with malicious, erroneous, partly trusted, uncertain and incomplete information in a CPS. Our IDS response design results in a highly adaptive and dynamic control protocol that can adjust detection strength in response to environment changes in attacker strength and behavior. The end result is an energy-aware and adaptive IDS that can maximize the CPS lifetime in the presence of malicious attacks, as well as malicious, erroneous, partly trusted, uncertain and incomplete information.<br />We develop a probability model based on stochastic Petri nets to describe the behavior of a CPS incorporating our proposed intrusion detection and response designs, subject to attacks by malicious nodes exhibiting a range of attacker behaviors, including reckless, random, insidious and opportunistic attacker models. We identify optimal intrusion detection settings under which the CPS reliability or lifetime is maximized for each attacker model. Adaptive control for maximizing IDS performance is achieved by dynamically adjusting detection and response strength in response to attacker strength and behavior detected at runtime. We conduct extensive analysis of our designs with four case studies, namely, a mobile group CPS, a medical CPS, a smart grid CPS and an unmanned aircraft CPS. The results show that our adaptive intrusion and response designs operating at optimizing conditions significantly outperform existing anomaly-based IDS techniques for CPSs. / Ph. D.

Page generated in 0.0961 seconds