• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 24
  • 4
  • 2
  • 1
  • Tagged with
  • 33
  • 17
  • 9
  • 8
  • 8
  • 7
  • 7
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Project assessment procedure for the PATRIOT Power Plant using the analytic hierarchy process /

Badr, Mazen Younes. January 1994 (has links)
Report (M.S.)--Virginia Polytechnic Institute and State University, 1994. / Abstract. Includes bibliographical references (leaf 53). Also available via the Internet.
2

The Effect of Football Scholarships on Institutional Outcomes

Heyman, Davis John 13 April 2022 (has links)
No description available.
3

Nytt luftvärnssystem för Sverige : Patriot eller Aster SAMP/T?

Wannehag, Jim January 2017 (has links)
Till följd av Försvarsmaktens tidigare inriktning mot insatsförsvar och den strategiska time-out som präglade början av 2000-talet förfogar luftvärnet idag över luftvärnssystem som är flera decennier gamla. Systemen är inte dimensionerade för att möta dagens högteknologiska motståndare och regeringen har därför beslutat att en ersättare till Robotsystem 97 skall vara på plats senast 2020. Valet står mellan Patriot och Aster SAMP/T, syftet med detta arbete är därför att undersöka och bedöma den militära effektiviteten för respektive luftvärnssystem. Undersökningen baseras på en komparativ analys där luftvärnssystemen jämförs utifrån ett scenario med tillhörande händelseförlopp och kravställningar. Slutligen sammanställs och presenteras resultatet i en multimålmodell för att på ett kvantitativt sätt kunna mäta skillnaderna mellan systemen. Resultatet visar på att Aster SAMP/T har störst potential att vara effektivt i en given kontext men att Patriot också uppfyller de krav som ställs nästintill utan begränsning. Då jämförelsen grundar sig på ett begränsat scenario med specifika förutsättningar är det viktigt att ha i beaktande att resultatet endast har validitet mot det scenario och kravställningar som luftvärnssystemen jämförts utifrån. / As a result of the Swedish Armed Forces previous focus on international operations and strategic timeout in the beginning of the 21st century, the air defense today has surface-to-air missile systems that are several decades old. The systems are not designed to handle today’s high-tech opponent and the government has therefore decided that a replacement for MIM-23 HAWK must be in place by 2020. The choice stands between Patriot and Aster SAMP/T, the purpose of this paper is therefore to investigate and assess the military effectiveness of each surface-to-air missile system. The survey is based on a comparative analysis where the systems are compared to each other in a scenario which includes several events and requirements. Finally, the results are compiled and presented in a multi-goal-model to quantitatively measure the differences between the systems. The result shows that Aster SAMP/T has the greatest potential of being effective in a given context, but that Patriot also meets the requirements almost without any limitations. As the comparison is based on a particularly limited scenario with very specified conditions, it is important to take into account that the result is valid only against the scenario and requirements from which the systems are compared.
4

Penetration testing of current smart thermostats : Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat / Penetrationstestning av aktuella smarta termostater : Hotmodellering och säkerhetbedömning av Shelly TRV och Meross Smart Termostat

Lindberg, Adam January 2023 (has links)
As smart homes become increasingly common and concerns over Internet of Things (IoT) security grow, this study delves into the vulnerabilities of smart thermostats. These devices offer convenience but also comes with increased risk of cyber attacks. This study evaluates the susceptibility of the Shelly Thermostatic Radiator Valve (TRV) and the Meross Smart Thermostat to potential threats across various attack vectors – encompassing firmware, network, radio, and cloud – through penetration testing guided by the PatrIoT methodology. Findings reveal four unknown vulnerabilities in the Meross Smart Thermostat and two in the Shelly TRV. These vulnerabilities consist of insecure firmware updates, lack of network encryption, exploitable radio communication, and cloud-related gaps. Recommendations aiming at mitigating the found vulnerabilities include implementing secure Wi-Fi access points for both models during setup, and ensuring strong encryption for the Meross Smart Thermostat’s radio communication. The study contributes to an increased awareness of potential security risks associated with these devices, though the extent of vulnerabilities across all smart thermostat models cannot be definitively concluded. / I takt med att smarta hem blir allt vanligare och med växande medvetenhet om säkerhet för Internet of Things (IoT), undersöker denna studie potentiella sårbarheter hos smarta termostater. Dessa enheter förenklar användares vardag, men ger också upphov till nya cyberhot. Denna studie granskar Shelly TRV och Meross Smart Thermostat för potentiella hot inom attackvektorerna firmware, nätverk, radio och moln, genom penetreringstestning som vägleds av PatrIoT-metodiken. Resultatet är fyra upptäckta sårbarheter i Meross-modellen och två i Shelly Thermostatic Radiator Valve (TRV) inklusive osäkra firmware-uppdateringar, brist på nätverkskryptering, utnyttjbar radiokommunikation och molnrelaterade problem. Rekommendationer med syfte att mitigera de upptäckta sårbarheterna inkluderar att implementera säkra Wi-Fi-åtkomstpunkter för båda modellerna under installationen och att säkerställa stark kryptering för Meross Smart Thermostat:s radiokommunikationen. Studien bidrar till en ökad medvetenhet om potentiella säkerhetsrisker som är förknippade med dessa enheter, även om det inte kan fastställas hur vanligt det är med sårbarheter i smarta termostater
5

Security analysis of a modern smart camera / Säkerhetsanalys av en smart kamera

Johannesson, Simon, Pettersson, Victor January 2022 (has links)
IoT devices have historically lacked in the security standards but at the same time it is a continuously growing market it is important that the security analyzes continue in order to evaluate the development of the security in the IoT industry. This research is a security analysis of the Deltaco SH-IPC05 WIFI Camera, it is an inexpensive device that can be accessed through a mobile application from anywhere on the internet via the cloud. It follows the Practical and Agile Threat Research for IoT (PatrIoT) methodology and is delimited to network traffic and the software of the device. Due to legal limitations the cloud is not included in the analysis and the hardware security is not included due to time constraints. The device was found to use default credentials for its Open Network Video Interface Forum (ONVIF) service, but it is easy for a user to change the default password from the mobile application if the user can guess what the default password is, and the service is not enabled by default. Three DoS attacks were identified to be effective, two of which caused the device to crash and reboot and the third one prevented the camera from responding until the attack ended. One of the attacks that consistently crashed the camera, could keep crashing the camera repeatedly thus keeping it offline. When analyzing the network traffic, it was possible to consistently detect the packets that notified users of motion or sound detection by looking for specific TCP packet sizes and ports. Although some issues were found the device appeared to be generally secure with encrypted network traffic and minimally exposed services. / Bland IoT-enheter har säkerheten historiskt sett ofta varit eftersatt men det är samtidigt en ständigt växande marknad, därför är det viktigt att säkerhetsanalyserna fortsätter för att utvärdera utvecklingen av säkerheten inom IoT industrin. Denna rapport är resultatet av en säkerhetsanalys av Deltaco SH-IPC05 WIFI Camera, det är en billig enhet som kan nås genom en mobilapplikation via molnet. Den följer metodiken för Practical and Agile Threat Research for IoT (PatrIoT) och är avgränsad till nätverkstrafik och enhetens programvara. På grund av juridiska begränsningar ingår det inte att analysera molnet och hårdvara ingår inte på grund av tidsbrist. Enheten visade sig använda standardlösenord för sin ONVIF-tjänst men tjänsten måste aktiveras av användaren och det är möjligt att ändra lösenordet via mobilapplikationen om användaren kan gissa sig till standardlösenordet. Enheten var mottaglig för tre olika DoS-attacker. Två av dem fick kameran att krasha och starta om varav en av dem kunde återupprepas för att hålla enheten offline så länge som önskades. Det var möjligt att identifiera de paket som skickades från kameran när den skulle notifiera användare om upptäckta rörelser eller ljud. Även om vissa problem hittades verkade enheten vara säker i allmänhet med krypterad nätverkstrafik och minimalt exponerade tjänster.
6

Etisk hackning av en smart kattlucka : Sårbarhetstestning av en smart kattlucka / Ethical hacking of a smart cat flap : Vulnerability testing of a smart cat flap

Kastrati, Adrian January 2024 (has links)
Många hem köper produkter som är internetuppkopplade, sakernas internet (IoT), det gäller allt från lampor till kattluckor. Detta öppnar upp för möjligheten att styra sitt hem på nya sätt men det medför nya hot mot hem och samhället. Detta är ett kritiskt problem för många företag, särskilt på IoT-marknaden där det finns incitament som driver låga kostnader och snabb marknadsintroduktion. Litteratstudien visade en brist på tydliga värderingar av investeringar och att även om produktivitet påverkas negativt och förlänger tiden från idé till marknad undviks framtida svårigheter vid lyckade cybersäkerhethetsåtgärder. Trots de betydande hoten kan många företag välja att acceptera risken för cyberattacker på grund av att kostnader vid säkerhetsbrister inte alltid hamnar hos dem.Sårbarhetstestningsmetoden PatrIoT följdes för att grundligt testa IoT-produkten Microchip Cat Flap Connect. Attacker som utfördes var bland annat ping-flooding och MiTM. Produkten visade sig vara säker och vanliga svagheter som öppna nät- verkstjänster och avsaknad av kryptering var frånvarande. Produkten visade sig vara sårbar mot överflödesattacker (DoS) i form av ping-flooding. Med det går det att säga att produkten följer ett flertal principer för utveckling mot säker IoT men servern som används för webbapplikationen bör implementera krav på att endast lita på certifikat av betrodda certifikatutfärdare. / Many households purchase internet-connected products, Internet of Things (IoT), which includes everything from lamps to cat flaps. This opens new ways and possibilities of controlling one's home, but it brings new threats to home and society. This is a critical issue for many companies, especially in the IoT market where there are incentives that drive low costs and quick time to market. The literature study showed a lack of clear valuations of investments and that even if productivity is negatively affected and the time from idea to market is extended, future difficulties are avoided with successful cyber security measures. Despite the significant threats, many companies may choose to accept the risk of cyber-attacks because the costs of security breaches do not always end up with them.The PatrIoT vulnerability testing methodology was followed to thoroughly test the IoT product Microchip Cat Flap Connect. The product proved to be secure and common weaknesses, such as open network services and lack of proper implementation of encryption, could not be identified. The product was found to be vulnerable to denial-of-service (DoS) attacks in the form of ping-flooding. With that, it can be said that the product follows several principles for development towards secure IoT, but the server used for the web application should implement requirements to only trust certificates from trusted certificate authorities.
7

The USA PATRIOT Act and Punctuated Equilibrium

Sanders, Michael 01 January 2016 (has links)
Currently, Title II of the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT Act) Act of 2001 appears to be stalled as a result of controversy over the intent and meaning of the law. Proponents of the title advocate the necessity of the act to combat modern terrorism, whereas opponents warn of circumventions of the Fourth Amendment of the U.S. Constitution. Using punctuated equilibrium as the theoretical foundation, the purpose of this case study was to explore the dialogue and legal exchanges between the American Civil Liberties Union and the Department of Justice related to the National Security Agency's metadata collection program. In specific, the study sought to explore the nature of resistance to changes needed to mollify the controversies associated with Title II. Data for this study were acquired through publicly available documents and artifacts including transcripts of Congressional hearings, legal documents, and briefing statements from the US Department of Justice and the American Civil Liberties Union. These data were deductively coded according to the elements of PET and then subjected to thematic analysis. Findings indicate that supporters and opponents of the law are locked in a consistent ideological polarization, with supporters of the law touting the necessity of the authorizations in combatting terrorism and opponents arguing the law violates civil liberties. Neither side of the debate displayed a willingness to compromise or acknowledge the legitimacy of the other viewpoint. Legislators who accept the legitimacy of both researched viewpoints could create positive social change by refining the law to meet national security needs while preserving constitutional protections.
8

The USA Patriot Act : - en analys av debatten om frihet

Bohman, Tina January 2008 (has links)
<p><p>This thesis takes a closer look at the USA Patriot Act and the literary debate that has followed the passing of that Act. The aim of the thesis is to define what freedom is for the two opposing sides using McCallum's freedom model.</p><p>The literary analysis shows that the most common argument from authors who are pro Act is that in desperate times like these one must relinquish a part of the individual's freedom to ensure the safety of the collective. Amongst those authors who are against the Act concerns are raised for the possibilities of abuse as a result of increased government power such as the ability to detain immigrants for long periods of time, surveillance and increased exchange of information between federal agencies.</p></p>
9

Americas Act of Patriotism : The Challenge of Balancing Freedom and Security

Karlsson, Henrik January 2007 (has links)
<p>In the debate generated by the authorization and reauthorization of the Patriot act we can find a wide range of opinions and ideas concerning the balance of freedom and security, and how that might affect the society. The government (the creators of the law) advocates the necessity of the Patriot act and its structural changes to secure the freedoms of USA. While opposing views suggest that these changes affect the balance of freedom and security in such a way that it might affect the way of life and be a threat to the civil liberties of the citizens. The aim of this thesis is to investigate how the debate reflects how the Patriot act may have affected the balance between the various practices of freedoms and national security in USA.</p><p>This thesis investigates three aspects of the debate that concerns the Patriot act. The rhetoric’s used in the debate by both sides show some difference in the rationales of the debating sides. Some controversial aspects of the law undermine the safeguards that are suppose to protect the civil liberties and freedoms when their definitions are opened up for a wide arrange of interpretations. The third part of the thesis investigates the big brother mentality that is being fostered and culture of preparedness of all the nation’s dimensions and systems that is asked for in order to adapt to these systematic changes of their society that the law provides.</p><p>The investigation of the debate conclude that state apparatus takes on a role of coordinative micromanaging, which together with the culture of preparedness fosters the nation to always be on its toes. As a result of these changes the practices of freedom and the democratic values they nourish are being destabilized and undermined in the climate of fear that is being established.</p>
10

Patting Down the Burn Bag: The Declassification of Impressive Mastermind

January 2011 (has links)
abstract: This thesis, Impressive Mastermind, examines notions of privacy and the law, particularly with regard to the USA Patriot Act implemented following the events of 9/11. The author/artist believes that numerous freedoms related to personal privacy, especially those rights protected by the Fourth Amendment, were diminished in order to ostensibly seek out potential terrorists. Through the vehicle of a theatrical dance performance, Impressive Mastermind investigates these privacy issues on a public and personal level and also asks the audience to question their own views on government policies regarding personal privacy, including illegal search and seizure. Drawing on the previous work of other intervention artists, this thesis explores the realm of public intervention. Moving away from the usual spectacle of traditional theater, this multi-dimensional piece explores an experiential examination of how the public relates to what is real and what is considered performative. / Dissertation/Thesis / M.F.A. Dance 2011

Page generated in 0.0381 seconds