• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 8
  • 3
  • 2
  • 2
  • 1
  • Tagged with
  • 17
  • 17
  • 8
  • 7
  • 6
  • 6
  • 4
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

A novel intrusion detection system (IDS) architecture. Attack detection based on snort for multistage attack scenarios in a multi-cores environment.

Pagna Disso, Jules F. January 2010 (has links)
Recent research has indicated that although security systems are developing, illegal intrusion to computers is on the rise. The research conducted here illustrates that improving intrusion detection and prevention methods is fundamental for improving the overall security of systems. This research includes the design of a novel Intrusion Detection System (IDS) which identifies four levels of visibility of attacks. Two major areas of security concern were identified: speed and volume of attacks; and complexity of multistage attacks. Hence, the Multistage Intrusion Detection and Prevention System (MIDaPS) that is designed here is made of two fundamental elements: a multistage attack engine that heavily depends on attack trees and a Denial of Service Engine. MIDaPS were tested and found to improve current intrusion detection and processing performances. After an intensive literature review, over 25 GB of data was collected on honeynets. This was then used to analyse the complexity of attacks in a series of experiments. Statistical and analytic methods were used to design the novel MIDaPS. Key findings indicate that an attack needs to be protected at 4 different levels. Hence, MIDaPS is built with 4 levels of protection. As, recent attack vectors use legitimate actions, MIDaPS uses a novel approach of attack trees to trace the attacker¿s actions. MIDaPS was tested and results suggest an improvement to current system performance by 84% whilst detecting DDOS attacks within 10 minutes.
12

Совершенствование координации деятельности субъектов системы профилактики безнадзорности, правонарушений и защиты прав несовершеннолетних : магистерская диссертация / Improving the coordination of the activities of the subjects of the system for the prevention of neglect, delinquency and protection of the rights of minors

Мороков, И. Р., Morokov, I. R. January 2016 (has links)
The purpose of the research conducted in the thesis is to analyze the improvement of coordination and interaction of subjects in the system of prevention of neglect, delinquency and protection of the rights of minors, as well as the development of methodological recommendations for improving the interagency interaction of bodies and institutions of the system for the prevention of neglect, delinquency and protection of the rights of minors and other bodies and organizations in identifying children and families in socially dangerous situations and requiring special the care of the state. Object of the study: subjects of the system of prevention of neglect, delinquency and protection of the rights of minors, other authorities and organization. The subject of the research: forms and tools used to coordinate the activities of subjects in the system of prevention of neglect, delinquency and protection of the rights of minors. The novelty of the dissertation research is as follows: - application of the structural and functional approach to the analysis of the coordination of the activities of subjects involved in the prevention of neglect, violations of law and protection of the rights of minors; - identification of factors that enhance the effectiveness of the activities of subjects involved in the prevention of neglect, violations of law and protection of the rights of minors. The practical importance of the dissertation research is the development of methodological recommendations for the design and implementation of a personalized program for the rehabilitation of families and children that require special care of the state, on the basis of a combination of typical and individual approaches, coordination of subjects participating in the prevention of neglect. / Целью исследования, проведенного в диссертации, является анализ совершенствования координации и взаимодействия субъектов в системе профилактики безнадзорности, правонарушений и защиты прав несовершеннолетних, а также разработка методических рекомендаций по совершенствованию межведомственного взаимодействия органов и учреждений системы профилактики безнадзорности, правонарушений и защиты прав несовершеннолетних и иных органов и организаций при выявлении детей и семей, находящихся в социально опасном положении и требующими особой заботы государства. Объект исследования: субъекты системы профилактики безнадзорности, правонарушений и защиты прав несовершеннолетних, иные органы и организации. Предмет исследования: формы и инструменты, используемые для координации деятельности субъектов в системе профилактики безнадзорности, правонарушений и защиты прав несовершеннолетних Новизна диссертационного исследования заключается в следующем: - применении структурно-функционального подхода к анализу координации деятельности субъектов, участвующих в профилактике безнадзорности, правонарушений и зашиты прав несовершеннолетних; - выявлении факторов, усиливающих результативность деятельности субъектов, участвующих в профилактике безнадзорности, правонарушений и зашиты прав несовершеннолетних; Практическая значимость диссертационного исследования – это разработка методических рекомендаций по проектированию и реализации персонифицированной программы реабилитации семей и детей, требующих особой заботы государства, на основе сочетание типового и индивидуального подходов, координации субъектов - участников профилактики безнадзорности.
13

Kombinace numerické matematiky a neuronové sítě pro model predikce průvalu / Combination of numerical mathematics and neural network for the model of breakout prediction

Srba, Jan January 2019 (has links)
This thesis deals with creation of breakout prediction model implemented via artificial neural network in MATLAB, hence it contains theoretical description of artificial neural networks and also presents how the networks were used for the breakout prediction problem. In addition, models of heat conduction through the mold wall were created and used for generating neccesary data for proper training of artificial neural network. The thesis contains proper description of used numerical methods for solving the heat conduction problems. In the thesis are presented partial results and also results of testing created artificial neural network with usage of real data.
14

Технологии профилактики деструктивных протестных проявлений в студенческой среде в социальных сетях : магистерская диссертация / Technologies for the prevention of destructive protest manifestations in the student environment in social networks

Чебарь, Е. В., Chebar, E. V. January 2023 (has links)
Магистерская диссертация «Технологии профилактики деструктивных протестных проявлений в студенческой среде в социальных сетях» состоит из двух глав, введения, заключения, библиографического списка, трех приложений. Целью диссертационной работы является совершенствование механизмов профилактики протестных проявлений в социальных сетях в студенческой среде с использованием информационных технологий. Объектом исследования является профилактика деструктивных протестных проявлений в студенческой среде в социальных сетях. Предметом исследования – технологии профилактики деструктивных протестных проявлений в студенческой среде в социальных сетях на примере УрФУ. Объем работы составил 121 страниц. В работе содержатся 4 приложения, 3 таблицы, 25 рисунков. В библиографическом списке представлено 68 источников. / Master's thesis "Technologies for the prevention of destructive protest manifestations in the student environment in social networks" consists of two chapters, an introduction, a conclusion, a bibliographic list, and three appendices. The purpose of the dissertation work is to improve the mechanisms for the prevention of protest manifestations in social networks among students using information technology. The object of the study is the prevention of destructive protest manifestations in the student environment in social networks. The subject of the research is the technology of prevention of destructive protest manifestations in the student environment in social networks on the example of Ural Federal University. The volume of work was 121 pages. The work contains 4 applications, 3 tables, 25 figures. The bibliographic list contains 68 sources.
15

La prévention des difficultés des entreprises : étude comparée de droit français et droit OHADA / The prevention of enterprise difficulties : Analysis based on French law and Ohada.

Toh, Aymar 09 December 2015 (has links)
Conséquence de l’insuffisance du traitement judiciaire des difficultés des entreprises, le droit de la prévention connaît un attrait de plus en plus important. En droit français et en droit Ohada, la loi du 26 juillet 2005 et l’acte uniforme portant procédure collectives d’apurement du passif ont mis l’accent sur les solutions négociées en vue de redresser la courbe des nombreuses défaillances d’entreprise. Malgré la richesse de l’ensemble des systèmes de prévention au regard du nombre important des mesures incitatives instituées en faveur du débiteur et des créanciers, la confrontation du système français de prévention et du système Ohada de prévention appelle à des résultats mitigés. Même si des deux systèmes le système français de prévention apparaît le plus structuré et le mieux organisé et donc appelé à servir de modèle au droit Ohada, force est de constater que l’objectif de sauvetage poursuivi par les deux législateurs est loin d’être atteint. Dans les faits, le nombre des défaillances d’entreprise augmente de manière considérable, ce qui traduit à l’évidence le caractère inefficace des différents mécanismes juridiques de prévention proposés. Par conséquent, une réforme de l’ensemble des dispositifs de prévention dans les deux ordres juridiques s’impose inéluctablement. Au delà, de l’approche comparative qu’impose ce sujet, il a surtout pour ambition de s’inscrire dans une approche nouvelle du droit des entreprises en difficultés qui prône désormais la contractualisation de la matière afin de la rendre efficace / Due to the inadequate judicial processing of difficulties encountered by enterprises today, the right to prevention is becoming more and more attractive. In France as in Ohada, the law of July 26 2005 and the uniform act concerning collective procedures of passive clearance have stressed the importance of the negociated solutions in order to straighten the curve of the numerous company failures. On account of incitative mesures in favor of debtors and creditors, the confrontation of the French prevention system and the Ohada prevention system have limited results despite the quality of the various prevention systems. Even though the French prevention system, which appears to be better structured and better organized, serves as a model to the juidicial system of Ohada, it must be noted that both legislators are far from achieving their goals. In fact, company failures are increasing rapidly, highlighting the ineffectiveness of the judicial prevention mecanisms that have been proposed until now. Consequently, a reform of all prevention devices in both judicial orders is required. Moreover, the comparative approach set by this matter's principle aim is to develop a new approach in company law which henceforth advocates contractualization of the matter in order to make it more effective.
16

Prevence kriminality v ČR / Crime prevention in the Czech Republic

Simandlová, Tereza January 2016 (has links)
Crime Prevention in the Czech Republic The purpose of this thesis is to analyze the Crime prevention strategy of the Czech Republic with a special emphasis on its local level ­ preventive activities used by city authorities. The thesis is composed of three main parts. The first one defines basic terminology attached to the topic of crime prevention such as delinquency or criminal repression. Crime prevention is in this section also discussed as a process consisting of several stages and as a process limited by certain obstructions as well. The second part indicates how the described process operates in the Czech Republic, what are the main conditions formed by the legislation in the fight against crime and what are the used tools of crime prevention on the local level. And last but not least the interactions between the subjects of prevention are defined. The conclusive part of the thesis is focused on a specific case and the use of crime prevention in it. The main reason is the strategies are usable only at the level of cities, municipalities and their parts. To achieve this purpose I picked up the City of Pardubice and focused on its crime prevention strategies. The City of Pardubice has been commonly involved in ...
17

Řízení externích zařízení na macOS s cílem zabránit úniku dat / Control of External Devices on macOS to Prevent Data Leaks

Zuzelka, Jozef January 2020 (has links)
Práca sa zaoberá problematikou kontroly a blokovania externých zariadení v operačnom systéme Apple macOS za účelom ochrany pred únikom citlivých dát. Implementované riešenie ukazuje zvolené prístupy pre blokovanie externých a cloudových diskov. Pre blokovanie USB diskov bol použitý DiskAbitration framework, čo je najvodnejšie riešenie tohto typu úlohy. Avšak cloudové disky sú v skutočnosti synchronizované zložky a úlohu nehrajú ovládače ani strom pripojených zariadení. Ku kontrole operácií v cloudových diskoch bol použitý Endpoint Security framework. Aktuálne podporovaní cloudový poskytovatelia sú iCloud a Dropbox a prístup k nim môže byť obmedzený úplne alebo iba na čítanie. Schopnosť synchronizácie vzdialenýh zmien bola zachovaná avšak v prípade Dropboxu si to žiada nepoužívať ich aplikáciu na správu súborov.

Page generated in 0.1077 seconds