• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1641
  • 211
  • 132
  • 106
  • 19
  • 18
  • 9
  • 7
  • 6
  • 6
  • 6
  • 6
  • 6
  • 6
  • 3
  • Tagged with
  • 2336
  • 2336
  • 953
  • 453
  • 441
  • 285
  • 274
  • 244
  • 240
  • 227
  • 219
  • 203
  • 201
  • 201
  • 184
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Machine Learning for Ddos Detection in Packet Core Network for IoT

Saeedi, Kubra January 2019 (has links)
No description available.
42

Implementation of a Water Flow Sensor Node and Energy Evaluation of 2G Transmission Strategies

Levinsson, Johan January 2018 (has links)
In this report, the design choices made during the making of a water flow measuring sensor node are described and discussed to various extents. The node is to ultimately be deployed in South Sudan to monitor mini-water yards managed by the International Aid Services. A design using a hall effect water flow sensor, a microcontroller and a GSM modem is presented. Various lengths of SMS and HTTP messages are sent and the current signature they produce are compared to find out which transmission strategy is the most energy conservative. It is concluded that for a constant data volume, sending it in as few messages as possible is beneficial in terms of saving energy. It is also found that for short messages, SMS seems to be cheaper in energy compared to HTTP and the opposite is true for bigger messages. Avoiding actuators altogether has the potential to be beneficial in terms of battery life for a sensor node.
43

Implementation of Principal Component Analysis For Use in Anomaly Detection Using CUDA / Implementation av principialkomponentanalys för användning inom anomalidetektion med hjälp av CUDA

Bertils, Joakim January 2019 (has links)
As more and more systems are connected, a large benefit is found in being able to find and predict problems in the monitored process. By analyzing the data in real time, feedback can be generated to the operators or the process allowing the process to correct itself. This thesis implements and evaluates three CUDA GPU implementations of the principal component analysis used for dimensionality reduction of multivariate data sets running in real time to explore the trade-offs of the algorithm implementations in terms of speed, energy and accuracy. The GPU implementations are compared to reference implementations on the CPU. The study finds that the covariance based method is the fastest of the implementations for the tested configurations, but the iterative NIPALS implementation has some interesting optimization opportunities that are explored. For large enough data sets, speedup compared to the 8 virtual core CPU of around 100 is obtained for the GPU implementations, making the GPU implementations an option to investigate for problems requiring real time computation of principal components.
44

COUNTERMEASURES AGAINST COORDINATED CYBER-ATTACKS TOWARDS POWER GRID SYSTEMS : A systematic literature study

Johansson, Jonatan January 2019 (has links)
A study on countermeasures against coordinated cyber-attacks (CCA) towards power grid systems has been carried out. A coordinated cyber-attack is a cyber-based attack where multiple attackers use multiple attack-mechanisms towards multiple targets in a coordinated fashion. The coordination is based on that the different attack-mechanisms help each other in attacking the target. A CCA is made up of different stages where each stage consists of a number of attack-mechanisms and together have a certain purpose. The different stages are used to systematically advance towards its goal, which is to compromise the operation of internal systems or to steal confidential data. For example, the first stage may be used to locate entry points at the target system, and a second stage may be used to locate vulnerable hosts by sniffing ongoing network activity to further itself towards its attack goal.     Power grids that are used to generate, transmit, and distribute electricity over large geographical areas are connected to the Internet. Within these environments, commercial IT systems have been adopted to control their electrical equipment, which poses cybersecurity risks to the power grid.     Intrusion Detection Systems (IDS) are designed provide internal network protection in case of intruders. However, state-of-the-art IDSs has been found to have certain limitations in protecting against multi-stage and slow attacks. The inadequacy of state-of-the-art IDSs for protecting against CCAs motivates the need to identify alternate countermeasures that can mitigate CCAs, when the target is a power grid system. The method of choice to address this problem in this study is a systematic literature study where 48 countermeasures were identified and assessed to which extent they are suitable to mitigate CCAs. Results suggest to follow three approaches, namely to preemptively identify technical vulnerabilities in the local system, to distribute intrusion detection hosts across a larger network for better situational awareness, and to implement new types of IDS technologies. Countermeasures with references to specific publications are also provided. The study contributes to how security operators of power grids can fulfil the requirement on cybersecurity as demanded by the NIS directive of the European Union regarding protection against CCAs.
45

Radio Jamming Detection and Forensics Analysis of Inter-Vehicular Communication Traces

Samadi, Nima, Lupan, Mihail January 2019 (has links)
No description available.
46

Multiple user regions for the McGill-RAX time-sharing system : justifications and methods of implementation.

Miller, Roy. January 1971 (has links)
No description available.
47

Web-enabled interface for an adaptive systems' interactive book

Kumar, Rajesh, January 2001 (has links) (PDF)
Thesis (M.S.)--University of Florida, 2001. / Title from first page of PDF file. Document formatted into pages; contains x, 81 p.; also contains graphics. Vita. Includes bibliographical references (p. 80).
48

On a grid-based interface to a special-purpose hardware cluster

Lehrter, Jeanne Marie, January 2002 (has links) (PDF)
Thesis (M.S.)--University of Tennessee, Knoxville, 2002. / Title from title page screen (viewed Sept. 6, 2002). Thesis advisor: Michael Langston. Document formatted into pages (vi, 119 pages). Vita. Includes bibliographical references (p. 43-46).
49

Configurable middleware-level intrusion detection support for embedded systems

Næss, Eivind, January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Washington State University. / Includes bibliographical references.
50

Implementation of Internet based courses in computer information systems at Milwaukee Area Technical College

Chmielewski, Phil. January 2000 (has links) (PDF)
Thesis--PlanB (M.S.)--University of Wisconsin--Stout, 2000. / Includes bibliographical references.

Page generated in 0.0869 seconds