• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 34
  • 16
  • 4
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 76
  • 76
  • 36
  • 21
  • 19
  • 17
  • 15
  • 14
  • 10
  • 10
  • 10
  • 8
  • 7
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Spatio-Temporal Analysis of Urban Data and its Application for Smart Cities

Gupta, Prakriti 11 August 2017 (has links)
With the advent of smart sensor devices and Internet of Things (IoT) in the rapid urbanizing cities, data is being generated, collected and analyzed to solve urban problems in the areas of transportation, epidemiology, emergency management, economics, and sustainability etc. The work in this area basically involves analyzing one or more types of data to identify and characterize their impact on other urban phenomena like traffic speed and ride-sharing, spread of diseases, emergency evacuation, share market and electricity demand etc. In this work, we perform spatio-temporal analysis of various urban datasets collected from different urban application areas. We start with presenting a framework for predicting traffic demand around a location of interest and explain how it can be used to analyze other urban activities. We use a similar method to characterize and analyze spatio-temporal criminal activity in an urban city. At the end, we analyze the impact of nearby traffic volume on the electric vehicle charging demand at a charging station. / Master of Science
32

A lightweight framework to build honeytanks

Vanderavero, Nicolas 18 December 2007 (has links)
As the Internet becomes an ubiquitous medium of communication, it carries more and more malicious activities like spam, worms or denial of service attacks. One solution to detect and collect such malicious traffic is to use honeypots. They are devices or pieces of information that are not part of the usual production system. Their goals are to lure the attackers into a trap to study them, divert their attention from another target or collect statistics. In this work, we propose a lightweight framework to build honeytanks, which are very efficient low-interaction honeypots. We present and evaluate techniques and algorithms to simulate the presence of a large number of hosts with various degrees of realism and scalability, from a completely stateless approach to a stateful approach able, amongst other things, to mimic the behavior of various TCP/IP stacks. Our framework is based on ASAX, a generic and lightweight data stream analyzer. We instantiate ASAX to build powerful traffic handlers. We introduce several extensions to ASAX and to RUSSEL, its programming language. These extensions allow us to develop new concurrent programming techniques to simulate hosts and protocols in a simple and modular way. We use a recently optimized version of ASAX that makes it possible to simulate tens of thousands hosts while keeping the simulation at a high level of realism. To show the benefits of our approach, i.e., greater simplicity, flexibility, and independence of other technologies, we compare our honeytanks to Honeyd and Nepenthes, two well-known low-interaction honeypots.
33

Discretized Categorization Of High Level Traffic Activites In Tunnels Using Attribute Grammars

Buyukozcu, Demirhan 01 October 2012 (has links) (PDF)
This work focuses on a cognitive science inspired solution to an event detection problem in a video domain. The thesis raises the question whether video sequences that are taken in highway tunnels can be used to create meaningful data in terms of symbolic representation, and whether these symbolic representations can be used as sequences to be parsed by attribute grammars into abnormal and normal events. The main motivation of the research was to develop a novel algorithm that parses sequences of primitive events created by the image processing algorithms. The domain of the research is video detection and the special application purpose is for highway tunnels, which are critical places for abnormality detection. The method used is attribute grammars to parse the sequences. The symbolic sequences are created from a cascade of image processing algorithms such as / background subtracting, shadow reduction and object tracking. The system parses the sequences and creates alarms if a car stops, moves backwards, changes lanes, or if a person walks into the road or is in the vicinity when a car is moving along the road. These critical situations are detected using Earley&rsquo / s parser, and the system achieves real-time performance while processing the video input. This approach substantially lowers the number of false alarms created by the lower level image processing algorithms by preserving the number of detected events at a maximum. The system also achieves a high compression rate from primitive events while keeping the lost information at minimum. The output of the algorithm is measured against SVM and observed to be performing better in terms of detection and false alarm performance.
34

Real-time analysis of aggregate network traffic for anomaly detection

Kim, Seong Soo 29 August 2005 (has links)
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. If efficient analysis tools were available, it could become possible to detect the attacks, anomalies and to appropriately take action to contain the attacks before they have had time to propagate across the network. In this dissertation, we suggest a technique for traffic anomaly detection based on analyzing the correlation of destination IP addresses and distribution of image-based signal in postmortem and real-time, by passively monitoring packet headers of traffic. This address correlation data are transformed using discrete wavelet transform for effective detection of anomalies through statistical analysis. Results from trace-driven evaluation suggest that the proposed approach could provide an effective means of detecting anomalies close to the source. We present a multidimensional indicator using the correlation of port numbers as a means of detecting anomalies. We also present a network measurement approach that can simultaneously detect, identify and visualize attacks and anomalous traffic in real-time. We propose to represent samples of network packet header data as frames or images. With such a formulation, a series of samples can be seen as a sequence of frames or video. Thisenables techniques from image processing and video compression such as DCT to be applied to the packet header data to reveal interesting properties of traffic. We show that ??scene change analysis?? can reveal sudden changes in traffic behavior or anomalies. We show that ??motion prediction?? techniques can be employed to understand the patterns of some of the attacks. We show that it may be feasible to represent multiple pieces of data as different colors of an image enabling a uniform treatment of multidimensional packet header data. Measurement-based techniques for analyzing network traffic treat traffic volume and traffic header data as signals or images in order to make the analysis feasible. In this dissertation, we propose an approach based on the classical Neyman-Pearson Test employed in signal detection theory to evaluate these different strategies. We use both of analytical models and trace-driven experiments for comparing the performance of different strategies. Our evaluations on real traces reveal differences in the effectiveness of different traffic header data as potential signals for traffic analysis in terms of their detection rates and false alarm rates. Our results show that address distributions and number of flows are better signals than traffic volume for anomaly detection. Our results also show that sometimes statistical techniques can be more effective than the NP-test when the attack patterns change over time.
35

Rekonstrukce 3D informací o automobilech z průjezdů před dohledovou kamerou / Reconstruction of 3D Information about Vehicles Passing in front of a Surveillance Camera

Dobeš, Petr January 2017 (has links)
This master's thesis focuses on 3D reconstruction of vehicles passing in front of a traffic surveillance camera. Calibration process of surveillance camera is first introduced and the relation of automatic calibration with 3D information about observed traffic is described. Furthermore, Structure from Motion, SLAM, and optical flow algorithms are presented. A set of experiments with feature matching and the Structure from Motion algorithm is carried out to examine results on images of passing vehicles. Afterwards, the Structure from Motion pipeline is modified. Instead of using SIFT features, DeepMatching algorithm is utilized to obtain quasi-dense point correspondences for the subsequent reconstruction phase. Afterwards, reconstructed models are refined by applying additional constraints specific to the vehicle reconstruction task. The resultant models are then evaluated. Lastly, observations and acquired information about the process of vehicle reconstruction are utilized to form proposals for prospective design of an entirely custom pipeline that would be specialized for 3D reconstruction of passing vehicles.
36

Optimalizace webových stránek a strategie prodeje / Optimalization of Web Pages and Strategy of Selling

Úradníček, Lukáš January 2011 (has links)
The thesis deals with the optimization of website of thai massage studio. This work includes evaluation of the initial state, a proposed amendment, keyword analysis, optimization of texts and support through building backlinks. Evaluation of success is done through the analysis of traffic and tracking the position of the primary keywords on major search engines in the Czech Republic - Google.cz and Seznam.cz.
37

Providing Location Privacy to Base Station in Wireless Sensor Networks

Gottumukkala, Venkata Praneeth Varma January 2012 (has links)
No description available.
38

Virtual Reality over the Internet : An experimental study of common countermeasures when using VR applications over the Internet / Virtual Reality över Internet : En experimentell studie över vanliga motåtgärder vid användandet av VR applikationer över Internet

Wetterström, Max, Rönn, Patric January 2023 (has links)
Currently, there is a lack of research behind the security of Virtual Reality against fingerprinting attacks and how these affect the Quality of Experience (QoE) and Quality of Service (QoS) for a user. With practical testing in a game which implements traffic shaping methods as security defences, this thesis aims to take the first step towards changing this. Here, tests were made testing QoS and QoE of countermeasures in a VR game using the game-engine Unity. The countermeasures utilized were random padding, random delays and VPNs. The conclusion reached was that using a delay had a significant impact on QoE, creating a high Round-Trip Time, while changing the packet size had minimal impact to both QoE and QoS. Additionally, utilizing a VPN yielded a minimal impact to both the QoE and QoS.
39

Network Traffic Analysis and Anomaly Detection : A Comparative Case Study

Babu, Rona January 2022 (has links)
Computer security is to protect the data inside the computer, relay the information, expose the information, or reduce the level of security to some extent. The communication contents are the main target of any malicious intent to interrupt one or more of the three aspects of the information security triad (confidentiality, integrity, and availability). This thesis aims to provide a comprehensive idea of network traffic analysis, various anomaly or intrusion detection systems, the tools used for it, and finally, a comparison of two Network Traffic Analysis (NTA) tools available in the market: Splunk and Security Onion and comparing their finding to analyse their feasibility and efficiency on Anomaly detection. Splunk and Security Onion were found to be different in the method of monitoring, User Interface (UI), and the observations noted. Further scope for future works is also suggested from the conclusions made.
40

Reversibla 2+1-fält på motortrafikled Utvärdering av restidseffekter för Värmdöpendlare : Utvärdering av restidseffekter för Värmdöpendlare / Reversible 2+1 lanes on motorways : Evaluation of travel time effects for Värmdö commuter.

JOHANSSON, JOSEFIN January 2023 (has links)
Värmdö is a commuter municipality to Stockholm. Road 222 between Värmdö and Stockholm is the main commuter route for both bus and car traffic. Road 222 is a bottleneck at Farstabron in the direction towards Värmdö, where the motorway will go from two to one lane and become a non-meeting motorway. Towards Stockholm, the bridge has two lanes, which is why capacity is not affected as strongly in that direction. The accessibility problems arise mainly in the direction of Värmdö during maximum hours in the afternoon and during weekends and summer time as the municipality also has many holiday homes. Measures to improve accessibility have been raised by both the municipality and the Swedish Transport Administration. Building a new bridge is not relevant as the remaining expected technical life of the bridge is long. The Swedish Transport Administration has an idea for a reversible lane solution on the bridge, which is the proposal studied in this thesis. Data collection and traffic analysis has been performed to study how the travel time effect would be if Farstabron was rebuilt into a reversible 2 + 1 road, with or without a reversible bus lane. The tool used is the microsimulation program PTV VISSIM. The results show that a reversible solution without a bus lane is the alternative that provides by far the largest travel time gains for both car and bus in 2040. The degree project contains a chapter that deals with traffic engineering theory and traffic simulation theory as well as a literature study chapter that summarizes the knowledge about reversible lanes. The information about reversible lanes, even international studies, is poor.Experiences of reversible lanes is good and is mainly to be recommended as the flow in one direction is significantly greater than in the other. The traffic safety risk is primarily linked to unprotected road users. The most common internationally according to what has been identified is to implement reversible lanes on motorways with protective barriers. However, no reversible lane without a barrier have been identified holding 80km/h. Studies have shown that reversible lanes could have a cost-benefit ratio of around 7, which means that the benefit outweighed the costs 7 times in money measured. The weaving dynamics of VISSIM from two to one lane were challenging to calibrate against the reality. Preparatory behavior during lane changes is mainly affected by car-following and lane-changing models in VISSIM. In the simulation the correlation with collected data was slightly more accurate with the car following model for W99 (freeway) rather than W74 (weaving urban rd).

Page generated in 0.0666 seconds