• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 55
  • 36
  • 22
  • 6
  • 5
  • 5
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 163
  • 163
  • 39
  • 26
  • 26
  • 24
  • 21
  • 19
  • 19
  • 19
  • 16
  • 15
  • 15
  • 14
  • 14
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Multi-Vector Portable Intrusion Detection System

Moyers, Benjamin 18 August 2009 (has links)
This research describes an intrusion detection system designed to fulfill the need for increased mobile device security. The Battery-Sensing Intrusion Protection System (B-SIPS) [1] initially took a non-conventional approach to intrusion detection by recognizing attacks based on anomalous Instantaneous Current (IC) drainage. An extension of B-SIPS, the Multi-Vector Portable Intrusion Detection System (MVP-IDS) validates the idea of recognizing attacks based on anomalous IC drain by correlating the detected anomalies with wireless attack traffic from both the Wi-Fi and Bluetooth mediums. To effectively monitor the Wi-Fi and Bluetooth mediums for malicious packet streams, the Snort-Based Wi-Fi and Bluetooth Attack Detection and Signature System (BADSS) modules were introduced. MVP-IDS illustrates that IC anomalies, representing attacks, can be correlated with wireless attack traffic through a collaborative and multi-module approach. Furthermore, MVP-IDS not only correlates wireless attacks, but mitigates them and defends its clients using an administrative response mechanism. This research also provides insight into the ramifications of battery exhaustion Denial of Service (DoS) attacks on battery-powered mobile devices. Several IEEE 802.11 Wi-Fi, IEEE 802.15.1 Bluetooth, and blended attacks are studied to understand their effects on device battery lifetimes. In the worst case, DoS attacks against mobile devices were found to accelerate battery depletion as much as 18.5%. However, if the MVP-IDS version of the B-SIPS client was allowed to run in the background during a BlueSYN flood attack, it could mitigate the attack and preserve as much as 16% of a mobile device's battery lifetime as compared with an unprotected device. / Master of Science
22

Students' First and Fourth Amendment Rights in the Digital Age: An Analysis of Case Law

Nowak, Benjamin Adam 27 April 2014 (has links)
In January, 2012, the Supreme Court of the United States refused to hear three cases involving student online speech, or cyberspeech. This indicates that the Court is content with lower courts applying First Amendment jurisprudence developed over 40 years ago to a rapidly advancing digital environment where students carry the equivalent of personal computers in their pockets, have an ever-growing telepresence, and rely on cyberspeech as their primary means of communicating with the world around them. Lower courts also are beginning to grapple with challenges to students Fourth Amendment right to be free from unreasonable search and seizure as it relates to the digital environment described above. Recently, lower courts in Mississippi, Texas, Minnesota, and Kentucky have applied standards set forth decades ago to decide cases involving searches of students mobile devices and Web 2.0 applications. Given the absence of guidance from the Supreme Court, this study aims to: (1) identify and analyze trends in the current application of legal standards related to student cyberspeech and search and seizure in the digital age; (2) synthesize these findings into a set of essential guidelines for school officials to use as they navigate a legal landscape that has yet to be well defined; and (3) make recommendations to further develop the body of law. Findings indicate that school officials have the legal authority to restrict off-campus student cyberspeech when certain conditions are met, and Tinker governs cases in this area. Seriously threatening, slanderous, or obscene cyberspeech is not constitutionally protected and can be restricted prior to an actual disruption. Off-campus student cyberspeech that reaches the school can legally be restricted so long as evidence shows that it caused a material and substantial disruption. In addition, students possess reasonable expectations of privacy in their personal mobile devices and password-protected private Web 2.0 communications. T.L.O governs searches of students personal mobile devices and Vernonia appears to govern cases involving searches of students Web 2.0 applications. Substantive suspicion at the outset, carefully tailored searches, and a clear governmental interest will keep school officials from violating students Fourth Amendment protections. / Ed. D.
23

Implementation and Evaluation of an Algorithm for User Identity and Permissions for Situational Awareness Analysis

Tolley, Joseph D. 04 1900 (has links)
The thesis analyzes the steps and actions necessary to develop an application using a user identity management system, user permissions system, message distribution system, and message response data collection and display system to deliver timely command and control of human assets and the input of intelligence in emergency response situations. The application, MinuteMan, uniquely manages messages sent between multiple users and their parent organizations. Specifically, messages are stored, managed, and displayed to managers based on the hierarch or organizational rank as well as situational allowances of the users sending and receiving messages and permissions. Using an algorithm for user identity and permissions for situational awareness analysis, messages and information is sent to multiple addressees in an organization. Responses are correlated to the rank of the responding recipients in the organization, to assist the users and the parent organizations to identify which responses to have been read. Receipt of the messages is acknowledged before the message can be fully read. Responses to the messages include a selection of a user status from a preset choice of statuses, and may include other response attributes required or offered by the sender of the message. The locations of responding and non-responding addresses can be mapped and tracked. The resulting solution provides improved situational awareness during emergency response situations. / M.S. / The thesis analyzes the steps and actions necessary to develop an application using a user identity management system, user permissions system, message distribution system, and message response data collection and display system to deliver timely command and control of human assets and the input of intelligence in emergency response situations. Using an algorithm for user identity and permissions for situational awareness analysis, messages and information are sent to multiple user addressees for individuals supporting an organization. Responses are correlated to the rank of the responding recipient in the organization, and to assist the senders of the messages to identify which responses to read by the targeted recipients. Receipt of the messages is acknowledged before the message can be fully read. Responses to the messages include a selection of a user status from a preset choice of statuses, and may include other response attributes required or offered by the sender of the message. The locations of responding and non-responding addresses can be mapped and tracked. The resulting solution provides improved situational awareness during emergency response situations.
24

Empirical Assessment of Mobile Device Users’ Information Security Behavior towards Data Breach: Leveraging Protection Motivation Theory

Giwah, Anthony Duke 01 January 2019 (has links)
User information security behavior has been an area of growing demand in information systems (IS) research. Unfortunately, most of the previous research done in user information security behavior have been in broad contexts, therefore creating a gap in the literature of similar research that focuses on specific emerging technologies and trends. With the growing reliance on mobile devices to increase the flexibility, speed and efficiency in how we work, communicate, shop, seek information and entertain ourselves, it is obvious that these devices have become data warehouses and platform for data in transit. This study was an empirical and quantitative study that gathered data leveraging a web-survey. Prior to conducting the survey for the main data collection, a Delphi study and pilot study were conducted. Convenience sampling was the category of nonprobability sampling design used to gather data. The 7-Point Likert Scale was used on all survey items. Pre-analysis data screening was conducted prior to data analysis. The Partial Least Square Structural Equation Modeling (PLS-SEM) was used to analyze the data gathered from a total of 390 responses received. The results of this study showed that perceived threat severity has a negative effect on protection motivation, while perceived threat susceptibility has a positive effect on protection motivation. Contrarily, the results from this study did not show that perceived response cost influences protection motivation. Response efficacy and mobile self-efficacy had a significant positive influence on protection motivation. Mobile device security usage showed to be significantly influenced positively by protection motivation. This study brings additional insight and theoretical implications to the existing literature. The findings reveal the PMT’s capacity to predict user behavior based on threat and coping appraisals within the context of mobile device security usage. Additionally, the extension of the PMT for the research model of this study implies that mobile devices users also can take recommended responses to protect their devices from security threats.
25

Providing Context to the Clues: Recovery and Reliability of Location Data from Android Devices

Bell, Connie 01 January 2015 (has links)
Mobile device data continues to increase in significance in both civil and criminal investigations. Location data is often of particular interest. To date, research has established that the devices are location aware, incorporate a variety of resources to obtain location information, and cache the information in various ways. However, a review of the existing research suggests varying degrees of reliability of any such recovered location data. In an effort to clarify the issue, this project offers case studies of multiple Android mobile devices utilized in controlled conditions with known settings and applications in documented locations. The study uses data recovered from test devices to corroborate previously identified accuracy trends noted in research involving live-tracked devices, and it further offers detailed analysis strategies for the recovery of location data from devices themselves. A methodology for reviewing device data for possible artifacts that may allow an examiner to evaluate location data reliability is also presented. This paper also addresses emerging trends in device security and cloud storage, which may have significant implications for future mobile device location data recovery and analysis. Discussion of recovered cloud data introduces a distinct and potentially significant resource for investigators, and the paper addresses the cloud resources' advantages and limitations.
26

Mobile Device Strategy : A management framework for securing company information assets on mobile devices

Brodin, Martin January 2016 (has links)
The problem addressed by this research is a demand for increased flexibility in access to organisational information, driven by the increasing popularity of mobile devices. Employees increasingly bring private devices to work (Bring Your Own Device, BYOD) or use work devices for private purposes (Choose Your Own Device, CYOD). This puts managers in a difficult position, since they want the benefits of mobility, without exposing organisational data to further risk. The research focuses on management (particularly information security management) issues in the design and implementation of strategies for mobile devices.  There are two objectives. The first is to identify existing information security management strategies for mobile and dual-use devices. The second is to develop a framework for analysing, evaluating and implementing a mobile device strategy. The overall research strategy is inspired by Design Science; where the mission is to develop an artefact, in this case a framework, which will help to solve a practical problem. Methods include literature review, theoretical development, and the collection and analysis of qualitative data through interviews with executives. The main result of this work is the framework, which deals with the complete process, including analysis, design and implementation of a mobile device management strategy. It helps researchers to understand necessary steps in analysing phenomenon like BYOD and gives practitioners guidance in which analyses to conduct when working on strategies for mobile devices. The framework was developed primarily through theoretical work (with inspiration from the mobile security and strategic management literature, and the ISO/IEC 27000 standard), and evaluated and refined through the empirical studies. The results include twelve management issues, a research agenda, argumentation for CYOD and, guidance for researchers and practitioners.
27

Plánování spojů ve veřejné dopravě na mobilních zařízeních / Mass transport routing

Bečka, Michal January 2010 (has links)
A journey planning tool accessible from a mobile device provides travel information on the move. This work studies various aspects of mobile journey planners, including the history and limitations of mobile devices to deal with. First we analyze the connection with phone networks and the Internet for possible choices to place the tool, while recommending the most suitable ones. Then we study the developer environment consisting of various operating systems to show how compatible an application will be while selecting a programming language. Another part covers possible parameters for the journey search, from setting of basic location and time to optimizing other journey attributes. Following is an evaluation of journey planners already available. Then we investigate the source and form of input traffic data along with their availability. Finally we illustrate the ideas how the proposed parameters can be implemented on an example search algorithm. The purpose is to provide a comprehensive overview of the subject while researching possible improvements.
28

Multiplatformní prostředí pro vývoj mobilních her / Multi-platform environment for mobile-game development

Vacula, Ivan January 2011 (has links)
Title: Multi-platform environment for mobile-game development Author: Ivan Vacula Department: Department of Software Engineering Supervisor: RNDr. David Bednárek, Ph.D. Supervisor's e-mail address: bednarek@ksi.mff.cuni.cz Abstract: Smart mobile devices are getting more and more popular these days. But there comes a problem with their expansion as well. Mobile operating systems differ from each other, as do mobile devices themselves, so development across multiple platforms is not simple. Situation is even worse when it comes to games. These need to use limited resources of a mobile device as much as possible, taking into account quick response to user actions, graphical execution et cetera. The first goal of this thesis is to compare existing solutions for multi-platform mobile game development. The second goal is to design a new system. This system must ensure targeting of multiple platforms during mobile game development. Included in this thesis is implementation of the system on two vastly different operating systems as well as implementation of a demonstration game. Keywords: multi-platform, mobile, smartphone, game, development
29

Plánování spojů ve veřejné dopravě na mobilních zařízeních / Mass transport routing

Bečka, Michal January 2011 (has links)
A journey planning tool accessible from a mobile device provides travel information on the move. This work studies various aspects of journey planners in order to develop a solution for this task. We analyze the connection with phone networks and the Internet for possible choices to place the tool. Then we study the development environment consisting of operating systems programming languages. Another part covers possible parameters for the journey search. Then we investigate the source and form of input traffic data along with possible algorithms for this problem. Based on this analysis we design an application, making decisions from the analyzed areas. The design is applied for the following implementation and the resulting program we describe and measure. The purpose of this work is to develop a working application for mobile devices capable of public transit journey search, and to show what development of such application entails.
30

Komponentový framework pro vývoj webových aplikací / Component framework for web application development

Staniševský, Jiří January 2009 (has links)
The aim of this work was to design and implement component framework for development of web applications written in PHP programming language. The design has been based on pros and cons analysis of component framework usage, existing framework solution comparison and analysis of drawbacks of these frameworks. End-user device independence is both the main requirement for this framework and also its greatest contribution to the field of web frameworks. To be able to generate different output for mobile and desktop devices and to keep the application logic at one place only, thus minimizing the amount of work required from the developer, it uses its own original implementation of Model-View-Controller architecture. The output is being generated by so called rendering objects associated with individual components. Applications based on this framework are purely event driven, thus having their code more readable and manageable. Framework tries to offer comfortable usage of web applications for mobile device users without forcing application developers to create additional versions of their applications.o tato zařízení.

Page generated in 0.0519 seconds