• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 423
  • 94
  • 76
  • 59
  • 37
  • 36
  • 12
  • 8
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • Tagged with
  • 954
  • 238
  • 174
  • 130
  • 106
  • 102
  • 101
  • 88
  • 86
  • 82
  • 76
  • 76
  • 75
  • 67
  • 66
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Attaque par canaux auxillaires multivariées, multi-cibles et d'ordre élevé / Multivariate multitarget high order side-channel attacks

Bruneau, Nicolas 18 May 2017 (has links)
Les analyses par canaux auxiliaires exploitent les fuites physiques des systèmes embarqués. Ces attaques représentent une réelle menace; c’est pourquoi différentes contre-mesures ont été développées. Cette thèse s’intéresse à la sécurité fournie par ces contre-mesures. Nous étudions leur sécurité dans le contexte où de multiples fuites sont présentes. Il arrive que plusieurs fuites de plusieurs variables puissent être exploitées lors d’analyses par canaux auxiliaires. Dans cette thèse nous présentons la méthode optimale pour exploiter les fuites d’une unique variable. Nous étudions ensuite comment de telles méthodes de réduction de dimensionnalité peuvent être appliquées dans le cas d’implémentations protégées. Nous montrons que ces méthodes voient leur efficacité augmentée avec le niveau de sécurité de l’implémentation. Nous montrons dans cette thèse comment exploiter les fuites de multiples variables pour améliorer les résultats d’analyses par canaux auxiliaires. Nous améliorons en particulier les attaques contre les schémas de masquage avec recalcul de table. Dans ce contexte nous présentons l’attaque optimale. Dans le cas où les schémas avec recalcul de table sont protégés nous montrons que le principal paramètre pour évaluer la sécurité des schémas de masquage, c’est-à-dire l’ordre n’est pas suffisant. Pour finir nous étudions de façon théorique la meilleure attaque possible en présence de masquage et de « shuffling » ce qui généralise le précédent cas d’étude. Dans ce cas nous montrons que l’attaque optimale n’est pas calculable. Pour y remédier, nous présentons une version tronquée de l’attaque optimale avec une meilleure efficacité calculatoire. / Side Channel Attacks are a classical threat against cryptographic algorithms in embedded systems. They aim at exploiting the physical leakages unintentionally emitted by the devices during the execution of their embedded programs to recover sensitive data. As such attacks represent a real threat against embedded systems different countermeasures have been developed. In thesis we investigate their security in presence of multiple leakages. Indeed there often are in the leakage measurements several variables which can be exploited to mount Side Channel Attacks. In particular we show in this thesis the optimal way to exploit multiple leakages of a unique variable. This dimensionality reduction comes with no loss on the overall exploitable information. Based on this result we investigate further how such dimensionality reduction methodscan be applied in the case of protected implementations. We show that the impact of such methods increases with the security “level” of the implementation. We also investigate how to exploit the leakages of multiplevariables in order to improve the results of Side Channel Analysis. We start by improving the attacks against masking schemes, with a precomputed table recomputation step. Some protections have been developed to protect such schemes. As a consequence we investigate the security provided by these protections. In this context we present results which show that the main parameter to evaluate the security of the masking schemes is not sufficient to estimate the global security of the implementation. Finally we show that in the context of masking scheme with shuffling the optimal attack is not computable. As a consequence we present a truncated version of this attack with a better effectiveness.
32

Cyber Attack Modelling using Threat Intelligence. An investigation into the use of threat intelligence to model cyber-attacks based on elasticsearch and honeypot data analysis

Al-Mohannadi, Hamad January 2019 (has links)
Cyber-attacks have become an increasing threat to organisations as well as the wider public. This has led to greatly negative impacts on the economy at large and on the everyday lives of people. Every successful cyber attack on targeted devices and networks highlights the weaknesses within the defense mechanisms responsible for securing them. Gaining a thorough understanding of cyber threats beforehand is therefore essential to prevent potential attacks in the future. Numerous efforts have been made to avoid cyber-attacks and protect the valuable assets of an organisation. However, the most recent cyber-attacks have exhibited the profound levels of sophistication and intelligence of the attacker, and have shown conven- tional attack detection mechanisms to fail in several attack situations. Several researchers have highlighted this issue previously, along with the challenges faced by alternative solu- tions. There is clearly an unprecedented need for a solution that takes a proactive approach to understanding potential cyber threats in real-time situations. This thesis proposes a progressive and multi-aspect solution comprising of cyber-attack modeling for the purpose of cyber threat intelligence. The proposed model emphasises on approaches from organisations to understand and predict future cyber-attacks by collecting and analysing network events to identify attacker activity. This could then be used to understand the nature of an attack to build a threat intelligence framework. However, collecting and analysing live data from a production system can be challenging and even dangerous as it may lead the system to be more vulnerable. The solution detailed in this thesis deployed cloud-based honeypot technology, which is well-known for mimicking the real system while collecting actual data, to see network activity and help avoid potential attacks in near real-time. In this thesis, we have suggested a new threat intelligence technique by analysing attack data collected using cloud-based web services in order to identify attack artefacts and support active threat intelligence. This model was evaluated through experiments specifically designed using elastic stack technologies. The experiments were designed to assess the identification and prediction capability of the threat intelligence system for several different attack cases. The proposed cyber threat intelligence and modeling systems showed significant potential to detect future cyber-attacks in real-time. / Government of Qatar
33

Wide spectrum attribution : using deception for attribution intelligence in cyber attacks

Nicholson, Andrew January 2015 (has links)
Modern cyber attacks have evolved considerably. The skill level required to conduct a cyber attack is low. Computing power is cheap, targets are diverse and plentiful. Point-and-click crimeware kits are widely circulated in the underground economy, while source code for sophisticated malware such as Stuxnet is available for all to download and repurpose. Despite decades of research into defensive techniques, such as firewalls, intrusion detection systems, anti-virus, code auditing, etc, the quantity of successful cyber attacks continues to increase, as does the number of vulnerabilities identified. Measures to identify perpetrators, known as attribution, have existed for as long as there have been cyber attacks. The most actively researched technical attribution techniques involve the marking and logging of network packets. These techniques are performed by network devices along the packet journey, which most often requires modification of existing router hardware and/or software, or the inclusion of additional devices. These modifications require wide-scale infrastructure changes that are not only complex and costly, but invoke legal, ethical and governance issues. The usefulness of these techniques is also often questioned, as attack actors use multiple stepping stones, often innocent systems that have been compromised, to mask the true source. As such, this thesis identifies that no publicly known previous work has been deployed on a wide-scale basis in the Internet infrastructure. This research investigates the use of an often overlooked tool for attribution: cyber de- ception. The main contribution of this work is a significant advancement in the field of deception and honeypots as technical attribution techniques. Specifically, the design and implementation of two novel honeypot approaches; i) Deception Inside Credential Engine (DICE), that uses policy and honeytokens to identify adversaries returning from different origins and ii) Adaptive Honeynet Framework (AHFW), an introspection and adaptive honeynet framework that uses actor-dependent triggers to modify the honeynet envi- ronment, to engage the adversary, increasing the quantity and diversity of interactions. The two approaches are based on a systematic review of the technical attribution litera- ture that was used to derive a set of requirements for honeypots as technical attribution techniques. Both approaches lead the way for further research in this field.
34

A Model for Cyber Attack Risks in Telemetry Networks

Shourabi, Neda Bazyar 10 1900 (has links)
ITC/USA 2015 Conference Proceedings / The Fifty-First Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2015 / Bally's Hotel & Convention Center, Las Vegas, NV / This paper develops a method for analyzing, modeling and simulating cyber threats in a networked telemetry environment as part of a risk management model. The paper includes an approach for incorporating a Monte Carlo computer simulation of this modeling with sample results.
35

An investigation of fore-body aerodynamics during the velocity vector roll

Tait, Sean William January 1999 (has links)
No description available.
36

Erosion of refractories : mechanisms for dissolution of graphite by iron-carbon melts

Jonker-Brash, Robina Ann January 1995 (has links)
No description available.
37

Porovnání způsobů založení útoku ve fotbale v českých a vybraných evropských fotbalových soutěžích / Establishment of attack in football: comparison of the top Czech and selected European leagues

Sacha, Ivan January 2015 (has links)
This diploma thesis deals with the attack phase of the game in football. Specifically, it deals with complex analysis of successful attacks (ending with a goal) - covering everything from attack inception till the goal. We have observed attacks in three foreign national competitions and compared them with Czech first league. The work deals with both technical and tactical aspects of the offensive game systems. The theoretical part is focused on identification and explanation of the basic concepts of the game and its national and international organization - based on the current expert sources. In particular, it focuses on different elements of the game that are most important for the attack phase. The research part deals with attack game systems and its specifics in practice. Based on video recordings, we have analyzed matches from Czech, Spanish, German and English top leagues. The thesis than compares the efficacy and frequency of use of individual offensive game systems. It also focuses on situations that most immediately precede the establishment of individual successful attacks and evaluates gaming positions, which were the most often present in an attack establishment or termination and finally examines game activities used. The knowledge gained in this work should serve coaches, players and...
38

Delivering Stem Cells to the Heart

Fakharzadeh, Michael 03 May 2010 (has links)
Myocardial infarction is a prominent medical problem in the world today. Current treatments are limited and do not strive to regenerate the myocardial tissue that is lost post-infarction. Human mesenchymal stem cells (hMSCs) have been shown to improve cardiac function when implanted post-infarction. The effectiveness of stem cell therapy largely depends on the delivery method. Current delivery methods are insufficient due to their low cell engraftment rate and inability to target the endocardium, where most myocardial infarctions occur. Biological microthreads are a promising new local cell delivery method that may improve upon these current limitations. We hypothesize that biological microthreads will increase efficiency of hMSC delivery to the beating rat heart compared to intramyocardial injection. To test our hypothesis we seeded biological microthreads in vitro with 100 ìL of cell suspension (100,000 hMSCs). After one day, an average of 11,806 ± 3,932 hMSCs were counted on the biological microthreads. The biological microthreads were attached to suture needles to allow targeted delivery to the rat heart (in the left ventricular wall). Human mesenchymal stem cells were loaded with quantum dots prior to seeding the biological microthread bundles or delivery to the rat heart via injection. For intramyocardial injection, a cell suspension containing 10,000 hMSCs (35 ìL) was injected into the myocardial wall using a 100 ìL syringe. The delivery efficiency of each method was determined by sectioning the heart into 8 µm thick sections and analyzing three sections every sixty sections (24 µm every 480 µm) for quantum dot loaded hMSCs. These sections were stained with Hoechst dye and quantum dot loaded cells in the heart sections were manually counted. The delivery efficiency of each biological microthread implantation was calculated by dividing the number of counted quantum dot loaded hMSCs in the heart wall by the average number of hMSCs on the biological microthread bundles (normalized to the length that was implanted in the heart wall) after 24 hours. The delivery efficiency of intramyocardial injection was calculated by dividing the number of counted quantum dot loaded hMSCs in the heart wall by 10,000 (the number of cells injected). Biological microthread mediated hMSC delivery had a significantly higher delivery efficiency (66.6 ± 11.1%) compared to intramyocardial injection (11.8 ± 6.25%) after 1 hour (p < 0.05). Biological microthread implantation tracking illustrated that we were able to deliver hMSCs to the myocardium and endocardium of the left ventricular wall for hMSC delivery. This study illustrates that biological microthreads can serve as an efficient means of delivering hMSCs to the infarcted heart. Unlike the currently utilized delivery methods, biological microthreads can target the infarcted layer of the left ventricular wall and maximize hMSC engraftment to that layer.
39

Predicting the resistance of fired clay bricks to salt attack

Burgess-Dean, Leon Sylvester, leon.burgessdean@deakin.edu.au January 2001 (has links)
The salt attack of Fired Clay Bricks (FCBs) causes surface damage that is aesthetically displeasing and eventually leads to structural damage. Methods for determining the resistances of FCBs to salt weathering have mainly tried to simulate the process by using accelerating aging tests. Most research in this area has concentrated on the types of salt that can cause damage and the damage that occurs during accelerated aging tests. This approach has lead to the use of accelerated aging tests as standard methods for determining resistance. Recently, it has been acknowledged that are not the most reliable way to determine salt attack resistance for all FCBs in all environments. Few researchers have examined FCBs with the aim of determining which material and mechanical properties make a FCB resistant to salt attack. The aim of this study was to identify the properties that were significant to the resistance of FCBs to salt attack. In doing so, this study aids in the development of a better test method to assess the resistance of FCBs to salt attack. The current Australian Standard accelerated aging test was used to measure the resistance of eight FCBs to salt attack using sodium sulfate and sodium chloride. The results of these tests were compared to the water absorption properties and the total porosity of FCBs. An empirical relationship was developed between the twenty-four-hour water absorption value and the number of cycles to failure from sodium sulfate tests. The volume of sodium chloride solution was found to be proportional to the total porosity of FCBs in this study. A phenomenological discussion of results led to a new mechanism being presented to explain the derivation of stress during salt crystallisation of anhydrous and hydratable salts. The mechanical properties of FCBs were measured using compression tests. FCBs were analysed as cellular materials to find that the elastic modules of FCBs was equivalent for extruded FCBs that had been fired a similar temperatures and time. Two samples were found to have significantly different elastic moduli of the solid microstructure. One of these samples was a pressed brick that was stiffer due to the extra bond that is obtained during sintering a closely packed structure. The other sample was an extruded brick that had more firing temperature and time compared with the other samples in this study. A non-destructive method was used to measure the indentation hardness and indentation stress-strain properties of FCBs. The indentation hardness of FCBs was found to be proportional to the uniaxial compression strength. In addition, the indentation hardness had a better linear correlation to the total porosity of FCBs except for those samples that had different elastic moduli of the solid microstructure. Fractography of exfoliated particles during salt cycle tests and compression tests showed there was a similar pattern of fracture during each failure. The results indicate there were inherent properties of a FCB that determines the size and shape of fractured particles during salt attack. The microstructural variables that determined the fracture properties of FCBs were shown to be important variables to include in future models that attempt to estimate the resistance of FCBs to salt attack.
40

Performance Measures for Forest Fire Management Organizations

Quince, Aaron Fletcher 15 February 2010 (has links)
Evaluating options, making informed decisions, measuring performance, and achieving management objectives in forest fire management organizations (FFMO) requires the development and application of measures that reflect how an organization has managed challenges presented. This thesis makes use of historical fire records from 1961 – 2008 to assess the impact of weather and management interventions on fire suppression effectiveness and annual area burned (AAB) within Alberta’s Boreal Natural Region. Statistical models relating AAB to variations in the proportion of extreme fire behaviour potential days suggest a significant portion of inter-annual variation in AAB (82 %) can be explained by the proportion of days when the Build-Up Index exceeds its 95th percentile. Probability of containment and large fire occurrence models are also developed that provide the framework for a new approach to presuppression planning in Alberta that can account for factors significantly influencing fire occurrence and containment outcome.

Page generated in 0.0242 seconds