• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2634
  • 483
  • 390
  • 370
  • 58
  • 45
  • 35
  • 19
  • 10
  • 10
  • 9
  • 7
  • 6
  • 3
  • 2
  • Tagged with
  • 4630
  • 4630
  • 2051
  • 1971
  • 1033
  • 617
  • 521
  • 485
  • 456
  • 448
  • 421
  • 416
  • 408
  • 337
  • 310
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
411

Performance analysis of automated attack graph generation software

Cullum, James J. 12 1900 (has links)
The current generation of network vulnerability detection software uses databases of known vulnerabilities and scans target networks for these weaknesses. The results can be voluminous and difficult to assess. Thus, the success of this technology has created a need for software to aid in network vulnerability analysis. Although research has shown the effectiveness of automated attack graph generation tools in displaying potential attack paths in a network, research involving the performance of these tools has been limited. Using empirical testing, we have collected quantitative data using CAULDRON, an attack graph generation tool developed at George Mason University, on a collection of simulated networks. By defining our model to include sets of nodes, which allow connectivity from all nodes to all nodes in the set; the number of nodes present in each set, the number of connections between sets; and the number of vulnerabilities per node as our variables, we are able to observe the performance impact on CAULDRON of connectivity and the increased presence of vulnerabilities in our networks. The effect of these variables on processing time and memory usage is presented and can be used as a metric to assess the scalability of this tool within various customer environments.
412

Development and implementation of an interactive uniform regulations manual for the United States Marine Corps

Krause, Carsten. 09 1900 (has links)
There are two main purposes to this thesis study. First, we will deploy the principles of software development that we have learned through the Software Engineering track here at NPS and test its validity through the development of a real world system. This system will be a completely self sustaining prototype of a web design containing both the front end and back end requirements. Second, we will conduct a study of Human Computer Interaction (HCI) through the design and usability testing of a new interactive uniform regulations manual. All military services currently possess their own individual uniform regulations specific to each service. This system, although it will be specific to the United States Marine Corps, can be used as a model for any other service as well as any international military desiring a similar solution to the inherent problems associated with current manuals. The new system will address all aspects currently outlined in the regulations. This regulation will be used by all US civilians and military service members to whom the current manual is now relevant. Although we fully intend to deliver a finished product to the Marine Corps for their official use, the true value to us as students is in the process of developing and testing this new system. The knowledge learned here will benefit us in any future system design or development projects.
413

A new framework for software visualization a multi-layer approach

Spyrou, Dimitrios. 09 1900 (has links)
Software Visualization can play a significant role in our fight against Software's inherent complexity. Despite all efforts made so far, Software Visualization tools have not succeeded to be a part of Software Engineers everyday practice. We believe that a properly defined taxonomy that will provide a framework for discussion, analysis and research guidance by offering a systematic and systemic overview of the area, covering all the concerns and challenges, is a starting point for a new approach for the field. After analyzing existing taxonomies and exploring existing tools, we approach Software Visualization as an interface between humans and software and we propose a multi-layered framework that incorporates all the concerns and the challenges of our field, in a neat, systematic and expandable way that can also serve as a roadmap for a research area and that can promote communication of existing and new ideas.
414

The evaluation of project management performance on two software maintenance projects based on a CMMI framework

LaFond, Karen A. 06 1900 (has links)
As software systems increase in size and complexity, so does the need to predict and control scope, schedule, and costs. The United States General Accountability Office has acknowledged weaknesses in the software acquisition process. Industry data indicates that improving the software development process can have significant effect on a project team's ability to generate products within planned scope, schedule, and cost estimates. This thesis focus is on software maintenance, one phase of the Army's acquisition process, to demonstrate that stronger management practices are needed to make better predictions and assessments in those areas. Two software maintenance projects were evaluated for success in project management performance against CMMI practices. This research results in a set of recommendations and predicted benefits are provided for use by the organization as input to the next process improvement effort. / US Army (USA) author.
415

Standards interoperability application of contemporary software assurance standards to the evolution of legacy software

Meacham, Desmond J. 03 1900 (has links)
This thesis addresses software evolution from the perspective of standards interoperability. We address the issue of how to apply contemporary software safety assurance standards to legacy safety-critical systems, with the aim of recertifying the legacy systems to the contemporary standards. The application of RTCA DO-178B Software Considerations in Airborne Systems and Equipment Certification to modified legacy software is the primary focus of this thesis. We present a model to capture the relationships between pre- and post-modification software and standards. The proposed formal model is then applied to the requirements for RTCA DO-178B and MIL-STD-498 as representative examples of contemporary and legacy software standards. The results provide guidance on how to achieve airworthiness certification for modified legacy software, whilst maximizing the use of software products from the previous development.
416

A novel framework for requirements elicitation in a military setting

Muradas, Fernando Martins January 2012 (has links)
Due to their unique characteristics, military domains contain various peculiarities that directly or indirectly and favourably or unfavourably impact the development of software products. Observations of systems development in the Brazilian Navy for many years have shown that systems are developed and delivered usually with many delays, and during development there are many changes to the requirements initially elicited. Since many authors in the software engineering literature agree that problems in requirements account for more than 70% of total system development failures, it seemed to be logical that any effort to solve the problems encountered in the military environment should start focusing on the requirements area. Currently several techniques and approaches already exist that support the execution of activities in this phase. With this abundance of techniques, it becomes a difficult task for the analysts to select the best technique in a given circumstance. To support the selection of these techniques, several frameworks were also created, each one guided by a respective group of influencing factors. This study examined, in a detailed manner, these techniques and frameworks, and noticed that there are still issues to be addressed to guide the selection of elicitation techniques, especially in a complex environment such as the military one. To elicit these issues an exploratory qualitative research was performed. The results showed that social issues rather than technical ones were the main concern in the domain under study. Issues such as hierarchy and high staff turnover interfere in the requirements process but are yet not addressed. The findings of the qualitative research are the first contribution of the thesis. Based on these results this research proposed a novel framework for requirements elicitation within the context of a military environment taking into account social and technical factors, which is the second contribution of the thesis. Such a framework was developed following Conflict Theory from sociology. This framework organized a selection of techniques based on possible solutions to conflicts. Finally, the solution was evaluated to assess its efficacy. This evaluation was based on qualitative and quantitative research. Based on the evaluation results the framework was updated.
417

Next generation software process improvement

Turnas, Daniel 06 1900 (has links)
Approved for public release; distribution is unlimited / Software is often developed under a process that can at best be described as ad hoc. While it is possible to develop quality software under an ad hoc process, formal processes can be developed to help increase the overall quality of the software under development. The application of these processes allows for an organization to mature. The software maturity level, and process improvement, of an organization can be measured with the Capability Maturity Model. The scope of this work is to use organizationally improved software processes on a small scale software product developed by the U.S. Army . The goal is to establish process improvement based on the Capability Maturity Model. / Civilian, United States Army TACOM
418

A generic software architecture for deception-based intrusion detection and response systems

Uzuncaova, Engin 03 1900 (has links)
Approved for public release; distribution is unlimited / Today, intrusion detection systems provide for detecting intrusive patterns of interaction. Although the responses of such systems are typically limited to primitive actions, they can be supplemented with deception-based strategies. We propose a generic software architecture combining intrusion detection and deceptive response capabilities in a uniform structure. Detecting and responding to attacks are realized via runtime instrumentation of kernel-based modules. The architecture provides for dynamically adjusting system performance to maintain continuity and integrity of both legitimate services and security activities. / Lieutenant Junior Grade, Turkish Navy
419

Redocumentation through design pattern recovery : an investigation and an implementation

Hyoseob Kim, Hyoseob January 2001 (has links)
In this thesis, two methods are developed in an aid to help users capture valuable design information and knowledge and reuse them. They are the design pattern recovery (DPR) method and pattern-based redocumentation (PBR) method. The DPR method is for matching up metrics of patterns with patterns themselves in order to capture valuable design information. Patterns are used as a container for storing the information. Two new metrics, i.e., p-value and s-value are introduced. They are obtained by analysing product metrics statistically. Once patterns have been detected from a system, the system can be redocumented using these patterns. Some existing XML (extensible Markup Language) technologies are utilised in order to realise the PRB method. Next, a case study is carried out to validate the soundness and usefulness of the DPR method. Finally, some conclusions drawn from this research are summarised, and further work is suggested for the researchers in software engineering.
420

Disaster Response System

Fu, Shiquan 15 December 2007 (has links)
With integration of geospatial information system into a conventional information system a basic disaster response information system is implemented. The result is a report on various useful technologies and software engineering methodologies that could be utilized to implement a preliminary system, which in turn clarifies many uncertainties and surprises that are typical of many such systems. The foundations of my project include the Unified Process of software development, the relational data models, the decision tree technique, class design principles such as the MVC pattern.

Page generated in 0.1019 seconds