• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 82
  • 19
  • Tagged with
  • 101
  • 42
  • 29
  • 28
  • 24
  • 22
  • 16
  • 15
  • 14
  • 14
  • 14
  • 13
  • 12
  • 10
  • 10
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

Trends and scientometrics in cyber security research

Slagarp, Jesper, Häggström, Elvira January 2022 (has links)
To look for scientific literature, there are specialized databases and search engines to simplify the process. In order to quickly assess the quality of a given paper, there are different indices meant to quantify the success and impact an author has had within the scientific community. However, these indices have some flaws and could potentially be exploited. In this thesis, we aim to gather publication data from cyber security conferences, identify unknown patterns and trends as well as to introduce a new index or metric that better captures the impact of authors in the field than current common indices. We found that the cyber security community is in a healthy state with no obvious exploitation of common indices. With one notable exception, there is near equal distribution between citations within sub-communities and outside of them. We also found that the majority of authors with several publications chose to publish for several different conferences, not just one of them. Furthermore, new and growing trends in cyber security research were found to be ”machine learning”, ”blockchain” and ”differential privacy”. As for the conferences, it appears that USENIX has overtaken CCS in recent years as the conference with the highest publication output. While no attempts to exploit the common indices were identified, we believe that the risk is still there. We also identify other flaws with the usage of the common metrics in the cyber security research field. As such, we suggest the adoption of the pure R-index with a normalized proportional counting as the score calculation method, since it takes the number and order of the authors into consideration, as well as that it does not discriminate against authors with few publications with many citations. / För att hitta vetenskaplig literatur finns det särskilda databaser och sökmotorer för att förenkla processen. För att snabbt kunna uppskatta kvaliteten hos en given vetenskaplig text finns det olika index menade att snabbt och enkelt kunna kvantifiera en författares inflytande och framgång inom vetenskapen. Det finns dock brister och sätt att utnyttja dessa index. I den här rapporten har vi som mål att samla in data från datasäkerhetskonferenser, identifiera okända mönster och trender samt att introducera ett nytt index som bättre fångar författares inflytande än nuvarande standarder. Vi fann att cyberäkerhet som forskningsområde är välmående och utan uppenbara utnyttjanden av de vanligaste indexen. Med ett enda undantag sker det nästan lika mycket citeringar mellan olika delgemenskaper som inom dem. Vi fann även att majoriteten av författare med flera publikationer valt att publicera i flera olika konferenser och inte bara en. Vidare fann vi att ”machine learning”, ”blockchain” och ”differential privacy” är nya och växande trender. Vad gäller konferenser visar det sig att USENIX har gått om CCS på senare år som den konferens med störst publikationsutflöde. Även om vi inte identifierade något missbruk tror vi att det fortfarande finns risk för det. Vi identifierade även andra brister med användningen av de vanligaste indexen i cybersäkerhetsforskningsområdet. Av dessa anledningar föreslår vi användningen av det så kallade ”pure R-index” med en normaliserad proportionell räkning som poängberäkningsmetod, eftersom att det tar antalet samt ordningen av författare i hänsyn, samt att det inte heller diskriminerar mot författare med få publikationer med många citeringar.
92

“They don't know that we know they know we know” : Ett filosofiskt perspektiv på komplexa informationsbeteenden och digitala gränser / “They don't know that we know they know we know” : A philosophical approach to complex information behaviors and digital limits

Lyckblad, Camilla January 2022 (has links)
The human being and her behavior is complex. Research has shown serendipity and chance to play a great part in the scientific research praxis, still the complexity of human information retrieval is not fully acknowledged in modern libraries. This master thesis compares two different worldviews; the mechanistic and the organic. This in order to understand why information seeking today is increasingly linear when human information behavior is not. The way people believe the world to work reflects on how libraries and information seeking work. The mechanistic worldview, comparing the world to a machine, is rooted in humanity since the seventeenth century and is still shaping our world and institutions. Today databases and linear searches are pushing physical books off shelves to make room for computers and searching on limiting linear mechanical terms instead of complex human ones. This pattern often occurs without adequate questioning and online information is argued to be even more available to patrons than the physical library.  This thesis uses complexity theory and philosophical method to broaden perspectives and question linear searches in scientific information retrieval. It aims to highlight the importance of complex information retrieval and physical browsing for scientific innovation and creativity. Erdelez's original information encountering method was used to obtain source material for philosophical analysis. Philosophical method and complexity theory is used throughout the text to analyze the linear worldview leading up to a joint argumentative summary at the end of every chapter bringing the text forward.  The thesis contains a field study with semi-structured interviews with librarians at the Picture Collection, New York Public Library. This highlights the value of physical browsing through the strong criticism that arose from patrons when the library wanted to archive the unique and browsable research collection.  The result of the thesis argues that the linear technological development in libraries with less physical collections, librarian encounters, passive information gathering and random information paths without underlying commercial drivers create more like-mindedness instead of innovation. This significantly reducing the possibility of interdisciplinary discoveries. A technical development that at an alarming rate shifts information from being sought by people, to people being sought by information.  This is a two years master’s thesis in Library and Information Science.
93

Indexing and Search Algorithmsfor Web shops : / Indexering och sök algoritmer för webshoppar :

Reimers, Axel, Gustafsson, Isak January 2016 (has links)
Web shops today needs to be more and more responsive, where one part of this responsivenessis fast product searches. One way of getting faster searches are by searching against anindex instead of directly against a database. Network Expertise Sweden AB (Net Exp) wants to explore different methods of implementingan index in their future web shop, building upon the open-source web shop platformSmartStore.NET. Since SmartStore.NET does all of its searches directly against itsdatabase, it will not scale well and will wear more on the database. The aim was thereforeto find different solutions to offload the database by using an index instead. A prototype that retrieved products from a database and made them searchable through anindex was developed, evaluated and implemented. The prototype indexed the data with aninverted index algorithm, and was made searchable with a search algorithm that mixed typeboolean queries with normal queries. / Webbutiker idag behöver vara mer och mer responsiva, en del av denna responsivitet ärsnabb produkt sökningar. Ett sätt att skaffa snabbare sökningar är genom att söka mot ettindex istället för att söka direkt mot en databas. Network Expertise Sweden AB vill utforska olika metoder för att implementera ett index ideras framtida webbutik, byggt ovanpå SmartStore.NET som är öppen käll-kod. Då Smart-Store.NET gör alla av sina sökningar direkt mot sin databas, kommer den inte att skala braoch kommer slita mer på databasen. Målsättningen var därför att hitta olika lösningar somavlastar databasen genom att använda ett index istället. En prototyp som hämtade produkter från en databas och gjorde dom sökbara genom ettindex var utvecklad, utvärderad och implementerad. Prototypen indexerade datan med eninverterad indexerings algoritm, och gjordes sökbara med en sök algoritm som blandar booleskafrågor med normala frågor. / <p></p><p></p><p></p>
94

Informationssökningsprocess på Internet i studiesituationer

Dzonlic, Muris January 2010 (has links)
<p>Uppsatsen presenterar hur högskolestudenter och gymnasieelever av båda könen (killar respektive tjejer) hanterar informationssökning och källkritik på Internet i samband med studier. Syftet med studien är att se skillnader och likheter i tre sökaspekter (informationsbehov, sökstrategi och källkritik). Sedan vill jag se hur tre sökaspekter används av båda könen bland högskolestudenter och gymnasieelever. Undersökningen är en både kvantitativ och kvalitativ studie. Det kvantitativa inslaget bygger på enkätfrågor och öppna frågor medan det kvalitativa inkluderar intervjufrågor. Teoretisk referensram består av litteratur och vetenskapliga artiklar som ger teoretiskt stöd åt ett operationaliseringsschema och ger grund åt hela studien. Studien begränsas till högskolestudenter och gymnasieelever av båda könen som går medieinriktade studier, oberoende av årskursnivå. Ett oväntat resultat som studien visade är, att både högskolestudenter och gymnasieelever av båda könen tittar mest på sina träffar ”Till mitten pålistan”. I studien upptäcktes att högskolestudenter och gymnasieelever av båda könen har kunskap om källkritik, men det stora problemet hos båda grupperna är ”Tidsbrist” och ”Har inte lust”, så att de undviker granska källor på Internet. Högskolestudenter och gymnasieelever av båda könen är medvetna om konsekvenserna som kan uppstå om de inte kritisk granskar källor på Internet. Det sökmönster som högskolestudenter och gymnasieelever av båda könen använder är att de först söker med bred sökning och sedan med smal sökning. Deras val av sökverktyg är ”Google” och de söker mest med sökord.</p>
95

Har dagens gymnasieelever nytta av sina datakunskaper på högskolenivå. : <em>Får dagens elever arbete på sina gymnasiebetyg inom de nya</em><em> Data/IT programmen</em> / Do today´s senior high school students have any use of their computer knowledge at a collage level?

Molin, Yvonne January 2009 (has links)
<p>The purpose is to analyze if the students have any use of their computer education at a senior high school level or if there is a demand for them to proceed studying. Does the students background have any importance or is it their own motivation that makes the student advance to higher education.</p><p>In this report we ask ourselves the question, if the students have any use of the knowledge gained at senior high school in computer studies at a higher level. Do the students have any chance for employment based on their senior high school grades in computer studies after graduation?  Do the schools that follow the senior high school guidelines within programming and databases give these students an advantage towards those that have not received the same fundamental education?</p><p>The method used for the survey is a group questionnaire.  The questionnaire was distributed at one and the same time and then collected to examine the results. The survey results showed that students who seek work based only on their senior high school grades, received only a temporary position for different lengths of time. Computer education at a senior high school is a preparatory education for collage. Those students that have graduated from  senior high school and are keeping up to date with collage oriented subjects within the field of programming and databases, give their students an advantage when they begin reading at a more advanced level.</p>
96

Har dagens gymnasieelever nytta av sina datakunskaper på högskolenivå : Får dagens elever arbete på sina gymnasiebetyg inom de nya Data/IT programmen / Do today´s senior high school students have any use of their computer knowledge at a collage level?

Molin, Yvonne January 2009 (has links)
The purpose is to analyze if the students have any use of their computer education at a senior high school level or if there is a demand for them to proceed studying. Does the students background have any importance or is it their own motivation that makes the student advance to higher education. In this report we ask ourselves the question, if the students have any use of the knowledge gained at senior high school in computer studies at a higher level. Do the students have any chance for employment based on their senior high school grades in computer studies after graduation?  Do the schools that follow the senior high school guidelines within programming and databases give these students an advantage towards those that have not received the same fundamental education? The method used for the survey is a group questionnaire.  The questionnaire was distributed at one and the same time and then collected to examine the results. The survey results showed that students who seek work based only on their senior high school grades, received only a temporary position for different lengths of time. Computer education at a senior high school is a preparatory education for collage. Those students that have graduated from  senior high school and are keeping up to date with collage oriented subjects within the field of programming and databases, give their students an advantage when they begin reading at a more advanced level.
97

Quotation for Customer Proposal and Performance Analysis for aircraft maintenance / Offert för Kundförslag Och prestanda Analys för flygplan underhåll

Bezier, Antoine January 2022 (has links)
By working as an intern with the Quotation Officer of Sabena Technics Nîmes facility,an aircraft maintenance company, this degree project highlights the different factors totake into account in a quotation of civil planes (B737/B767/A320/A330) by analysingwork packages from airline company, applying a process to estimate the importantdata as the man hours or tools, and using my technical knowledge to understandmaintenance tasks. Management knowledge for commercial sale reviews was usefulas well, this job is in the middle of the commercial team and and the technicalteam. Finally, a critical opinion of the process has been made in order to propose animprovement of the next quotations. / Genom att arbeta som praktikant hos offerterbetaren på Sabena Technics anläggningi Nîmes, ett underhållsföretag för flygplan, belyser detta examensarbete de olikafaktorersom ska beaktas i en underhållsoffert för civila flygplan (B737/B767/A320/A330).Detta gjordes genom att analysera arbetspaket från flygbolag, tillämpa en process föratt uppskatta viktiga uppgifter som arbetstimmar eller verktyg, och använda minatekniska kunskaper för att förstå underhållsuppgifter. Kunskaper om förvaltning avkommersiella försäljningsöversikter var också användbara, eftersom det här jobbetligger mitt emellan det kommersiella teamet och det tekniska teamet. Slutligen harjag gjort en kritisk bedömning av processen för att föreslå en förbättring av framtidaofferter.
98

Mapping out the Key Security Components in Relational Databases (MK-SCoRe) : Enhancing the Security of Relational Database Technology / Kartläggning av Nyckelkomponenter för Säkerhet i Relationsdatabaser (MK-SCoRe) : Förbättring av Säkerheten i Relationsdatabasteknik

Alobaidi, Murtadha, Trabulsiah, Abdullah January 2024 (has links)
Relational database security has become an increasingly important issue for organizations worldwide in the current era of data-driven operations. The urgent need for an extensive knowledge of relational database security components in relational databases is addressed in this thesis. Database security is constantly improving, but there is still a lack of research that analyzes these important factors. Because of this gap, databases are not sufficiently secured from new cyber threats, which endangers its accessibility, confidentiality, and integrity. The problem that the thesis addresses is the lack of comprehensive research covering all key security components in relational databases which, presents a challenge for organizations seeking to comprehensively secure their database systems. The purpose of this thesis is to systematically map the key security components essential to relational databases. The goal is to assist organizations and Database professionals to secure their relational databases against diverse cyber threats. Using a qualitative and exploratory methodology, the research analyzes a wide range of literature on database security. The research offers a balanced and comprehensive perspective on the current security landscape in relational databases by integrating theoretical study with structured interviews. This method guarantees that all essential security components is fully investigated. The results of this thesis involve a detailed mapping of the key security components within relational databases, which are uniquely informed by a combination of academic research and empirical findings from structured interviews with Database security experts. This thesis analyzes these security components based on how well they address current security threats, how well they secure databases, and how well they can adapt to different organizational needs. / Säkerhet i relationsdatabaser har blivit en allt viktigare fråga för organisationer världen över i den nuvarande eran av datadriven verksamhet. I den här avhandlingen behandlas det akuta behovet av en omfattande kunskap om säkerhetskomponenter för relationsdatabaser i relationsdatabaser. Databassäkerheten förbättras ständigt, men det finns fortfarande en brist på forskning som analyserar dessa viktiga faktorer. På grund av denna brist är databaser inte tillräckligt skyddade mot nya cyberhot, vilket äventyrar deras tillgänglighet, konfidentialitet och integritet. Problemet som avhandlingen tar upp är bristen på omfattande forskning som täcker alla viktiga säkerhetskomponenter i relationsdatabaser, vilket utgör en utmaning för organisationer som vill säkra sina databassystem på ett heltäckande sätt. Syftet med denna avhandling är att systematiskt kartlägga de viktigaste säkerhetskomponenterna som är väsentliga för relationsdatabaser. Målet är att hjälpa organisationer och databasspecialister att säkra sina relationsdatabaser mot olika cyberhot. Med hjälp av en kvalitativ och explorativ metod analyseras ett brett spektrum av litteratur om databassäkerhet. Forskningen erbjuder ett balanserat och omfattande perspektiv på det nuvarande säkerhetslandskapet i relationsdatabaser genom att integrera teoretiska studier med strukturerade intervjuer. Denna metod garanterar att alla väsentliga säkerhetskomponenter undersöks fullständigt. Resultatet av denna avhandling innebär en detaljerad kartläggning av de viktigaste säkerhetskomponenterna inom relationsdatabaser, som är unikt informerade av en kombination av akademisk forskning och empiriska resultat från strukturerade intervjuer med databassäkerhetsexperter. Denna avhandling analyserar dessa säkerhetskomponenter utifrån hur väl de hanterar aktuella säkerhetshot, hur väl de säkrar databaser och hur väl de kan anpassas till olika organisatoriska behov.
99

Identifiering av anomalier i COSMIC genom analys av loggar / Identification of anomalies in COSMIC through log analysis

Al-egli, Muntaher, Zeidan Nasser, Adham January 2015 (has links)
Loggar är en viktig del av alla system, det ger en inblick i vad som sker. Att analysera loggar och extrahera väsentlig information är en av de största trenderna nu inom IT-branchen. Informationen i loggar är värdefulla resurser som kan användas för att upptäcka anomalier och hantera dessa innan det drabbar användaren. I detta examensarbete dyker vi in i grunderna för informationssökning och analysera undantagsutskrifter i loggar från COSMIC för att undersöka om det är möjligt att upptäcka anomalier med hjälp av retrospektivdata. Detta examensarbete ger även en inblick i möjligheten att visualisera data från loggar och erbjuda en kraftfull sökmotor. Därför kommer vi att fördjupa oss i de tre välkända program som adresserar frågorna i centraliserad loggning: Elasticsearch, Logstash och Kibana. Sammanfattningsvis visar resultatet att det är möjligt att upptäckta anomalier genom att tillämpa statistiska metoder både på retrospektiv- och realtidsdata. / Logs are an important part of any system; it provides an insight into what is happening. One of the biggest trends in the IT industry is analyzing logs and extracting essential information. The information in the logs are valuable resources that can be used to detect anomalies and manage them before it affects the user In this thesis we will dive into the basics of the information retrieval and analyze exceptions in the logs from COSMIC to investigate whether it is feasible to detect anomalies using retrospective data. This thesis also gives an insight into whether it’s possible to visualize data from logs and offer a powerful search engine. Therefore we will dive into the three well known applications that addresses the issues in centralized logging: Elasticsearch, Logstash and Kibana. In summary, our results shows that it’s possible to detected anomalies by applying statistical methods on both in retrospective and real time data.
100

Skyddet för data : En analys av digitala tjänsters skydd för sin data genom sui generis-rätten i ljuset av Digital Markets Act / The protection of data : An analysis of digital services' protection of their data through the sui generis-right in light of the Digital Markets Act

Adamidis, Konstantinos January 2023 (has links)
The sui generis-right in article 7.1 of the database directive provides the maker of a database, who has made a qualitatively and/or quantitative substantial investment in the obtaining, verification and/or presentation of the contents in a database, the right to prevent extraction and/or re-utilization of the whole or of a substantial part of the database contents. In order to prevent the circumvention of article 7.1, the right to prohibit tortious dispositions of the contents was sup- plemented by article 7.5, which extends the right for the maker to prevent non-substantial parts to be extracted and/or re-utilized, provided that the extraction and/or re-utilization are repeated and systematic in a way that undermines the substantial investment the maker of the database has made.  The way that the sui generis-right is framed as an investment protection, in combination with the fact that the right’s object of protection is the investment as such, is the reason that the right has come to be regarded as a protection clause against unfair competition rather than an intellectual property right. As a result, the sui generis-right is of great significance to unfair competition and competition and antitrust law in general. This applies not only to article 102 FEUF, but especially to the DMA and in relation to the prescribed data-sharing obligation in article 6.10 in the DMA.  Competition and antitrust law in general and the DMA in particular, through its rootedness in article 3 FEU, aim to maintain competitive, open and fair digital markets. This applies, to say the least, as a part of ensuring the efficiency in the EU internal market, which by enlarge is intended to benefit the consumers. In this way, it’s understood that the consumers perspective plays a fundamental role in competition policy. In relation to the DMA, this is expressed through articles 6.2 and 6.10 of the DMA, which have the function of promoting innovation and increasing the consumers’ diversity of choice, while simultaneously giving the business users better opportunities to compete with the gatekeepers and thus become more efficient.  By imposing on a gatekeeper a far-reaching data-sharing obligation under article 6.10 in the DMA, in combination with the prohibition to use the same data under article 6.2, the gatekeepers’ sui generis-right is limited in all material aspects. Thereby, these provisions impose greatly on the gatekeepers’ ability as a maker of a database to freely dispose of their own database contents and thus obtain future returns and other competitive advantages as a result of the substantial investment. This is due to the fact that the gatekeeper is subject to an obligation to share the results of the investment with the business users.  The database directive states, however, that the sui generis-right must not be afforded in such a way as to facilitate abuses of a dominant position. By this reference it’s understood that this exception was written with article 102 FEUF in mind. In light of the significant differences between article 102 FEUF and the DMA, it can be concluded that the exception does not apply to the DMA. This is particularly the case as the DMA is framed as an ex ante-regulation, whereas article 102 FEUF is an ex post-regulation.  As this paper has highlighted, it requires great forethought when imposing a compulsory data-sharing obligation such as the one in article 6.10 in the DMA. The intended function of the sui generis-right is to promote investments in data processing and storage functions. In order to even receive or make use of the effective and high-quality data the business users have a right to receive from the gatekeepers, they have to have effective and proper databases, because otherwise it's entirely pointless to even force the gatekeepers to share their data.  Thus, a proportional balance is required between the interest in protecting the data as such by maintaining ex ante incentives to invest and the interest to promote open and fair digital markets as a way to ensure the effectiveness of the internal market for the benefit of the consumers and ex post social welfare. This could be a possible explanation to the Commission’s proposal of the Data Act, specifically article 35, which stipulates that the sui generis-right shall not be applied to machine generated data. It remains, however, to see how the question of the sui generis-right’s to be or not to be will play out in the future.

Page generated in 0.034 seconds