• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 51
  • 9
  • 8
  • 7
  • 6
  • 5
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 118
  • 25
  • 24
  • 24
  • 24
  • 24
  • 17
  • 16
  • 15
  • 13
  • 11
  • 10
  • 10
  • 10
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Emerging Security Threats in Modern Digital Computing Systems: A Power Management Perspective

Shridevi, Rajesh Jayashankara 01 May 2019 (has links)
Design of computing systems — from pocket-sized smart phones to massive cloud based data-centers — have one common daunting challenge : minimizing the power consumption. In this effort, power management sector is undergoing a rapid and profound transformation to promote clean and energy proportional computing. At the hardware end of system design, there is proliferation of specialized, feature rich and complex power management hardware components. Similarly, in the software design layer complex power management suites are growing rapidly. Concurrent to this development, there has been an upsurge in the integration of third-party components to counter the pressures of shorter time-to-market. These trends collectively raise serious concerns about trust and security of power management solutions. In recent times, problems such as overheating, performance degradation and poor battery life, have dogged the mobile devices market, including the infamous recall of Samsung Note 7. Power outage in the data-center of a major airline left innumerable passengers stranded, with thousands of canceled flights costing over 100 million dollars. This research examines whether such events of unintentional reliability failure, can be replicated using targeted attacks by exploiting the security loopholes in the complex power management infrastructure of a computing system. At its core, this research answers an imminent research question: How can system designers ensure secure and reliable operation of third-party power management units? Specifically, this work investigates possible attack vectors, and novel non-invasive detection and defense mechanisms to safeguard system against malicious power attacks. By a joint exploration of the threat model and techniques to seamlessly detect and protect against power attacks, this project can have a lasting impact, by enabling the design of secure and cost-effective next generation hardware platforms.
52

Reversing Malware : A detection intelligence with in-depth security analysis

Theerthagiri, Dinesh January 2009 (has links)
<p>More money nowadays moves online and it is very understandable that criminals want to make more money online aswell, because these days’ banks don’t have large sums of money in their cash box. Since there are many other internalrisks involved in robbing a bank, criminals have found many other ways to commit crimes and much lower risMore money nowadays moves online and it is very understandable that criminals want to make more money online as well, because these days’ banks don’t have large sums of money in their cash box. Since there are many other internal risks involved in robbing a bank, criminals have found many other ways to commit crimes and much lower risk in online crime. The first level of change involved was email-based phishing, but later circumstances changed again.</p><p>Authentication methods and security of online bank has been improved over the period. This will drastically reduce effects of phishing based on emails and fraudulent website. The next level of online bank fraud is called banking Trojans. These Trojans infect the online customers of banks. These Trojans monitors customer’s activities and uses their authenticated session to steal customers’ money.</p><p>A lot of money is made by these kinds of attacks. Comparatively few perpetrators have been caught, and the problem is getting worse day by day. To have a better understanding of this problem, I have selected a recent malware sample named as SilentBanker. It had the capability of attacking more than 400 banks. This thesis presents the problem in general and includes my results in studying the behaviour of the SilentBanker Trojan.</p>
53

A knowledge-based approach for monitoring and situation assessment at nuclear power plants

Heaberlin, Joan Oylear 21 July 1994 (has links)
An approach for developing a computer-based aid to assist in monitoring and assessing nuclear power plant status during situations requiring emergency response has been developed. It is based on the representation of regulatory requirements and plant-specific systems and instrumentation in the form of hierarchical rules. Making use of inferencing techniques from the field of artificial intelligence, the rules are combined with dynamic state data to determine appropriate emergency response actions. In a joint project with Portland General Electric Company, a prototype system, called EM-CLASS, was been created to demonstrate the knowledge-based approach for use at the Trojan Nuclear Power Plant. The knowledge domain selected for implementation addresses the emergency classification process chat is used to communicate the severity of the emergency and the extent of response actions required. EM-CLASS was developed using Personal Consultant Plus (PCPlus), a knowledge-based system development shell from Texas Instruments which runs on IBM-PC compatible computers. The knowledge base in EM-CLASS contains over 200 rules. The regulatory basis, as defined in 10 CFR 50, calls for categorization of emergencies into four emergency action level classes: (1) notification of unusual event, (2) alert, (3) site area emergency, and (4) general emergency. Each class is broadly defined by expected frequency and the potential for release of radioactive materials to the environment. In a functional sense, however, each class must be ultimately defined by a complex combination of in- plant conditions, plant instrumentation and sensors, and radiation monitoring information from stations located both on- and off-site. The complexity of this classification process and the importance of accurate and timely classification in emergency response make this particular application amenable to an automated, knowledge-based approach. EM-CLASS has been tested with a simulation of a 1988 Trojan Nuclear Power Plant emergency exercise and was found to produce accurate classification of the emergency using manual entry of the data into the program. / Graduation date: 1997
54

Nonintrusive intelligent monitoring for nuclear power plant emergency classification

Greene, Kenneth R. (Kenneth Ray), 1958- 13 May 1991 (has links)
A prototype real-time process monitoring emergency classification expert system, RT/EM-CLASS, has been developed for use at the Trojan Nuclear Power Plant. This knowledge-based system features the integration of electronically sensed plant data with the menu selection data representation of its predecessor, EM-CLASS. This prototype demonstrates the techniques required to acquire plant process data from another computer and use that data in an expert system to determine the proper Emergency Action Level. Several benefits are realized by the RT/EM-CLASS application. These include: The resources required to make a classification are reduced thereby freeing the responsible person to devote time to other important tasks. The classification may be completed more often and with better data than the current system allows. The human user is less likely to make an erroneous Emergency Action Level classification. Prototype implementation required resolution of an efficiency problem of relating plant process data to the expert system data forms. This was achieved through the development of multi-conditional rules that significantly reduce the size of the rule set. The development of RT/EM-CLASS presents a methodology for building knowledge based applications that perform nonintrusive real-time monitoring of dynamic systems. This methodology features Use of existing analytical and Al tools where possible Monitoring of a dynamic system Non-intrusive acquisition of data from the system This technology might be applied to portions of the nuclear engineering design process (control rod programming in Boiling Water Reactors, for example) to emulate the guidance and activities of an expert. A substantial portion of the effort by the expert engineer involves preparation of the code input, running the computer code, analyzing the results, and based on the results, deciding what case to submit next. A suitably designed expert system could act in the place of the engineer in this dynamic design process. This methodology has been tested against the 1988 emergency exercise at the Trojan Nuclear Power Plant. / Graduation date: 1992
55

A Proposed Taxonomy of Software Weapons / Ett förslag på taxonomi för programvaruvapen

Karresand, Martin January 2002 (has links)
<p>The terms and classification schemes used in the computer security field today are not standardised. Thus the field is hard to take in, there is a risk of misunderstandings, and there is a risk that the scientific work is being hampered. </p><p>Therefore this report presents a proposal for a taxonomy of software based IT weapons. After an account of the theories governing the formation of a taxonomy, and a presentation of the requisites, seven taxonomies from different parts of the computer security field are evaluated. Then the proposed new taxonomy is introduced and the inclusion of each of the 15 categories is motivated and discussed in separate sections. Each section also contains a part briefly outlining the possible countermeasures to be used against weapons with that specific characteristic. </p><p>The final part of the report contains a discussion of the general defences against software weapons, together with a presentation of some open issues regarding the taxonomy. There is also a part discussing possible uses for the taxonomy. Finally the report is summarised.</p>
56

The overburdened Earth : landscape and geography in Homeric epic

Lovell, Christopher 26 October 2011 (has links)
This dissertation argues that Homer's Iliad depicts the Trojan landscape as participant in or even victim of the Trojan War. This representation alludes to extra-Homeric accounts of the origins of the Trojan War in which Zeus plans the war to relieve the earth of the burden of human overpopulation. In these myths, overpopulation is the result of struggle among the gods for divine kingship. Through this allusion, the Iliad places itself within a framework of theogonic myth, depicting the Trojan War as an essential step in separating the world of gods and the world of men, and making Zeus’ position as the father of gods and men stable and secure. The Introduction covers the mythological background to which the Iliad alludes through an examination of extra-Homeric accounts of the Trojan War’s origins. Chapter One analyzes a pair of similes at Iliad 2.780-85 that compare the Akhaian army to Typhoeus, suggesting that the Trojan War is a conflict similar to Typhoeus’ attempt to usurp Zeus’ position as king of gods and men. Chapter Two demonstrates how Trojan characters are closely linked with the landscape in the poem’s first extended battle scene (4.422-6.35); the deaths of these men are a symbolic killing of the land they defend. Chapter Three discusses the aristeia of Diomedes in Book 5, where his confrontations with Aphrodite, Ares, and Apollo illustrate the heroic tendency to disrespect the status difference between gods and men. Athena’s authorization of Diomedes’ actions reveals the existence of strife among the Olympian gods, which threatens to destabilize the divine hierarchy. Chapter Four examines the Akhaian wall whose eventual destruction is recounted at the beginning of Book 12. The wall symbolizes human impiety and its destruction is a figurative fulfillment of Zeus’ plan to relieve the earth of the burden of unruly humanity. Finally, Chapter Five treats the flußkampf and Theomachy of Books 20 and 21, episodes adapting scenes of divine combat typically associated with the struggle for divine kingship. In the Iliad, these scenes show that Zeus’ power is unassailable. / text
57

A group approach to Jean-Paul Sartre's adaptation of Euripedes' The Trojan women

Lewis, William, 1938- January 1974 (has links)
No description available.
58

Palamedes

Cantrell, Paul A. 27 April 2011 (has links)
This thesis offers a syncretic, synoptic account of Palamedes from the Trojan War. It delineates three interpretive modes: (1) that Palamedes was present all along; (2) that later poets inserted him into the Trojan narrative, either as an archetypal intellectual figure, or as Odysseus’s double; (3) that Palamedes was present only as Odysseus’s imaginary Doppelgänger. The thesis accounts for Palamedes’s scarce attention in classical texts by way of Lacanian and—via Otto Rank—Freudian psychoanalytic theory, as well as by Slavoj Žižek’s adoption of the “vanishing mediator.” After tracing a potential textual genealogy from Palamedes to Malory’s Palomydes, the thesis concludes with a reading of Palamedes’s implied presence in Inferno 26.
59

The treatment of Homeric characters by Quintus of Smyrna,

Mansur, Melvin White, January 1940 (has links)
Thesis (Ph. D.)--Columbia University, 1940. / Vita. eContent provider-neutral record in process. Description based on print version record. "List of abbreviations and bibliography": p. [79]-81.
60

Dares and Dictys an introduction to the study of medieval versions of the story of Troy ...

Griffin, Nathaniel Edward, January 1907 (has links)
Thesis (Ph. D.)--Johns Hopkins University, 1899. / Life.

Page generated in 0.1091 seconds