• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 775
  • 215
  • 1
  • Tagged with
  • 991
  • 975
  • 973
  • 138
  • 114
  • 99
  • 97
  • 82
  • 81
  • 73
  • 71
  • 60
  • 56
  • 56
  • 51
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Malware in Mobile Devices : A study of analysing the emerging threat landscape on mobile platforms

Jörgensson, Anton January 2018 (has links)
Malicious software or malware are constantly on the rise and lately, we observe threats that differ from what we have seen before. Threats tend to penetrate through existing prevention measures thus a choice of studying recent malware was highly appealing. To narrow down the research, a selection of analysing the emerging threat landscape on mobile platforms was chosen due to its progressive publicity. The study’s result section has been divided into three separate parts. The first chapter of the results, consists of a Problem Analysis which covers the topic regarding crucial aspects of mobile devices, how user behaviour affects the probability of plausible infections. Also, a questionnaire has been sent out to 100 participants to discover particular user behaviour with a mobile device. Second chapter Malware Research explores previous and recent detected malware, in addition to their characteristics. Last chapter Security Policy, provides a functional IT security policy that can be implemented and used as a guideline in organisations. The policy is primarily intended to guide mobile users towards safer management and usage in a workplace or of personal use. Research revealed that there is a significant link between user behaviour and device management for a mobile user to get potentially infected by malware. Furthermore, mobile malware is progressive and continuously adapting from users habits of devices and applications.
22

Weight Estimation and Evaluation of User Suggestions in Mobile Browsing / Estimering och utvärdering av vikter i en mobilwebbläsares användarförslagssystem

Johansson, Oscar January 2019 (has links)
This study investigates the suggestion system of a mobile browser. The goal of a suggestion system is to assist the user by presenting relevant suggestions in an ordered list. By weighting the different types of suggestions presented to the user, such as history, bookmarks etc., it is investigated how this affects the performance of the suggestion sys- tem. The performance is measured using the position, error and Mean Reciprocal Rank of the chosen suggestion as well as the number of written characters. It is also measured if the user chose to not use the suggestion system, by searching or entering the entire URL. The weights were estimated using a Genetic Algorithm. The evaluation was done by performing an A/B test, were the control group used an unweighted system and the test group used the weights estimated by the genetic algorithm. The results from the A/B test were statistically analyzed using BEST and Bootstrap. The results showed an improvement of position, number of written characters, MMR and the error. There was no change in how much the user used the suggestion system. The thesis concluded that there is a correlation between the position of the desired suggestion and when the user stops typing, and that weighting types is a way to improve said position. The thesis also concludes that there is a need for future work in regards to evaluation of the optimization algorithm and error measurement.
23

TOWARDS AUTOMATED ANALYSIS OF EXECUTABLE MODELS

Malm, Jean, Skoog, Jonas January 2017 (has links)
By utilising graphical modelling languages, software developers can design large systems while keeping the architecture simple and understandable. Another benefit of using modelling languages is the possibility to automatically generate code, saving both time and reducing human errors in code. In addition, through the usage of well defined and executable models, the system can be tested and analysed as early as during the design phase. Doing so, potential errors in the design can be found and corrected during the design phase, saving time and other resources. In this thesis we present a method for analysing executable model representations of systems through three steps. First the model is transformed to a suitable format for analysis. The result of the transformation is then analysed using analysis tools. Lastly, the result of the analysis is mapped back to the source model. The developed method was assessed through a proof-of-concept using a transformation from the action language for fUML, an executable modelling language. The target of the transformation was ALF, an intermediate language designed for analysis in the SWEET tool. The analysis of the source was performed in regards to properties of the system, such as program flow and value bounds. Through the proof-of-concept, the proposed method was shown to be a viable option for analysing fUML models.
24

Dry-run med hjälp av union mount / Dry-run with union mount

Åström Åberg, Fabian January 2015 (has links)
Många avancerade och komplexa system används idag run-tom i världen och flera av dem är väldigt viktiga att de fungerar och fortsätter göra det. För att inte förstöra dessa system så kan en dry-run användas om någonting behöver uppdateras eller ändras. Med dry-run menas att en ändring aldrig händer men att resultaten av ändringen kan visas på en skärm eller förmedlas på något sätt. Det här arbetet undersöker om unionmount är en bra lösning för att implementera detta. Arbetetvisar att det finns möjligheter för att implementeras men det finns en del problem som behöver lösas. Detta kan också bero på vilket system man vill implementera det i.
25

Wireless Site Survey Analysis Best Western Hotels Malmia

Emmersköld, Fredrik January 2019 (has links)
No description available.
26

Design of a Coprocessor Board for an On Board Computer

Lindh, Daniel, Bergström, Jens January 2019 (has links)
The goal of this thesis is to design a coprocessor expansion board for an On Board Computer (OBC) using Commersial Off The Shelf (COTS) components. This is done in order to meet the increasing demand of more processing power as spacecrafts become more autonomous. After evaluating a number of different options, the LS1046A from ARM was chosen as the processing unit. This would increase the processing power from the current 110 Dhrystone Million Instructions Per Second (DMIPS) to a theoretical 22 560 DMIPS. The schematic was designed in DxDesigner, and after the layout was completed signal integrity simulations were performed in HyperLynx. After modifications to termination resistances, the simulations showed good signal integrity confirming proper routing of the signals. After receiving the manufactured Printed Circuit Board (PCB) with all components mounted, some tests could be performed confirming that the power distribution and the system clock was functioning properly.
27

Machine Learning for Ddos Detection in Packet Core Network for IoT

Saeedi, Kubra January 2019 (has links)
No description available.
28

Implementation of a Water Flow Sensor Node and Energy Evaluation of 2G Transmission Strategies

Levinsson, Johan January 2018 (has links)
In this report, the design choices made during the making of a water flow measuring sensor node are described and discussed to various extents. The node is to ultimately be deployed in South Sudan to monitor mini-water yards managed by the International Aid Services. A design using a hall effect water flow sensor, a microcontroller and a GSM modem is presented. Various lengths of SMS and HTTP messages are sent and the current signature they produce are compared to find out which transmission strategy is the most energy conservative. It is concluded that for a constant data volume, sending it in as few messages as possible is beneficial in terms of saving energy. It is also found that for short messages, SMS seems to be cheaper in energy compared to HTTP and the opposite is true for bigger messages. Avoiding actuators altogether has the potential to be beneficial in terms of battery life for a sensor node.
29

Implementation of Principal Component Analysis For Use in Anomaly Detection Using CUDA / Implementation av principialkomponentanalys för användning inom anomalidetektion med hjälp av CUDA

Bertils, Joakim January 2019 (has links)
As more and more systems are connected, a large benefit is found in being able to find and predict problems in the monitored process. By analyzing the data in real time, feedback can be generated to the operators or the process allowing the process to correct itself. This thesis implements and evaluates three CUDA GPU implementations of the principal component analysis used for dimensionality reduction of multivariate data sets running in real time to explore the trade-offs of the algorithm implementations in terms of speed, energy and accuracy. The GPU implementations are compared to reference implementations on the CPU. The study finds that the covariance based method is the fastest of the implementations for the tested configurations, but the iterative NIPALS implementation has some interesting optimization opportunities that are explored. For large enough data sets, speedup compared to the 8 virtual core CPU of around 100 is obtained for the GPU implementations, making the GPU implementations an option to investigate for problems requiring real time computation of principal components.
30

COUNTERMEASURES AGAINST COORDINATED CYBER-ATTACKS TOWARDS POWER GRID SYSTEMS : A systematic literature study

Johansson, Jonatan January 2019 (has links)
A study on countermeasures against coordinated cyber-attacks (CCA) towards power grid systems has been carried out. A coordinated cyber-attack is a cyber-based attack where multiple attackers use multiple attack-mechanisms towards multiple targets in a coordinated fashion. The coordination is based on that the different attack-mechanisms help each other in attacking the target. A CCA is made up of different stages where each stage consists of a number of attack-mechanisms and together have a certain purpose. The different stages are used to systematically advance towards its goal, which is to compromise the operation of internal systems or to steal confidential data. For example, the first stage may be used to locate entry points at the target system, and a second stage may be used to locate vulnerable hosts by sniffing ongoing network activity to further itself towards its attack goal.     Power grids that are used to generate, transmit, and distribute electricity over large geographical areas are connected to the Internet. Within these environments, commercial IT systems have been adopted to control their electrical equipment, which poses cybersecurity risks to the power grid.     Intrusion Detection Systems (IDS) are designed provide internal network protection in case of intruders. However, state-of-the-art IDSs has been found to have certain limitations in protecting against multi-stage and slow attacks. The inadequacy of state-of-the-art IDSs for protecting against CCAs motivates the need to identify alternate countermeasures that can mitigate CCAs, when the target is a power grid system. The method of choice to address this problem in this study is a systematic literature study where 48 countermeasures were identified and assessed to which extent they are suitable to mitigate CCAs. Results suggest to follow three approaches, namely to preemptively identify technical vulnerabilities in the local system, to distribute intrusion detection hosts across a larger network for better situational awareness, and to implement new types of IDS technologies. Countermeasures with references to specific publications are also provided. The study contributes to how security operators of power grids can fulfil the requirement on cybersecurity as demanded by the NIS directive of the European Union regarding protection against CCAs.

Page generated in 0.0776 seconds