• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 1
  • Tagged with
  • 7
  • 7
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Profile-based comparison of user integrity and advertisement content when using different adblockers / Profilbaserad jämförelse av användarintegritet och annonser vid användning av annonsblockerare

Ekblad, Alice, Höglund, Anna January 2021 (has links)
Advertisements are a common way to increase the revenue for websites. All users, however, are not interested in exposing themselves to advertisements and instead avoids it by installing an ad-blocker extension to their browser. In this thesis, a data collection followed by an analysis of the created dataset has been performed, with the purpose of identifying possible user integrity issues when using the ad-blocker extensions AdBlock and Adblock Plus. The study focuses on what kind of advertisements are displayed to a user and if it depend on the used ad-blocker extension or lack thereof, regional location, and the used browser. The data collection was carried out using a Selenium-based data collection tool, which both impersonated a real user surfing the Internet and scraped data from the visited websites along the way. The data collection was performed during a period of 21 days, using five different fictional users. A critical part of the thesis has been to find out how well user profiling, in the context of distributing targeted advertisement, works depending on if an ad-blocker extension is utilized or not. The used tool visited around 162 unique URLs per session and day, resulting in a dataset for further analysis. It was concluded that few differences in the number of targeted vs. untargeted ads a user was exposed to occurred in relation to regional location and used browser. The amount of advertisement decreased with the use of an ad-blocker, however, the data indicated that the share of targeted ads, compared to untargeted, increase with the use of an ad-blocker extension.
2

Effectiveness of operational profile-based testing

Zhakipbayev, Olzhas, Bekey, Aisulu January 2021 (has links)
The operational profile-based testing is currently not a well-studied topic and there are no specific instructions for writing test cases for testing the program. In our thesis, we presented our idea about on the basis of what data test cases can be written. Also, in order to show the effectiveness of operational profile-based testing, we additionally described the equivalent partitioning testing technique. The software for this experiment was taken from the open-source SIR repository. We have selected software: “Account”, that was tested by two different testing methods. The test results of both techniques were compared and it was determined that the operational profile-based testing technique is more effective.
3

Trust management for P2P application in delay tolerant mobile ad-hoc networks : an investigation into the development of a trust management framework for peer to peer file sharing applications in delay tolerant disconnected mobile ad-hoc networks

Qureshi, Basit I. January 2011 (has links)
Security is essential to communication between entities in the internet. Delay tolerant and disconnected Mobile Ad Hoc Networks (MANET) are a class of networks characterized by high end-to-end path latency and frequent end-to-end disconnections and are often termed as challenged networks. In these networks nodes are sparsely populated and without the existence of a central server, acquiring global information is difficult and impractical if not impossible and therefore traditional security schemes proposed for MANETs cannot be applied. This thesis reports trust management schemes for peer to peer (P2P) application in delay tolerant disconnected MANETs. Properties of a profile based file sharing application are analyzed and a framework for structured P2P overlay over delay tolerant disconnected MANETs is proposed. The framework is implemented and tested on J2ME based smart phones using Bluetooth communication protocol. A light weight Content Driven Data Propagation Protocol (CDDPP) for content based data delivery in MANETs is presented. The CDDPP implements a user profile based content driven P2P file sharing application in disconnected MANETs. The CDDPP protocol is further enhanced by proposing an adaptive opportunistic multihop content based routing protocol (ORP). ORP protocol considers the store-carry-forward paradigm for multi-hop packet delivery in delay tolerant MANETs and allows multi-casting to selected number of nodes. Performance of ORP is compared with a similar autonomous gossiping (A/G) protocol using simulations. This work also presents a framework for trust management based on dynamicity aware graph re-labelling system (DA-GRS) for trust management in mobile P2P applications. The DA-GRS uses a distributed algorithm to identify trustworthy nodes and generate trustable groups while isolating misleading or untrustworthy nodes. Several simulations in various environment settings show the effectiveness of the proposed framework in creating trust based communities. This work also extends the FIRE distributed trust model for MANET applications by incorporating witness based interactions for acquiring trust ratings. A witness graph building mechanism in FIRE+ is provided with several trust building policies to identify malicious nodes and detect collusive behaviour in nodes. This technique not only allows trust computation based on witness trust ratings but also provides protection against a collusion attack. Finally, M-trust, a light weight trust management scheme based on FIRE+ trust model is presented.
4

Trust Management for P2P application in Delay Tolerant Mobile Ad-hoc Networks. An Investigation into the development of a Trust Management Framework for Peer to Peer File Sharing Applications in Delay Tolerant Disconnected Mobile Ad-hoc Networks.

Qureshi, Basit I. January 2011 (has links)
Security is essential to communication between entities in the internet. Delay tolerant and disconnected Mobile Ad Hoc Networks (MANET) are a class of networks characterized by high end-to-end path latency and frequent end-to-end disconnections and are often termed as challenged networks. In these networks nodes are sparsely populated and without the existence of a central server, acquiring global information is difficult and impractical if not impossible and therefore traditional security schemes proposed for MANETs cannot be applied. This thesis reports trust management schemes for peer to peer (P2P) application in delay tolerant disconnected MANETs. Properties of a profile based file sharing application are analyzed and a framework for structured P2P overlay over delay tolerant disconnected MANETs is proposed. The framework is implemented and tested on J2ME based smart phones using Bluetooth communication protocol. A light weight Content Driven Data Propagation Protocol (CDDPP) for content based data delivery in MANETs is presented. The CDDPP implements a user profile based content driven P2P file sharing application in disconnected MANETs. The CDDPP protocol is further enhanced by proposing an adaptive opportunistic multihop content based routing protocol (ORP). ORP protocol considers the store-carry-forward paradigm for multi-hop packet delivery in delay tolerant MANETs and allows multi-casting to selected number of nodes. Performance of ORP is compared with a similar autonomous gossiping (A/G) protocol using simulations. This work also presents a framework for trust management based on dynamicity aware graph re-labelling system (DA-GRS) for trust management in mobile P2P applications. The DA-GRS uses a distributed algorithm to identify trustworthy nodes and generate trustable groups while isolating misleading or untrustworthy nodes. Several simulations in various environment settings show the effectiveness of the proposed framework in creating trust based communities. This work also extends the FIRE distributed trust model for MANET applications by incorporating witness based interactions for acquiring trust ratings. A witness graph building mechanism in FIRE+ is provided with several trust building policies to identify malicious nodes and detect collusive behaviour in nodes. This technique not only allows trust computation based on witness trust ratings but also provides protection against a collusion attack. Finally, M-trust, a light weight trust management scheme based on FIRE+ trust model is presented.
5

Modeling Alcohol Consumption Using Blog Data

Koh, Kok Chuan 05 1900 (has links)
How do the content and writing style of people who drink alcohol beverages stand out from non-drinkers? How much information can we learn about a person's alcohol consumption behavior by reading text that they have authored? This thesis attempts to extend the methods deployed in authorship attribution and authorship profiling research into the domain of automatically identifying the human action of drinking alcohol beverages. I examine how a psycholinguistics dictionary (the Linguistics Inquiry and Word Count lexicon, developed by James Pennebaker), together with Kenneth Burke's concept of words as symbols of human action, and James Wertsch's concept of mediated action provide a framework for analyzing meaningful data patterns from the content of blogs written by consumers of alcohol beverages. The contributions of this thesis to the research field are twofold. First, I show that it is possible to automatically identify blog posts that have content related to the consumption of alcohol beverages. And second, I provide a framework and tools to model human behavior through text analysis of blog data.
6

Utvärdering av metoder för framställning och kontroll av digitala terrängmodeller

Persson, Erik, Sjöwall, Fredric January 2012 (has links)
Today there are many applications of digital terrain models (DTM) and the requirements of low uncertainty increases. Most of the DTM are produced with Global Navigation Satellite System (GNSS), terrestrial laser scanning (TLS), airborne laser scanning (ALS) and total stations. Guidelines for the preparation and verification of DTM are found in Swedish Standards Institute – Technical Specifications (SIS-TS) 21144:2007 and SIS-TS 21145:2007. These were defined in collaboration between Swedish National Rail Administration, Banverket, and Swedish Road Administration, Vägverket, to satisfy the needs of requirement formulations in the production of DTM planning, design and construction.   The purpose of this paper is to produce and control DTM over Åkermans kulle, located west of the University of Gävle, according to SIS TS 21144:2007 using GNSS with network-RTK, TLS and ALS. Control of these was then performed by profile surveying with total station in accordance with SIS-TS 21145:2007 and by comparing the models against each other. Based on these results the control methods were evaluated. The area is approximately 2 ha and consists of very rough grassland with some vegetation. The post processing of the data was done in software SBG Geo Professional School, Cyclone 7.3 and Microsoft Excel.   The profile-based verification showed that GNSS gives the smallest deviation from reality for this type of area, with a mean deviation of 0.048 m, while the TLS and ALS deviated 0.162 m and 0.255 m. For the surface based control the largest deviation was between ALS and GNSS with an average deviation of 0.270 m and the smallest between ALS-TLS with an average deviation of 0.099 m.  In the production of DTM aim, uncertainty requirements, area and type of terrain should be taken into account and carefully analyzed. Based on this analysis, the most suitable method should be selected. Profile measurement is the most suited method for control since it generates a veracious depiction of the reality. Our results show that for hilly vegetated areas GNSS are preferable while TLS and ALS are more suited to plane areas without vegetation. A single national standard for the production and control of the DTM should be developed as only technical specifications exist today. / Användningsområden för digitala terrängmodeller (DTM) är idag många och kraven på låg osäkerhet ökar. DTM kan framställas med Global Navigation Satellite System (GNSS), terrester laserskanning (TLS), flygburen laserskanning (FLS) eller totalstation. Riktlinjer för framställning och kontroll av DTM finns i Swedish Standards Institute - Tekniska specifikationer (SIS-TS) 21144:2007 och SIS 21145:2007. Dessa framtogs i ett samarbete mellan Banverket och Vägverket, idag Trafikverket, för att tillfredsställa behoven av kravformuleringar vid framställning av DTM för planering, projektering och byggande.   Syftet med detta examensarbete är att framställa DTM över Åkermans kulle, beläget väster om Högskolan i Gävle enligt SIS-TS 21144:2007. Detta med hjälp av GNSS med nätverks-RTK, TLS och FLS, samt kontroll genom profilinmätning med totalstation enligt SIS-TS 21145:2007 och ytbaserad kontroll av modellerna mot varandra. Utgående från dessa resultat utvärderades kontrollmetoderna. Området är ca 2 ha stort och består av mycket kuperad ängsmark med viss vegetation. Efterbearbetningen av inmätta data skedde i programvarorna SBG Geo Professional School 2012, Cyclone 7.3 samt Microsoft Excel.   Den profilbaserade kontrollen visade att GNSS är den metod som ger lägst osäkerhet för denna typ av område, med en medelavvikelse på 0,048 m, medan TLS och FLS avvek 0,162 m respektive 0,255 m. För den ytbaserade kontrollen var de största avvikelserna mellan FLS och GNSS, med en medelavvikelse på 0,270 m och den lägsta medelavvikelsen på 0,099 m mellan FLS och TLS. Vid framställning av terrängmodeller bör syfte, osäkerhetskrav, areal och typ av terräng tas i beaktande och analyseras noggrant. Utifrån denna analys bör den mest sanningsenliga metoden väljas. För kontroll är profilmätning med totalstation mest lämpat då det ger en sanningsenlig bild av verkligheten. Våra resultat visar att för kuperade vegetationsrika områden är GNSS att föredra medan TLS och FLS passar bättre för plana områden utan vegetation. En gemensam nationell standard för framställning och kontroll av DTM bör tas fram då det i dagsläget endast finns specifikationer.
7

Security and usability of authentication by challenge questions in online examination

Ullah, Abrar January 2017 (has links)
Online examinations are an integral component of many online learning environments and a high-stake process for students, teachers and educational institutions. They are the target of many security threats, including intrusion by hackers and collusion. Collu-sion happens when a student invites a third party to impersonate him/her in an online test, or to abet with the exam questions. This research proposed a profile-based chal-lenge question approach to create and consolidate a student's profile during the learning process, to be used for authentication in the examination process. The pro-posed method was investigated in six research studies using a usability test method and a risk-based security assessment method, in order to investigate usability attributes and security threats. The findings of the studies revealed that text-based questions are prone to usability issues such as ambiguity, syntactic variation, and spelling mistakes. The results of a usability analysis suggested that image-based questions are more usable than text-based questions (p < 0.01). The findings identified that dynamic profile questions are more efficient and effective than text-based and image-based questions (p < 0.01). Since text-based questions are associated with an individual's personal information, they are prone to being shared with impersonators. An increase in the numbers of chal-lenge questions being shared showed a significant linear trend (p < 0.01) and increased the success of an impersonation attack. An increase in the database size decreased the success of an impersonation attack with a significant linear trend (p < 0.01). The security analysis of dynamic profile questions revealed that an impersonation attack was not successful when a student shared credentials using email asynchronously. However, a similar attack was successful when a student and impersonator shared information in real time using mobile phones. The response time in this attack was significantly different when a genuine student responded to his challenge questions (p < 0.01). The security analysis revealed that the use of dynamic profile questions in a proctored exam can influence impersonation and abetting. This view was supported by online programme tutors in a focus group study.

Page generated in 0.0413 seconds