• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 74
  • 12
  • 10
  • 6
  • 5
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 151
  • 151
  • 107
  • 50
  • 47
  • 44
  • 31
  • 30
  • 28
  • 24
  • 23
  • 20
  • 18
  • 17
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Tomographic imaging of polypropylene nib granulates for an industrial application

Young, M. J. January 1999 (has links)
No description available.
2

Studies on the immunodiagnosis of visceral leishmaniasis

Attar, Zamil Jameel January 1997 (has links)
No description available.
3

Chemiluminescence, a detection method for HPLC

Thomas, H. D. January 1988 (has links)
No description available.
4

Implementation and Evaluation of A Low-Cost Intrusion Detection System For Community Wireless Mesh Networks

2015 February 1900 (has links)
Rural Community Wireless Mesh Networks (WMN) can be great assets to rural communities, helping them connect to the rest of their region and beyond. However, they can be a liability in terms of security. Due to the ad-hoc nature of a WMN, and the wide variety of applications and systems that can be found in such a heterogeneous environment there are multiple points of intrusion for an attacker. An unsecured WMN can lead to privacy and legal problems for the users of the network. Due to the resource constrained environment, traditional Intrusion Detection Systems (IDS) have not been as successful in defending these wireless network environments, as they were in wired network deployments. This thesis proposes that an IDS made up of low cost, low power devices can be an acceptable base for a Wireless Mesh Network Intrusion Detection System. Because of the device's low power, cost and ease of use, such a device could be easily deployed and maintained in a rural setting such as a Community WMN. The proposed system was compared to a standard IDS solution that would not cover the entire network, but had much more computing power but also a higher capital cost as well as maintenance costs. By comparing the low cost low power IDS to a standard deployment of an open source IDS, based on network coverage and deployment costs, a determination can be made that a low power solution can be feasible in a rural deployment of a WMN.
5

Prey detection by two species of neotropical theraphosids, Avicularia avicularia, L and Psalmopoeus cambridgei (Pocock)

Ruthven, J. W. January 1987 (has links)
No description available.
6

Exploring Vulnerabilities in Networked Telemetry

Shonubi, Felix, Lynton, Ciara, Odumosu, Joshua, Moten, Daryl 10 1900 (has links)
ITC/USA 2015 Conference Proceedings / The Fifty-First Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2015 / Bally's Hotel & Convention Center, Las Vegas, NV / The implementation of Integrated Network Enhanced Telemetry (iNET) in telemetry applications provides significant enhancements to telemetry operations. Unfortunately such networking brings the potential for devastating cyber-attacks and networked telemetry is also susceptible to these attacks. This paper demonstrates a worked example of a social engineering attack carried out on a test bed network, analyzing the attack process from launch to detection. For this demonstration, a penetration-testing tool is used to launch the attack. This attack will be monitored to detect its signature using a network monitoring tool, and this signature will then be used to create a rule which will trigger an alert in an Intrusion Detection System. This work highlights the importance of network security in telemetry applications and is critical to current and future telemetry networks as cyber threats are widespread and potentially devastating.
7

A system for automatic positioning and alignment of fiber-tip interferometer

Jalan, Mahesh 15 November 2004 (has links)
The research described in this thesis involves the design, development, and implementation of an automated positioning system for fiber-optic interferometric sensors. The Fiber-Tip Interferometer (FTI) is an essential component in the proven Thermo-Acousto-Photonic NDE technique for characterizing a wide range of engineering materials including polymers, semiconductors and composites. The need to adapt the fiber-optic interferometric system to an industrial environment and to achieve precision control for optimizing interferometric contrast motivated the development of an automated, self-aligning FTI system design. The design enables high-resolution positioning and alignment by eliminating manual subjectivity and allows significantly improved repeatability and accuracy to be attained. Opto-electronic and electromechanical devices including a GRIN lens, 2x2 fused bi-conical taper couplers, photodiodes, motor-controlled tip/tilt stages, oscilloscopes, and a PCI card, constitute a closed-loop system with a feedback controller. The system is controlled by and communicates with a computer console using LabVIEW, a graphical language developed by National Instruments. Specifically, alignment is quantified by scanning the voltage readings at various orientations of the GRIN lens. The experimental setup specific to achieving maximum interferometric contrast intensity when interrogating silicon wafers with various surface depositions is discussed. Results corresponding to the interferometric contrast data obtained at several different standoff distances (Fizeau Cavity magnitudes) demonstrate the robustness of the novel design.
8

Misconfiguration Analysis of Network Access Control Policies

Tran, Tung 16 February 2009 (has links)
Network access control (NAC) systems have a very important role in network security. However, NAC policy configuration is an extremely complicated and error-prone task due to the semantic complexity of NAC policies and the large number of rules that could exist. This significantly increases the possibility of policy misconfigurations and network vulnerabilities. NAC policy misconfigurations jeopardize network security and can result in a severe consequence such as reachability and denial of service problems. In this thesis, we choose to study and analyze the NAC policy configuration of two significant network security devices, namely, firewall and IDS/IPS. In the first part of the thesis, a visualization technique is proposed to visualize firewall rules and policies to efficiently enhance the understanding and inspection of firewall configuration. This is implemented in a tool called PolicyVis. Our tool helps the user to answer general questions such as ‘‘Does this policy satisfy my connection/security requirements’’. If not, the user can detect all misconfigurations in the firewall policy. In the second part of the thesis, we study various policy misconfigurations of Snort, a very popular IDS/IPS. We focus on the misconfigurations of the flowbits option which is one of the most important features to offers a stateful signature-based NIDS. We particularly concentrate on a class of flowbits misconfiguration that makes Snort susceptible to false negatives. We propose a method to detect the flowbits misconfiguration, suggest practical solutions with controllable false positives to fix the misconfiguration and formally prove that the solutions are complete and sound.
9

Misconfiguration Analysis of Network Access Control Policies

Tran, Tung 16 February 2009 (has links)
Network access control (NAC) systems have a very important role in network security. However, NAC policy configuration is an extremely complicated and error-prone task due to the semantic complexity of NAC policies and the large number of rules that could exist. This significantly increases the possibility of policy misconfigurations and network vulnerabilities. NAC policy misconfigurations jeopardize network security and can result in a severe consequence such as reachability and denial of service problems. In this thesis, we choose to study and analyze the NAC policy configuration of two significant network security devices, namely, firewall and IDS/IPS. In the first part of the thesis, a visualization technique is proposed to visualize firewall rules and policies to efficiently enhance the understanding and inspection of firewall configuration. This is implemented in a tool called PolicyVis. Our tool helps the user to answer general questions such as ‘‘Does this policy satisfy my connection/security requirements’’. If not, the user can detect all misconfigurations in the firewall policy. In the second part of the thesis, we study various policy misconfigurations of Snort, a very popular IDS/IPS. We focus on the misconfigurations of the flowbits option which is one of the most important features to offers a stateful signature-based NIDS. We particularly concentrate on a class of flowbits misconfiguration that makes Snort susceptible to false negatives. We propose a method to detect the flowbits misconfiguration, suggest practical solutions with controllable false positives to fix the misconfiguration and formally prove that the solutions are complete and sound.
10

Detecting Botnet-based Joint Attacks by Hidden Markov Model

Yu Yang, Peng 06 September 2012 (has links)
We present a new detection model include monitoring network perimeter and hosts logs to counter the new method of attacking involve different hosts source during an attacking sequence. The new attacking sequence we called ¡§Scout and Intruder¡¨ involve two separate hosts. The scout will scan and evaluate the target area to find the possible victims and their vulnerability, and the intruder launch the precision strike with login activities looked as same as authorized users. By launching the scout and assassin attack, the attacker could access the system without being detected by the network and system intrusion detection system. In order to detect the Scout and intruder attack, we correlate the netflow connection records, the system logs and network data dump, by finding the states of the attack and the corresponding features we create the detection model using the Hidden Markov Chain. With the model we created, we could find the potential Scout and the Intruder attack in the initial state, which gives the network/system administrator more response time to stop the attack from the attackers.

Page generated in 0.1086 seconds