• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 433
  • 38
  • 35
  • 29
  • 19
  • 11
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 7
  • 4
  • 4
  • Tagged with
  • 757
  • 757
  • 464
  • 347
  • 184
  • 182
  • 159
  • 122
  • 112
  • 112
  • 108
  • 103
  • 100
  • 86
  • 84
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
671

Geographic Factors of Residential Burglaries - A Case Study in Nashville, Tennessee

Hall, Jonathan A. 01 November 2010 (has links)
This study examines geographic patterns and geographic factors of residential burglary at the Nashville, TN area for a twenty year period at five year interval starting in 1988. The purpose of this study is to identify what geographic factors have impacted on residential burglary rates, and if there were changes in the geographic patterns of residential burglary over the study period. Several criminological theories guide this study, with the most prominent being Social Disorganization Theory and Routine Activities Theory. Both of these theories focus on the relationships of place and crime. A number of spatial analysis methods are hence adopted to analyze residential burglary rates at block group level for each of the study year. Spatial autocorrelation approaches, particularly Global and Local Moran's I statistics, are utilized to detect the hotspots of residential burglary. To understand the underlying geographic factors of residential burglary, both OLS and GWR regression analyses are conducted to examine the relationships between residential burglary rates and various geographic factors, such as Percentages of Minorities, Singles, Vacant Housing Units, Renter Occupied Housing Units, and Persons below Poverty Line. The findings indicate that residential burglaries exhibit clustered patterns by forming various hotspots around the study area, especially in the central city and over time these hotspots tended to move in a northeasterly direction during the study period of 1988-2008. Overall, four of the five geographic factors under examination show positive correlations with the rate of residential burglary at block group level. Percentages of Vacant Housing Units and Persons below Poverty Line (both are indicators of neighbor economic well-being) are the strong indicators of crime, while Percentages of Minorities (ethnic heterogeneity indictor) and Renter Occupied Housing Units (residential turnover indictor) only show modest correlation in a less degree. Counter-intuitively, Percentage of Singles (another indicator of residential turnover) is in fact a deterrent of residential burglary; however, the reason for this deterrence is not entirely clear.
672

Physical-layer security: practical aspects of channel coding and cryptography

Harrison, Willie K. 21 June 2012 (has links)
In this work, a multilayer security solution for digital communication systems is provided by considering the joint effects of physical-layer security channel codes with application-layer cryptography. We address two problems: first, the cryptanalysis of error-prone ciphertext; second, the design of a practical physical-layer security coding scheme. To our knowledge, the cryptographic attack model of the noisy-ciphertext attack is a novel concept. The more traditional assumption that the attacker has the ciphertext is generally assumed when performing cryptanalysis. However, with the ever-increasing amount of viable research in physical-layer security, it now becomes essential to perform the analysis when ciphertext is unreliable. We do so for the simple substitution cipher using an information-theoretic framework, and for stream ciphers by characterizing the success or failure of fast-correlation attacks when the ciphertext contains errors. We then present a practical coding scheme that can be used in conjunction with cryptography to ensure positive error rates in an eavesdropper's observed ciphertext, while guaranteeing error-free communications for legitimate receivers. Our codes are called stopping set codes, and provide a blanket of security that covers nearly all possible system configurations and channel parameters. The codes require a public authenticated feedback channel. The solutions to these two problems indicate the inherent strengthening of security that can be obtained by confusing an attacker about the ciphertext, and then give a practical method for providing the confusion. The aggregate result is a multilayer security solution for transmitting secret data that showcases security enhancements over standalone cryptography.
673

Passive, active and absorbing frequency selective surfaces for wireless communication applications

Kiani, Ghaffer I (Ghaffer Iqbal) January 2008 (has links)
"March, 2009". / Thesis (PhD)--Macquarie University, Faculty of Science, Dept. of Physics & Engineering, 2008. / Bibliography: p. 145-158. / Introduction -- Frequency selective surfaces -- Absorb/transmit frequency selective surface absorber -- Switchable frequency selective surface for wireless applications -- Energy-saving glass characterisation -- Frequency selective surface solution for energy-saving glass -- Conclusion. / This thesis presents three topics related to frequency selective surfaces (FSSs), namely bsorb/transmit FSSs, active FSSs and passive bandpass FSSs for energy-saving glass used in modern buildings. These three FSSs are unique in their design and functionalities. The absorb/transmit FSS is a novel dual-layer frequency selective surface for 5 GHz WLAN applications. This FSS can stop propagation of specific bands by absorbing as opposed to re ecting, while passing other useful signals. This is in contrast to the conventional Salisbury and Jaumann absorbers, which provide good absorption in the desired band while the out-of-band frequencies are attenuated. The second topic is a single-layer bandpass active FSS that can be switched between ON and OFF states to control the transmission in 2.45 GHz WLAN applications. Previously, researchers have focused on the bandstop and dual-layer versions of the active FSS. This is in contrast to the design presented in this thesis which is single-layer and provides extra advantage in a practical WLAN environment. Also the dc biasing techniques that were used for the active FSS design are easier to implement and provide good frequency stability for different angles of incidence and polarisations in both ON and OFF states. The last topic is on the use of a bandpass FSS in energy-saving glass panels used in building design. The manufacturers of these glass panels apply a very thin metal-oxide coating on one side of the glass panels to provide extra infrared (heat) attenuation. However, due to the presence of the coating, these energy-saving glass panels also attenuate communication signals such as GSM 900, GSM 1800/1900, UMTS and 3G mobile signals etc. This creates a major communication problem when buildings are constructed with windows of this glass. In this thesis, a solution to this problem is presented by designing and etching a cross-dipole bandpass FSS on the coated side of the glass to pass the useful signals while keeping infrared attenuation at an acceptable level. One of the advantages of this FSS design is that measured material values of the metal-oxide coating are used for simulations, which have not been done previously. / Mode of access: World Wide Web. / 166 p. ill. (some col.)
674

Digital encoding for secure data communications

Rondón, Eduardo Emilio Coquis. January 1976 (has links)
Thesis (Engineer's) --Naval Postgraduate School, 1976. / "September 1976." "AD A035848." Includes bibliographical references (leaves 122-123) Available via the Internet.
675

Applying mobile agents in an immune-system-based intrusion detection system

Zielinski, Marek Piotr 30 November 2004 (has links)
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. In such an architecture, the root node is responsible for detecting intrusions and for issuing responses. However, an intrusion detection system (IDS) based on a hierarchical architecture has many single points of failure. For example, by disabling the root node, the intrusion-detection function of the IDS will also be disabled. To solve this problem, an IDS inspired by the human immune system is proposed. The proposed IDS has no single component that is responsible for detecting intrusions. Instead, the intrusion-detection function is divided and placed within mobile agents. Mobile agents act similarly to white blood cells of the human immune system and travel from host to host in the network to detect intrusions. The IDS is fault-tolerant because it can continue to detect intrusions even when most of its components have been disabled. / Computer Science (School of Computing) / M. Sc. (Computer Science)
676

Selection of mobile agent systems based on mobility, communication and security aspects

Lall, Manoj 30 June 2005 (has links)
The availability of numerous mobile agent systems with its own strengths and weaknesses poses a problem when deciding on a particular mobile agent system. In this dissertation, factors based on mobility, communication and security of the mobile agent systems are presented and used as a means to address this problem. To facilitate in the process of selection, a grouping scheme of the agent system was proposed. Based on this grouping scheme, mobile agent systems with common properties are grouped together and analyzed against the above-mentioned factors. In addition, an application was developed using the Aglet Software Development Toolkit to demonstrate certain features of agent mobility, communication and security. / Theoretical Computing / M. Sc. (Computer Science)
677

Towards a framework to promote the development of secure and usable online information security applications

Mujinga, Mathias 01 1900 (has links)
The proliferation of the internet and associated online activities exposes users to numerous information security (InfoSec) threats. Such online activities attract a variety of online users who include novice computer users with no basic InfoSec awareness knowledge. Information systems that collect and use sensitive and confidential personal information of users need to provide reliable protection mechanisms to safeguard this information. Given the constant user involvement in these systems and the notion of users being the weakest link in the InfoSec chain, technical solutions alone are insufficient. The usability of online InfoSec systems can play an integral role in making sure that users use the applications effectively, thereby improving the overall security of the applications. The development of online InfoSec systems calls for addressing the InfoSec problem as a social problem, and such development must seek to find a balance between technical and social aspects. The research addressed the problem of usable security in online InfoSec applications by using an approach that enabled the consideration of both InfoSec and usability in viewing the system as a socio-technical system with technical and social sub-systems. Therefore, the research proposed a socio-technical framework that promotes the development of usable security for online information systems using online banking as a case study. Using a convergent mixed methods research (MMR) design, the research collected data from online banking users through a survey and obtained the views of online banking developers through unstructured interviews. The findings from the two research methods contributed to the selection of 12 usable security design principles proposed in the sociotechnical information security (STInfoSec) framework. The research contributed to online InfoSec systems theory by developing a validated STInfoSec framework that went through an evaluation process by seven field experts. Although intended for online banking, the framework can be applied to other similar online InfoSec applications, with minimum adaptation. The STInfoSec framework provides checklist items that allow for easy application during the development process. The checklist items can also be used to evaluate existing online banking websites to identify possible usable security problems. / Computer Science / D. Phil. (Computer Science)
678

La réaction sociale à l’égard du criminel dans la pensée d’Enrico Ferri. / The social reaction to the criminal in Enrico Ferri's thought

El Mouden, Yatrib 05 July 2018 (has links)
Dans l'histoire de la pensée criminologique, l'école positiviste s'est distinguée par ses idées quelque peu révolutionnaires sur le crime, le criminel et également sur la manière de s'en défendre. Enrico Ferri, illustre représentant de cette école, est celui qui a le mieux synthétisé et diffusé ces idées dans le champ juridique international. C'est lui qui le plus contribué à donner à cette école son caractère de politique criminelle et de doctrine de droit pénal. mais malgré tout, il reste très peu étudié. Contrairement à d'autres criminologues, il n' pas eu la chance de voir ses idées répandues et mises en relief dans les sphères de la littérature criminologique, bien que sa pensée ait exercé une influence importante sur les transformations du droit pénal et que certaines de ses idées connaissent aujourd'hui un regain d'actualité. La pensée de Ferri se distingue particulièrement par la réaction sociale qu’il préconise à l’égard du criminel. Celle-ci découle de sa nouvelle approche scientifique du phénomène criminel et des transformations qu’il voulait opérer dans le droit pénal, pour l’adapter aux données de la criminologie. Ferri propose un système positiviste préventif et répressif de défense sociale. La prévention s’effectuera par des substitutifs pénaux. La répression sera assurée par des mesures réparatrices, des mesures neutralisatrices et des mesures éliminatrices, adaptées à la dangerosité de chaque délinquant. Cette pensée de Ferri connaît un certain renouveau dans l’actuel système pénal, à travers la résurgence des deux notions fondamentales de sa réaction sociale, en l’occurrence, la notion de dangerosité et la notion de mesures de sûreté. / In the history of criminological thought, the positivist school has been to some extent distinguished by its revolutionary ideas about crime, the criminal, and also about how to defend oneself against it. Enrico Ferri, the illustrious representative of this school, is the person who has best synthesized and disseminated these ideas in the international legal field. It is he who most contributed to giving this school its character of criminal policy and criminal law doctrine. Nevertheless, Ferri remains very little studied. Unlike other criminologists, he has not had the chance to see his ideas spread and brought to the fore in the spheres of criminological literature, notwithstanding that his thinking has had a significant influence on the transformations of criminal law and some of his ideas are now gaining new relevance. Ferri's thinking is distinguished in particular by the social reaction he advocates towards the criminal, which stems from his new scientific approach to the criminal phenomenon and the transformations he wanted to make in criminal law, to adapt it to the data of criminology. Ferri proposes a positivist preventive and repressive system of social defence. Prevention will be carried out by criminal substitutes. Repression will be ensured by restorative measures, neutralizing measures and elimination measures, adapted to the dangerousness of each offender. Ferri's thinking is undergoing a certain renewal in the current penal system, through the resurgence of the two fundamental notions of his social reaction, in this case, the notion of dangerousness and the notion of security measures.
679

A framework for the protection of mobile agents against malicious hosts

Biermann, Elmarie 30 September 2004 (has links)
The mobility attribute of a mobile agent implies deployment thereof in untrustworthy environments, which introduces malicious host threats. The research question deals with how a security framework could be constructed to address the mentioned threats without introducing high costs or restraining the mobile agent's autonomy or performance. Available literature have been studied, analysed and discussed. The salient characteristics as well as the drawbacks of current solutions were isolated. Through this knowledge a dynamic mobile agent security framework was defined. The framework is based on the definition of multiple security levels, depending on type of deployment environment and type of application. A prototype was constructed and tested and it was found to be lightweight and efficient, giving developers insight into possible security threats as well as tools for maximum protection against malicious hosts. The framework outperformed other frameworks / models as it provides dynamic solutions without burdening a system with unnecessary security gadgets and hence paying for it in system cost and performance / Computing / D.Phil.
680

Computer seizure as technique in forensic investigation

Ndara, Vuyani 19 March 2014 (has links)
The problem encountered by the researcher was that the South African Police Service Cyber-Crimes Unit is experiencing problems in seizing computer evidence. The following problems were identified by the researcher in practice: evidence is destroyed or lost because of mishandling by investigators; computer evidence is often not obtained or recognised, due to a lack of knowledge and skills on the part of investigators to properly seize computer evidence; difficulties to establish authenticity and initiate a chain of custody for the seized evidence; current training that is offered is unable to cover critical steps in the performance of seizing computer evidence; computer seizure as a technique requires specialised knowledge and continuous training, because the information technology industry is an ever-changing area. An empirical research design, followed by a qualitative research approach, allowed the researcher to also obtain information from practice. A thorough literature study, complemented by interviews, was done to collect the required data for the research. Members of the South African Police Cyber-crime Unit and prosecutors dealing with cyber-crime cases were interviewed to obtain their input into, and experiences on, the topic. The aim of the study was to explore the role of computers in the forensic investigation process, and to determine how computers can be seized without compromising evidence. The study therefore also aimed at creating an understanding and awareness about the slippery nature of computer evidence, and how it can find its way to the court of law without being compromised. The research has revealed that computer crime is different from common law or traditional crimes. It is complicated, and therefore only skilled and qualified forensic experts should be used to seize computer evidence, to ensure that the evidence is not compromised. Training of cyber-crime technicians has to be priority, in order to be successful in seizing computers. / Department of Criminology / M.Tech. (Forensic Investigation)

Page generated in 0.0854 seconds