• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 97
  • 15
  • 13
  • 10
  • 6
  • 4
  • 4
  • 3
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 177
  • 68
  • 63
  • 56
  • 52
  • 45
  • 45
  • 36
  • 35
  • 32
  • 28
  • 26
  • 25
  • 22
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Applications de la théorie des jeux à champ moyen / Applications of mean field game theory

Dogguy, Habib 05 December 2014 (has links)
Dans cette thèse nous nous intéressons à l'application de la théorie des jeux à champ moyen en économie. Cette nouvelle branche de la théorie des jeux permet d'étudier les systémes impliquant un grand nombre d'agents en utilisant la notionde champ moyen empruntée à la physique statistique. Cette méthode réduit considérablement la compléxité des interactions. Le premier modèle est consacré à l'étude des logiciles et montre que la tolérance du piratage peut être un moyen ef- _cace contre la propagation des logiciels libres. Le deuxième modèle est un modèle de champ moyen statique et traite du problème de stationnement dans les villes en introduisant de l'hétérogénéité dans la population des consommateurs. Cela nous permet de mieux évaluer les politiques publiques mises en oeuvre. Le troisième modèle analyse, dans un cadre dynamique, les conséquences du choix des jeunes chercheurs sur la dynamique des sciences. / In this thesis we study the application of Mean Field Game Theory in economics. This new branch of game theory is devoted to the study of systems involving a large number of interacting agents using the notion of mean field from Statistical Physics. This method reduces greatly the complexity of interactions. The first model is devoted to the study of Software market and shows that tolerance of piracy can be an effective strategy in order to limit the diffusion of free softwares. The second model is a static mean field game and addresses the problem of parking in cities by intro ducing heterogeneity among agents. This allows us to evaluate public policies. The third model analysis, in a dynamic setting, theconsequences of the choice of young researchers on the dynamics of science.
72

Technoethics and Organizing: Exploring Ethical Hacking within a Canadian University

Abu-Shaqra, Baha January 2015 (has links)
Ethical hacking is one important information security risk management strategy business and academic organizations use to protect their information assets from the growing threat of hackers. Most published books on ethical hacking have focused on its technical applications in risk assessment practices. This thesis addressed a gap within the organizational communication literature on ethical hacking. Taking a qualitative exploratory case study approach, the thesis paired technoethical inquiry theory with Karl Weick’s sensemaking model to explore ethical hacking in a Canadian university. In-depth interviews with key stakeholder groups and a document review were conducted. Guided by the Technoethical Inquiry Decision-making Grid (TEI-DMG), a qualitative framework for use in technological assessment, findings pointed to the need to expand the communicative and social considerations involved in decision making about ethical hacking practices. Guided by Weick’s theory, findings pointed to security awareness training for increasing sensemaking opportunities and reducing equivocality in the information environment.
73

P.S. I love you...and other growth hacking strategies used by disruptive tech start-ups : A case study on the relevance and enactment of growth hacking by Sweden's tech start-ups

Bergendal, Taghrid Sara January 2017 (has links)
Disruption innovation theory has been the zeitgeist for building globally disruptive tech companies since 1997. One decade later, disruptive tech start-ups are moving away from traditional marketing strategies in favour of growth hacking. There is a seemingly growing consensus by online tech experts, tech entrepreneurs, advisors and investors, that suggests that growth hacking is becoming increasingly important practice for disruption based tech start-ups. Furthermore, Sweden is becoming the Silicon Valley of the Nordics, producing more unicorns per capita than any other country in the world. This case study research is an investigation of the relevance and enactment of growth hacking by disruptive tech start-ups in Sweden. The main objective is to determine whether growth hacking is actually being used and how it is enacted by the start-ups. The goal is to explore how relevant this new term is, if it as popular as suggested in online literature and if so which growth hacks are being used. The study is conducted by carrying out a qualitative case study on five tech start-ups in Sweden: Fidesmo, a smart-chip payment system based on NFC technology that can be implanted into everyday objects such as watches, bracelets and cards, and that allows users to update and add new digital services as well as open doors or pay with a simple tap; TaskRunner, a geo-location based ‘help on demand’ platform that allows people to post ads for help with tasks while nearby task runners can bid to be hired to complete those tasks; Beleco, a unique marketplace for furniture rentals with a modern white-glove approach, that allows people to change or rent, rent-to-own or buy their furniture with the utmost ease; &frankly, a continuous tracking application software that helps create happier and productive workspaces by triggering and measuring engagement and surveys between employees and employers in a non-hierarchical manner; and Wunderino; a Malta-based online casino platform started by Swedish entrepreneurs with the goal of taking the traditional pressures associated with gambling away and replacing it with an element of fun and gaming. Empirical data collection consisted of the interviews and observational study of their innovation on their platform or website. The results were interpreted and contextualized within the disruption innovation theory framework. The results of the study reveal that growth hacking is relevant to disruptive tech start-ups, and is becoming increasingly important to them as their companies develop. Additionally the study reveals that growth hacking occurs organically within these start-up structures, already integrated into their marketing and strategy, without a separate or official definition of the practices. Additionally, growth hacking may have initially been seen as lower cost approach to marketing, however the research reveals that it is not lower cost if there isn’t someone who is highly technical on the founding team. Finally, the results reveal that growth hacking is not fully operationalized or defined as growth hacking to the extent of its popularity online and in popular texts, however it does lay on the horizon as a goal for tech start-ups.
74

Unstable Systems or Why Is My Junk So Raw?

Musgrave, David 13 July 2016 (has links)
Unstable Systems or Why Is My Junk So Raw? is an exploration in the raw aesthetics of exposed electronics; showing the complicated systems that make our everyday electronics work using the visual language of formalism to display these “broken” consumer electronics as art. The work in my thesis show explores the creative potential of death and impermanence through the failing of technology. The work in the exhibition combines my interest and childhood fascination in electronics as well as my experience with my father’s illness. Accidentally and intentionally broken TV’s and electronics are producing live glitches which emphasize the instability of these otherwise closed systems.
75

Zabezpečení online aplikací typu klient-server / Security of Online Client-Server Applications

Čapek, Jan January 2018 (has links)
This thesis is dedicated to security of client-server applications running on Windows platform. In the beginning chapters it is possible to find motivation, about why this type of security is important. Following content describes some elements of used architecture and elements of operating system Windows. The core of the work contains techniques and tools used by the attacker and protection against them. In following chapter there is a design and implementation of the security solution based on the previous theory. This solution is then tested against various threats, to verify its effectivity.
76

Bezpečnostní cvičení pro etický hacking / Security exercises for ethical hacking

Paučo, Daniel January 2020 (has links)
This master thesis deals with penetration testing and ethical hacking. Regarding to the layout of the thesis there was prepared appropiate enviroment to realize Red/Blue team exercise, where Red team is in a role of the attacker and Blue team is in a role of defender of the network infrastructure. Whole infrastructure is implemented in a cloud virtual enviroment of VMware vSphere. Second part of the thesis consists of preparation and creation of the exercise to test web application security. Third part of the thesis is dedicating to the automatization of redteaming. Main focus of this master thesis is to demonstrate different attack vectors how to attack the network infrastructure and web applications and use of the defense mechanisms to avoid this kinds of attacks.
77

Living With Things : An open-source approach to the exploration of IoT through speculative design and hacking

Alushi, Nefeli January 2021 (has links)
In the field of human-computer interaction, the majority of domestic IoT and smart devices run on proprietary software that possess limited technical properties and predetermined functionalities. As practices of building, modifying, and making IoT applications grow, this thesis follows an open-source approach to IoT to investigate the relationships of humans and things in a domestic setting. As a result of this material exploration, proprietary frameworks for interactions with smart devices are challenged through speculative scenarios, that include diverse instances of human-things interactions. Thus, a research through design methodology is suggested to support series of experiments, conducted to explore instances of perceived intelligence of these open-source hardware, without the use of advanced computational systems as proprietary devices entail. The suggested process is the creation of a speculative design artifact that combines hacking practices, to support designers in generating insights and to further iterate on possible open-source IoT interactions.
78

A Hacker-Centric Perspective to Empower Cyber Defense

January 2020 (has links)
abstract: Malicious hackers utilize the World Wide Web to share knowledge. Previous work has demonstrated that information mined from online hacking communities can be used as precursors to cyber-attacks. In a threatening scenario, where security alert systems are facing high false positive rates, understanding the people behind cyber incidents can help reduce the risk of attacks. However, the rapidly evolving nature of those communities leads to limitations still largely unexplored, such as: who are the skilled and influential individuals forming those groups, how they self-organize along the lines of technical expertise, how ideas propagate within them, and which internal patterns can signal imminent cyber offensives? In this dissertation, I have studied four key parts of this complex problem set. Initially, I leverage content, social network, and seniority analysis to mine key-hackers on darkweb forums, identifying skilled and influential individuals who are likely to succeed in their cybercriminal goals. Next, as hackers often use Web platforms to advertise and recruit collaborators, I analyze how social influence contributes to user engagement online. On social media, two time constraints are proposed to extend standard influence measures, which increases their correlation with adoption probability and consequently improves hashtag adoption prediction. On darkweb forums, the prediction of where and when hackers will post a message in the near future is accomplished by analyzing their recurrent interactions with other hackers. After that, I demonstrate how vendors of malware and malicious exploits organically form hidden organizations on darkweb marketplaces, obtaining significant consistency across the vendors’ communities extracted using the similarity of their products in different networks. Finally, I predict imminent cyber-attacks correlating malicious hacking activity on darkweb forums with real-world cyber incidents, evidencing how social indicators are crucial for the performance of the proposed model. This research is a hybrid of social network analysis (SNA), machine learning (ML), evolutionary computation (EC), and temporal logic (TL), presenting expressive contributions to empower cyber defense. / Dissertation/Thesis / Doctoral Dissertation Computer Science 2020
79

Was leisten Port-Scanner?

Müller, Thomas 26 April 2000 (has links)
Gemeinsamer Workshop von Universitaetsrechenzentrum und Professur Rechnernetze und verteilte Systeme (Fakultaet fuer Informatik) der TU Chemnitz. Workshop-Thema: Infrastruktur der ¨Digitalen Universitaet¨ Port-Scanner sind Software-Werkzeuge, die benutzt werden, um Informationen über Rechnersysteme im Internet zu ermitteln. Häufig werden solche Werkzeuge von Angreifern benutzt, um verwundbare Rechnersysteme zu finden. Der Vortrag stellt die Leistungsfähigkeit und die verwendeten Techniken von frei verfügbaren Port-Scannern dar. Weiterhin werden Werkzeuge vorgestellt, mit denen Port-Scan-Vorgänge erkannt werden können.
80

Det krypterade närverket EncroChat : En kvalitativ intervjustudie av integritetsförhandlingens inverkan på  kommunikationsvanor

Sundqvist, Ellenor January 2021 (has links)
Den digitala utvecklingen har kommit att omfamna mänsklig kommunikation och vardag i en form som gör att det mesta vi företar oss lämnar spår i form av avläsbara data. I diskursen kring integritet och övervakning omtalas ofta konflikten mellan kommersiella intressen och individens rätt att förvalta och skydda sin data. Under våren 2020 skapade den franska polismyndighetens hacking av den krypterade tjänsten EncroChat stora rubriker i media när det uppdagades EncroChat användes nästan uteslutande av kriminella grupperingar i Europa. Samtidigt våren 2020 antogs en ny lagom dataavläsningslag i Sverige. Den är uppsatsen anlägger ett användarperspektiv som med hjälp av intervjustudier syftar till att belysa de drivkrafter och faktorer som placerat användare på EncroChat. Studien bekräftar den mediala bilden av EncroChat som ett verktyg för att skydda kriminell verksamhet och kommunikation. Resultatet visar också att övervakning har en viss disciplinerande effekt, dock begränsad till en påverkan utav användarens kommunikationsvanor. Studien antyder också att EncroChats fall har påverkat kriminella kontaktnät och affärer negativt, en tes som kan prövas genomframtida studier.

Page generated in 0.037 seconds