• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 734
  • 350
  • 73
  • 73
  • 73
  • 73
  • 73
  • 72
  • 48
  • 31
  • 9
  • 5
  • 5
  • 4
  • 3
  • Tagged with
  • 1682
  • 1682
  • 269
  • 247
  • 234
  • 207
  • 186
  • 184
  • 173
  • 164
  • 145
  • 137
  • 136
  • 125
  • 124
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Assessing the effects of honeypots on cyber-attackers

Lim, Sze Li Harry 12 1900 (has links)
A honeypot is a non-production system, design to interact with cyber-attackers to collect intelligence on attack techniques and behaviors. While the security community is reaping fruits of this collection tool, the hacker community is increasingly aware of this technology. In response, they develop anti-honeypot technology to detect and avoid honeypots. Prior to the discovery of newer intelligence collection tools, we need to maintain the relevancy of honeypot. Since the development of anti-honeypot technology indicates the deterrent effect of honeypot, we can capitalize on this deterrent effect to develop fake honeypot. Fake honeypot is real production system with deterring characteristics of honeypot that induces the avoidance behavior of cyber-attackers. Fake honeypots will provide operators with workable production systems under obfuscation of deterring honeypot when deployed in hostile information environment. Deployed in a midst of real honeynets, it will confuse and delay cyber-attackers. To understand the effects of honeypot on cyber-attackers to design fake honeypot, we exposed a tightly secured, self-contained virtual honeypot to the Internet over a period of 28 days. We conclude that it is able to withstand the duration of exposure without compromise. The metrics pertaining to the size of last packet suggested departure of cyber-attackers during reconnaissance.
42

Implementation of a fault tolerant control unit within an FPGA for space applications

Perez Casanova, Gaspar M. 12 1900 (has links)
The space environment implies a challenge for the development and utilization of electronics. Field Programmable Gate Arrays (FPGAs) represent a possible solution to that challenge. An FPGA itself is not a Fault Tolerant component, but with the correct configuration it can emulate and behave as one. The Configurable Fault Tolerant Processor (CFTP) developed at the Naval Postgraduate School (NPS) was intended to work as a platform for the implementation and testing of designs and experiments for space applications. The mayor components of the CFTP are two FPGAs, one configured as the control FPGA (X1) and the other as the experiment FPGA (X2). The configuration of the experiment FPGA already includes fault tolerant properties against radiation and its effects over FPGAs. The control experiment did not have any fault tolerance built-in. This thesis investigates the design, considerations, implementation, performance and resource utilization of a Fault Tolerant Control Unit based on FPGA technology using a Triple Modular Redundancy (TMR) approach.
43

Implementation and analysis of a threat model for IPv6 host autoconfiguration

Chozos, Savvas 09 1900 (has links)
IPv6, the successor of IPv4, introduces the stateless autoconfiguration feature as a convenient alternative to the Dynamic Host Configuration Protocol (DHCP). However, the security implications of this new approach have only been discussed at the conceptual level. This thesis research develops software based on the open-source packet capture library Jpcap to capture and build appropriate ICMPv6 autoconfiguration messages. The developed Java software is used to implement two DoS threats to the IPv6 autoconfiguration procedure in a laboratory IPv6 network. The results indicate that these threats are real and further studies are required to identify suitable countermeasures. During this work compliance defects are also identified for the Linux Operating System's IPv6 implementation.
44

Enabling system management through process modeling the Australian Defence Force Recruiting System

Ibbott, Carrissa C. 09 1900 (has links)
Defence Force Recruiting (DFR) is responsible for all ab initio recruitment of full-time and part-time Officer appointees and general entry enlistees into the Australian Defence Force (ADF) to serve in the Australian Army, Navy or Air Force. Despite the merging of single-service selection systems into a tri-service system and the commercialization of significant components of ADF recruitment functions in 2001, recruiting achievement continues to be below the targeted levels essential to maintain the ADF personnel strength necessary for operations. An assessment of the recruiting system to enable managerial overview and performance evaluation is warranted. Using avant-garde commercial-of-the-shelf (COTS) process modeling software a Recruiting System Model (RSM) will be built that captures the entire recruiting system in three dimensions. This will become a tool for Defence and DFR managers at all levels that will enrich their ability to assess, analyze, and improve the recruiting system. Ultimately it will help identify the components of the Recruiting System that are functioning in a manner detrimental to achieving ADF recruiting goals and provide the means to predict the effects on recruiting achievement of multiple courses of actions. The RSM incorporates a visual graphical depiction of the ADF recruiting system as well as numerical throughput rates and yield ratios for the processes and sub-processes internal to the recruiting system. The RSM enables cross-functional managerial control in a versatile and adaptable platform.
45

Kinetic parameters from thermogravimetric analysis.

January 1975 (has links)
Thesis (M.Phil.)--Chinese Univerisy of Hong Kong. / Bibliography: leaves 114-117.
46

A measure of software complexity

Borchert, Lloyd David January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
47

The application of complexity metrics to a software requirements specification

Lemieux, Alice Josephine January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
48

Information flow complexity

Udomphorn, Pakarat January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
49

Microcomputer based heat controller

Akkam, Mazen January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
50

The design of three interpreters - proposition, proposition proof, & predicate

Lauxman, Sarah R January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries / Department: Computer Science.

Page generated in 0.0631 seconds