• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 72
  • 12
  • 10
  • 6
  • 5
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 149
  • 149
  • 105
  • 50
  • 46
  • 44
  • 31
  • 28
  • 26
  • 24
  • 23
  • 20
  • 18
  • 16
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

A HUB-CI MODEL FOR NETWORKED TELEROBOTICS IN COLLABORATIVE MONITORING OF AGRICULTURAL GREENHOUSES

Ashwin Sasidharan Nair (6589922) 15 May 2019 (has links)
Networked telerobots are operated by humans through remote interactions and have found applications in unstructured environments, such as outer space, underwater, telesurgery, manufacturing etc. In precision agricultural robotics, target monitoring, recognition and detection is a complex task, requiring expertise, hence more efficiently performed by collaborative human-robot systems. A HUB is an online portal, a platform to create and share scientific and advanced computing tools. HUB-CI is a similar tool developed by PRISM center at Purdue University to enable cyber-augmented collaborative interactions over cyber-supported complex systems. Unlike previous HUBs, HUB-CI enables both physical and virtual collaboration between several groups of human users along with relevant cyber-physical agents. This research, sponsored in part by the Binational Agricultural Research and Development Fund (BARD), implements the HUB-CI model to improve the Collaborative Intelligence (CI) of an agricultural telerobotic system for early detection of anomalies in pepper plants grown in greenhouses. Specific CI tools developed for this purpose include: (1) Spectral image segmentation for detecting and mapping to anomalies in growing pepper plants; (2) Workflow/task administration protocols for managing/coordinating interactions between software, hardware, and human agents, engaged in the monitoring and detection, which would reliably lead to precise, responsive mitigation. These CI tools aim to minimize interactions’ conflicts and errors that may impede detection effectiveness, thus reducing crops quality. Simulated experiments performed show that planned and optimized collaborative interactions with HUB-CI (as opposed to ad-hoc interactions) yield significantly fewer errors and better detection by improving the system efficiency by between 210% to 255%. The anomaly detection method was tested on the spectral image data available in terms of number of anomalous pixels for healthy plants, and plants with stresses providing statistically significant results between the different classifications of plant health using ANOVA tests (P-value = 0). Hence, it improves system productivity by leveraging collaboration and learning based tools for precise monitoring for healthy growth of pepper plants in greenhouses.
92

A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks

Abdullah, Hanifa 12 October 2006 (has links)
Every environment is susceptible to risks and Wireless Local Area Networks (WLANs) based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard are no exception. The most apparent risk of WLANs is the ease with which itinerant intruders obtain illicit entry into these networks. These intrusion security risks must therefore be addressed which means that information security risk analysis and risk management need to be considered as integral elements of the organisation’s business plan. A well-established qualitative risk analysis and risk management methodology, the Operationally Critical Threat Asset and Vulnerability Evaluation (OCTAVE) is selected for conducting the WLAN intrusion security risk analysis and risk management process. However, the OCTAVE risk analysis methodology is beset with a number of problems that could hamper a successful WLAN intrusion security risk analysis. The ultimate deliverable of this qualitative risk analysis methodology is the creation of an organisation-wide protection strategy and risk mitigation plan. Achieving this end using the OCTAVE risk analysis methodology requires an inordinate amount of time, ranging from months to years. Since WLANs are persistently under attack, there is a dire need for an expeditious risk analysis methodology. Furthermore, the OCTAVE risk analysis methodology stipulates the identification of assets and corresponding threat scenarios via a brainstorming session, which may be beyond the scope of a person who is not proficient in information security issues. This research was therefore inspired by the pivotal need for a risk analysis and risk management methodology to address WLAN intrusion attacks and the resulting risks they pose to the confidentiality, integrity and availability of information processed by these networks. Copyright / Dissertation (MSc (Computer Science))--University of Pretoria, 2006. / Computer Science / unrestricted
93

Negative attitudes towards cyclists influence the acceptance of an in-vehicle cyclist detection system

De Angelis, Marco, Puchades, Víctor Marín, Fraboni, Federico, Pietrantoni, Luca, Prati, Gabriele 21 December 2020 (has links)
The shift towards automation and safer vehicles will increasingly involve use of technological advancements such as Advanced Driver Assistance Systems (ADAS). Nevertheless, these technologies need to meet users’ perceived needs to be effectively implemented and purchased. Based on an updated version of the Technology Acceptance Model (TAM), this study analyses the main determinants of drivers’ intention to use an ADAS aimed at detecting cyclist and preventing potential collision with them through an auto-braking system. Even if the relevance of perceived usefulness, perceived ease of use and trust on the acceptance of a new system has been already discussed in literature, we considered the role of an external variable such as attitudes towards cyclists in the prediction of an ADAS aimed to improve the safety of cyclists. We administered a questionnaire measuring negative attitudes towards cyclists, trust, perceived usefulness, perceived ease of use and the behavioural intention to use the system to 480 Italian drivers. Path analysis using Bayesian estimation showed that perceived usefulness, trust in the system, and negative attitudes towards cyclists have a direct effect on the intention to use the ADAS. Considering the role of attitudes towards other road users in the intention to use new ADAS aimed to improve their safety could foster the user’s acceptance, especially for those people who express a negative representation of cyclists and are even more unlikely to accept the technology.
94

Theoretical design of an XRF system for environmental measurements of Mercury in fiber banks

Yu, Runpeng January 2020 (has links)
This thesis demonstrates the advantages of using the Energy-dispersive X-ray fluorescence (ED-XRF) system to quantify the mercury content in fiber banks at first. The Monte Carlo N-Particle (MCNP) code was then used to simulate the XRF system model with suitable parameters such as the input X-ray energy level, the detector material, and the environmental factor (water depth). The SNR results of the mercury spectrum when applying different parameters were obtained. Then, the limit of detection (LOD) and limit of quantification (LOQ) based on the SNR approach are considered. Finally, system parameters were determined in order to obtain more accurate qualitative and quantitative analysis results for future environmental measurements.
95

Intrusion Detection System in Smart Home Network Using Artificial Immune System and Extreme Learning Machine

Alalade, Emmanuel 16 June 2020 (has links)
No description available.
96

A novel intrusion detection system (IDS) architecture. Attack detection based on snort for multistage attack scenarios in a multi-cores environment.

Pagna Disso, Jules F. January 2010 (has links)
Recent research has indicated that although security systems are developing, illegal intrusion to computers is on the rise. The research conducted here illustrates that improving intrusion detection and prevention methods is fundamental for improving the overall security of systems. This research includes the design of a novel Intrusion Detection System (IDS) which identifies four levels of visibility of attacks. Two major areas of security concern were identified: speed and volume of attacks; and complexity of multistage attacks. Hence, the Multistage Intrusion Detection and Prevention System (MIDaPS) that is designed here is made of two fundamental elements: a multistage attack engine that heavily depends on attack trees and a Denial of Service Engine. MIDaPS were tested and found to improve current intrusion detection and processing performances. After an intensive literature review, over 25 GB of data was collected on honeynets. This was then used to analyse the complexity of attacks in a series of experiments. Statistical and analytic methods were used to design the novel MIDaPS. Key findings indicate that an attack needs to be protected at 4 different levels. Hence, MIDaPS is built with 4 levels of protection. As, recent attack vectors use legitimate actions, MIDaPS uses a novel approach of attack trees to trace the attacker¿s actions. MIDaPS was tested and results suggest an improvement to current system performance by 84% whilst detecting DDOS attacks within 10 minutes.
97

Cyberbullying Detection System On Multimodal Data / System för upptäckt av nätmobbning med hjälp av multimodal data

Nikolskaya, Anna January 2022 (has links)
Cyberbullying has become a significant societal concern as people increasingly use computing technology to mediate all elements of their life. Cyberbullying can cause serious psychological and emotional problems for people who are impacted. Hence, developing automated ways for detecting cyberbullying is critical. While recent efforts to identify cyberbullying have specified advanced text processing approaches, the area of visual data processing has received significantly less attention.  This thesis presents multimodal approach on cyberbullying detection in social media by using a combination of visual and textual features. The work presents the prototype of cyberbullying detection system alongside its design and implementation details.  The foundings of this work prove that visual features can be used for the improvement of the textual approach. The results show that visual features is a best performing approach according to Naive Bayes and Random Forest algorithms and combination of textual and visual features reached the highest performance according to Support Vector Classification model. Furthermore, the result reveal that feature combination leading to the highest performance of Support Vector Classification is a combination of text description, text sentiment and image tags. The strongest feature performance with Random Forest and Naive Bayes model has been demonstrated by image tags. / Cybermobbning har blivit ett stort samhällsproblem i takt med att människor i allt högre grad använder datorteknik i alla delar av sitt liv. Cybermobbning kan orsaka allvarliga psykologiska och känslomässiga problem för de personer som drabbas. Därför är det viktigt att utveckla automatiserade metoder för att upptäcka cybermobbning. Medan de senaste insatserna för att identifiera cybermobbning har specificerat avancerade metoder för textbearbetning, har visuell databehandling fått betydligt mindre uppmärksamhet.  I den här avhandlingen presenteras en multimodal metod för att upptäcka cybermobbning i sociala medier med hjälp av en kombination av visuella och textuella element. I arbetet presenteras prototypen av ett system för upptäckt av cybermobbning tillsammans med detaljer om dess utformning och genomförande.  Resultaten av detta arbete visar att visuella funktioner kan användas för att förbättra den textuella modellen. Resultaten visar att visuella funktioner är det bästa tillvägagångssättet enligt Naive Bayes - och Random Forest­algoritmerna och att kombinationen av text- och visuella funktioner uppnådde den högsta prestandan enligt Support Vector Classification - modellen. Dessutom visar resultatet att kombinationen av funktioner som leder till den högsta prestandan för Support Vector Classification ar en kombination av textbeskrivning, textkänsla och bildtaggar. Den starkaste prestandan med Random Forest - och Naive Bayes -modellen däremot, har visats med bildtaggar.
98

Web-Based Intrusion Detection System

Ademi, Muhamet January 2013 (has links)
Web applications are growing rapidly and as the amount of web sites globallyincreases so do security threats. Complex applications often interact with thirdparty services and databases to fetch information and often interactions requireuser input. Intruders are targeting web applications specifically and they are ahuge security threat to organizations and a way to combat this is to haveintrusion detection systems. Most common web attack methods are wellresearched and documented however due to time constraints developers oftenwrite applications fast and may not implement the best security practices. Thisreport describes one way to implement a intrusion detection system thatspecifically detects web based attacks.
99

Network Traffic Analysis and Anomaly Detection : A Comparative Case Study

Babu, Rona January 2022 (has links)
Computer security is to protect the data inside the computer, relay the information, expose the information, or reduce the level of security to some extent. The communication contents are the main target of any malicious intent to interrupt one or more of the three aspects of the information security triad (confidentiality, integrity, and availability). This thesis aims to provide a comprehensive idea of network traffic analysis, various anomaly or intrusion detection systems, the tools used for it, and finally, a comparison of two Network Traffic Analysis (NTA) tools available in the market: Splunk and Security Onion and comparing their finding to analyse their feasibility and efficiency on Anomaly detection. Splunk and Security Onion were found to be different in the method of monitoring, User Interface (UI), and the observations noted. Further scope for future works is also suggested from the conclusions made.
100

Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web. / Web applications vulnerability analysis and intrusion detection systems assessment

Akrout, Rim 18 October 2012 (has links)
Avec le développement croissant d’Internet, les applications Web sont devenues de plus en plus vulnérables et exposées à des attaques malveillantes pouvant porter atteinte à des propriétés essentielles telles que la confidentialité, l’intégrité ou la disponibilité des systèmes d’information. Pour faire face à ces malveillances, il est nécessaire de développer des mécanismes de protection et de test (pare-feu, système de détection d’intrusion, scanner Web, etc.) qui soient efficaces. La question qui se pose est comment évaluer l’efficacité de tels mécanismes et quels moyens peut-on mettre en oeuvre pour analyser leur capacité à détecter correctement des attaques contre les applications web.Dans cette thèse nous proposons une nouvelle méthode, basée sur des techniques de clustering de pages Web, qui permet d’identifier les vulnérabilités à partir de l’analyse selon une approche boîte noire de l’application cible. Chaque vulnérabilité identifiée est réellement exploitée ce qui permet de s’assurer que la vulnérabilité identifiée ne correspond pas à un faux positif. L’approche proposée permet également de mettre en évidence différents scénarios d’attaque potentiels incluant l’exploitation de plusieurs vulnérabilités successives en tenant compte explicitement des dépendances entre les vulnérabilités.Nous nous sommes intéressés plus particulièrement aux vulnérabilités de type injection de code, par exemple les injections SQL. Cette méthode s’est concrétisée par la mise en oeuvre d’un nouveau scanner de vulnérabilités et a été validée expérimentalement sur plusieurs exemples d’applications vulnérables. Nous avons aussi développé une plateforme expérimentale intégrant le nouveau scanner de vulnérabilités, qui est destinée à évaluer l’efficacité de systèmes de détection d’intrusions pour des applications Web dans un contexte qui soit représentatif des menaces auxquelles ces applications seront confrontées en opération. Cette plateforme intègre plusieurs outils qui ont été conçus pour automatiser le plus possible les campagnes d’évaluation. Cette plateforme a été utilisée en particulier pour évaluer deux techniques de détection d’intrusions développées par nos partenaires dans le cadre d’un projet de coopération financé par l’ANR, le projet DALI. / With the increasing development of Internet, Web applications have become increasingly vulnerable and exposed to malicious attacks that could affect essential properties such as confidentiality, integrity or availability of information systems. To cope with these threats, it is necessary to develop efficient security protection mechanisms and testing techniques (firewall, intrusion detection system,Web scanner, etc..). The question that arises is how to evaluate the effectiveness of such mechanisms and what means can be implemented to analyze their ability to correctly detect attacks against Webapplications.This thesis presents a new methodology, based on web pages clustering, that is aimed at identifying the vulnerabilities of a Web application following a black box analysis of the target application. Each identified vulnerability is actually exploited to ensure that the identified vulnerability does not correspond to a false positive. The proposed approach can also highlight different potential attack scenarios including the exploitation of several successive vulnerabilities, taking into account explicitly the dependencies between these vulnerabilities. We have focused in particular on code injection vulnerabilities, such asSQL injections. The proposed method led to the development of a new Web vulnerability scanner and has been validated experimentally based on various vulnerable applications.We have also developed an experimental platform integrating the new web vulnerability scanner, that is aimed at assessing the effectiveness of Web applications intrusion detection systems, in a context that is representative of the threats that such applications face in operation. This platform integrates several tools that are designed to automate as much as possible the evaluation campaigns. It has been used in particular to evaluate the effectiveness of two intrusion detection techniques that have been developed by our partners of the collaborative project DALI, funded by the ANR, the French National Research Agency

Page generated in 0.0908 seconds