• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 8769
  • 2932
  • 1104
  • 1047
  • 1021
  • 682
  • 315
  • 303
  • 277
  • 266
  • 135
  • 128
  • 79
  • 78
  • 75
  • Tagged with
  • 20131
  • 3915
  • 2833
  • 2577
  • 2439
  • 2350
  • 1937
  • 1840
  • 1554
  • 1536
  • 1518
  • 1512
  • 1502
  • 1445
  • 1399
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
111

Workstation design for distributed computing

Wilkes, A. J. January 1984 (has links)
No description available.
112

Wireless Self-Protection System

Fayssal, Samer Nabih January 2008 (has links)
The increased deployment of ubiquitous wireless networks has exponentially increased the complexity to detect wireless network attacks and protect against them. In this research, we investigated the vulnerabilities in wireless networks, developed a comprehensive taxonomy of wireless attacks that has been used to guide our approachto develop, and successfully implement a self-protection wireless system capable of detecting and protecting wireless networks from a wide range of attacks.In the past few years, more security improvements took place, but the network is still vulnerable to complex, dynamic, and knowledgeable attacks; in addition, a large number of last-generation unsecured network cards are still available on the market. This dissertation presents an anomaly-based wireless intrusion detection and response system, which is capable of detecting complex malicious attacks. Our approach is based on multi-channel online monitoring and analysis of wireless network features with respect to multiple observation time windows. These features are related to Data Link Layer framebehaviors and the mobility of stations. We have successfully designed and implemented A Wireless Self Protection System (WSPS) that has the following significant features: it monitors wireless networks, generates network features, tracks wireless-network-state machine violations, generates wireless network flows (WNetFlows) for multiple time windows, and uses the dynamically updated anomaly and misuse rules to detect complex known and unknown wireless attacks and take appropriate proactive actions. To evaluate the performance of WSPS and compare it with other wireless intrusion detection systems, we present an evaluation approach that uses different metrics such as adaptability, scalability, accuracy, overhead, and latency.We validate the WSPS approach by experimenting with normal traffic and more than 20 different types of wireless attacks; and compare the WSPS performance with several well-known intrusion protection systems. Our experimental results show that the WSPS approach can protect from wireless network attacks with an average detection rate of 99.13% for all the experimented attacks.
113

The impact of the M4 on residential location in the Reading sub-region : The application of a disaggregated residential location model

Cater, E. January 1981 (has links)
No description available.
114

Identifying upland channel network dynamics over decadal and century timescales

Mousouridis, Antonios January 2001 (has links)
No description available.
115

Modern heuristics applied to selective combinatorial routing problems

Williams, Robert Charles January 1995 (has links)
No description available.
116

Implementation of Ethernet in broadband cable networks

Poon, F. S. January 1987 (has links)
No description available.
117

Transport and regional development in Bangladesh : a geographical study

Raihan Sharif, A. H. M. January 1988 (has links)
No description available.
118

Temporal logic specification and verification of communication protocols

Jin, S. January 1987 (has links)
No description available.
119

Regrowth of bacteria and their genotypic identification in drinking water in Lebanon

Tokajian, Sima Toros January 2002 (has links)
No description available.
120

Ethernet/Token-ring bridge design

Golbahar Haghighi, Shapour January 1990 (has links)
No description available.

Page generated in 0.0427 seconds