• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 68
  • 9
  • 4
  • 3
  • 3
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 129
  • 23
  • 19
  • 16
  • 13
  • 13
  • 12
  • 12
  • 10
  • 10
  • 10
  • 10
  • 9
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

SnapCatch: Automatic Detection of Covert Timing Channels Using Image Processing and Machine Learning

Al-Eidi, Shorouq, Darwish, Omar, Chen, Yuanzhu, Husari, Ghaith 01 January 2021 (has links)
With the rapid growth of data exfiltration carried out by cyber attacks, Covert Timing Channels (CTC) have become an imminent network security risk that continues to grow in both sophistication and utilization. These types of channels utilize inter-arrival times to steal sensitive data from the targeted networks. CTC detection relies increasingly on machine learning techniques, which utilize statistical-based metrics to separate malicious (covert) traffic flows from the legitimate (overt) ones. However, given the efforts of cyber attacks to evade detection and the growing column of CTC, covert channels detection needs to improve in both performance and precision to detect and prevent CTCs and mitigate the reduction of the quality of service caused by the detection process. In this article, we present an innovative image-based solution for fully automated CTC detection and localization. Our approach is based on the observation that the covert channels generate traffic that can be converted to colored images. Leveraging this observation, our solution is designed to automatically detect and locate the malicious part (i.e., set of packets) within a traffic flow. By locating the covert parts within traffic flows, our approach reduces the drop of the quality of service caused by blocking the entire traffic flows in which covert channels are detected. We first convert traffic flows into colored images, and then we extract image-based features for detection covert traffic. We train a classifier using these features on a large data set of covert and overt traffic. This approach demonstrates a remarkable performance achieving a detection accuracy of 95.83% for cautious CTCs and a covert traffic accuracy of 97.83% for 8 bit covert messages, which is way beyond what the popular statistical-based solutions can achieve.
32

The Hurtful Relationship: A Longitudinal Study of Relational Aggression and Physical Health in Marriage

Martin, Matthew P. 16 July 2009 (has links) (PDF)
Previous literature has examined the link between overt marital conflict and physical health and found that negative interactions in marriage may lead to poorer health. Moreover, recent studies have identified relational aggression as a type of covert marital conflict. However, none have tested for effects of relational aggression on physical health in marriage. The purpose of this research is to further study this type of conflict by examining longitudinal dyadic data to determine how subtle, indirect marital conflict like relational aggression affects the health of spouses. Data from 316 couples, from the first two waves of the BYU Flourishing Families Project, were examined using structural equation modeling. The main finding of this study was that wives who withdraw support and affection from their husbands may experience poorer health a year later. This partner affect was not found to be true for husbands. Clinical implications are discussed, as well as recommendations for future research.
33

On the Modelling, Analysis, and Mitigation of Distributed Covert Channels

Jaskolka, Jason 06 1900 (has links)
Covert channels are means of communication that allow agents in a system to transfer information in a manner that violates the system’s security policy. Covert channels have been well studied in the constrained and old sense of the term where two agents are communicating through a channel while an intruder interferes to hide the transmission of a message. In an increasingly connected world where modern computer systems consist of broad and heterogeneous communication networks with many interacting agents, distributed covert channels are becoming increasingly available. For these distributed forms of covert channels, there are shortcomings in the science, mathematics, fundamental theory, and tools for risk assessment, and for proposing mechanisms and design solutions for averting these threats. Since current formal methods for specifying concurrent systems do not provide the tools needed to efficiently tackle the problem of distributed covert channels in systems of communicating agents, this thesis proposes Communicating Concurrent Kleene Algebra (C²KA) which is an extension to the algebraic model of concurrent Kleene algebra (CKA) first presented by Hoare et al. C²KA is used to capture and study the behaviour of agents, and description logic is used to capture and study the knowledge of agents. Using this representation of agents in systems of communicating agents, this thesis presents a formulation and verification approach for the necessary conditions for the existence of distributed covert channels in systems of communicating agents. In this way, this thesis establishes a mathematical framework for the modelling, analysis, and mitigation of distributed covert channels in systems of communicating agents. This framework enhances the understanding of covert channels and provides a basis for thinking and reasoning about covert channels in new ways. This can lead to a formal foundation upon which guidelines and mechanisms for designing and implementing systems of communicating agents that are resilient to covert channels can be devised. / Thesis / Doctor of Philosophy (PhD)
34

Stealth marketing to generation Y

Rehm, Lauren 01 January 2010 (has links)
The purpose of this research is to investigate the appropriateness of using stealth marketing to advertise to Generation Y. Stealth marketing is a covert form of advertising where the target audience.is unaware that they are being marketed to. Marketers are skillful at portraying stealth marketing advertisements as very realistic, authentic, personal and conversational messages often communicated in casual settings. This research examines how members of Generation Y respond to stealth marketing attempts in terms of purchase likelihood (before and after knowledge of the attempt is introduced) and ethical perception. The research identifies four types of stealth marketing: brand pushers, celebrity spokespeople, disguised editorial content and viral marketing. Overall, before knowledge of the attempt was introduced, the stealth marketing advertisements tested were effective in inducing purchase likelihood. However, celebrity spokespeople were the most ineffective means of communicating stealth marketing attempts. Content-based stealth tactics (i.e. disguised editorial content and viral marketing) appear to be more effective in terms of generating purchase likelihood, but are also more likely to be deemed unethical after knowledge of the attempt is introduced. It can be concluded that the very stealth nature of a stealth advertisement is key to its success when targeting Generation Y. In general, members of Generation Y are responsive to stealth marketing attempts. These findings indicate that, if selected and executed properly, marketing managers can look toward stealth marketing tactics as a means of effectively targeting Generation Y with minimal fear of negative backlash.
35

COVERT PROCESSES: LOYALTY CONFLICTS, CHILD INVOLVEMENT, AND PARENTAL ALIENATION AS MEDIATORS OF THE LINK BETWEEN INTERPARENTAL CONFLICT AND COLLEGE STUDENT ADJUSTMENT

Swanson, Julie A. 03 August 2005 (has links)
No description available.
36

Associations between Fear of Negative Evaluation and Covert and Overt Attention Bias Through Eye-Tracking and Visual Dot Probe

Capriola, Nicole N. 26 March 2018 (has links)
Social Anxiety Disorder is characterized by irrational and persistent fears of potential evaluation and scrutiny by others. For socially anxious youth, the core, maladaptive cognition is fear of negative evaluation (FNE). Whereas Cognitive Behavioral Therapy (CBT) targets remediation of intense and unfounded FNE, Attention Bias Modification Treatment (ABMT) targets attention bias. The degree to which FNE and biased attention are related processes is unknown. This study sought to assess the relationship between FNE and two indices of attention bias (dot probe and eye-tracking). In addition, this study examines differences in attention bias between a clinically confirmed group of youth SAD and healthy controls. A significant group difference in average latency to fixate on angry faces was found [F(1,65) = 31.94, p < .001, ηp2 = .33]. However, the pattern was not consistent across the other attention bias metrics (i.e., dot probe bias scores and first fixation direction percentage towards angry faces). In addition, associations between FNE and the attention bias metrics were not statistically significant in either group. Future directions and implications of these findings within the context of refinements to existing interventions are discussed. / Master of Science / Social Anxiety Disorder (SAD) is characterized by irrational and persistent fears of potential evaluation and scrutiny by others. For socially anxious youth, a main feature of the disorder is fear of negative evaluation (FNE). Whereas Cognitive Behavioral Therapy (CBT) targets FNE, Attention Bias Modification Treatment (ABMT) targets attention bias. However, the degree to which FNE and biased attention are related processes has not been studied. This study examined the relationship between FNE and two indices of attention bias (dot probe and eye-tracking). This study also examines differences in attention bias between a youth with SAD and healthy youth (no psychological diagnoses). Group differences were found for only one attention bias measure (i.e., youth with SAD were quicker to look at anger faces relative to non-anxious youth). In addition, associations between FNE and the attention bias metrics were not statistically significant in either group. Future directions of these findings are discussed.
37

Successful Branding in Covert Virals : Communication Strategy and Communication Channel Synergy

Jansson, Carl Oscar, Myhrman, Jens, Nordström, Michael January 2011 (has links)
Purpose: The purpose of this study is to see what implications the new communication channel of Covert Virals has on acknowledged communication strategies and whether or not these strategies are still viable within Covert Virals.   Background: The term Covert Viral has been given to pieces of advertisement, spread through the medium of electronic word of mouth over social networks, which are designed to look user made. With the defense mechanisms towards traditional advertisements in mind, and the extensive growth of the social networks, it is of high interest to understand how traditional branding strategies work in this new communication channel.  Method: To answer our research questions, and thereby conclude our purpose, we have used quantitative data which was collected through the use of non-random sampling. This was analyzed within the SPSS statistics software, using both descriptive and inferential statistics.  Conclusion: The implications this communication channel brings to traditional branding strategies has been divided into two categories, Brand Awareness strategy implications, and Brand Attitude strategy implications. Within Brand Awareness strategies it was found that Covert Virals were unfit to execute brand recall strategies. However, Brand recognition strategies were found to still apply, with a possible negative backlash of advertising for a competitor‟s brand. Within Brand Attitude Strategies, we found that a new restriction has been placed on the traditional strategies. This restriction is the obligatory use of emotional branding. Furthermore, this emotional branding must be constructed in such a way so that it caters to both the viral intent of the advertisement, and the branding intent. / Syfte: Syftet med denna studie är att fasställa vilken inverkan den nya kommunikationskanalen Covert Virals har på existerande teorier gällande varumärkeskommunikation och om dessa teorier är tillämpliga på Covert Virals.  Bakgrund: Covert Virals är en term för reklam som har spridit sig via så kallad elektronisk „mun till mun‟ -marknadsföring via sociala nätverk där upphovsmannen framställs som icke företagsrelaterad. På grund av svårigheter att nå kunder via traditionell  marknadsföring och den omfattande tillväxten inom sociala nätverk på senare år, är det av största vikt att förstå hur företag ska marknadsföra sig genom denna nya kommunikationskanal.  Metod: För att uppfylla vårt syfte har vi använt oss av en kvantitativ undersökning som har samlats in genom ett icke slumpmässigt  urval. Svaren analyserades både med hjälp av trendanalys och beskrivande statistik genom mjukvaran SPSS Statistics.  Slutsats: Utfallen av undersökningen är uppdelade i medvetenhet om, respektive attityd till, varumärket. Covert Virals är inte lämpliga för att öka tittarnas förmåga att erinra sig ett varumärke, men fungerar väl för att skapa igenkännelse av varumärket. Det finns en risk att de positiva effekterna av en covert viral tillkommer konkurrenter i lika stor eller större utsträckning som det egna varumärket. När det gäller attityd till ett varumärke så har studien visat att det finns en ny begränsning i det att en Covert Viral måste använda sig av känsloladdade budskap. Detta känsloladdade budskap måste dels skapa en stark vilja att vidarebefordra meddelandet samt förmedla den känslan marknadsföraren vill associera med varumärket.
38

Information Hiding in Networks : Covert Channels

Ríos del Pozo, Rubén January 2007 (has links)
<p>Covert Channels have existed for more than twenty years now. Although they did not receive a special attention in their early years, they are being more and more studied nowadays. This work focuses on network covert channels and it attempts to give an overview on their basics to later analyse several existing implementations which may compromise the security perimeter of a corporate network. The features under study are the bandwidth provided by the channel and the ease of detection. The studied tools have turned out to be in most cases unreliable and easy to detect with current detection techniques and the bandwidth provided is usually moderate but they might pose a threat if not taken into consideration.</p>
39

Information Hiding in Networks : Covert Channels

Ríos del Pozo, Rubén January 2007 (has links)
Covert Channels have existed for more than twenty years now. Although they did not receive a special attention in their early years, they are being more and more studied nowadays. This work focuses on network covert channels and it attempts to give an overview on their basics to later analyse several existing implementations which may compromise the security perimeter of a corporate network. The features under study are the bandwidth provided by the channel and the ease of detection. The studied tools have turned out to be in most cases unreliable and easy to detect with current detection techniques and the bandwidth provided is usually moderate but they might pose a threat if not taken into consideration.
40

Vi bråkade och fick en miljon : Socialsekreterares motståndsstrategier mot hög arbetsbelastning / We hassled and got a million : Social service workers resistance against a high work load

Birkestam, Marty, Åstrand, Emy January 2015 (has links)
This study aims to investigate individual and collective resistance strategies used by social service workers to improve their work situation. It also aims to describe what consequenses their acts of resistance has on an individual, collective and structural level. The study include ten qualitative interviews and three participating observations with social service workers within children and youth unit at the social Services in Stockholm County. The result is analysed with Hollander &amp; Einwohners typology of resistance (2004). The study shows that speaking up towards high work load, union organization and to shift responsibility from the individual to the structural are powerfull ways to change the work load. This can lead to being seen as a trouble-maker, a vulnerable position in the workplace, but also to expanded resources like new positions. To take breaks, work slowly, a good atmosphere and overriding internal requirements for documentation are strategies that can bring stress and guilt but also make a great difference and bring understanding and support from the group. Covert resistance can lead to overt and individual resistance can lead to collective. The gist is that a rested social service worker can make a big difference to an experienced high work load.

Page generated in 0.0456 seconds