• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 51
  • 9
  • 8
  • 7
  • 6
  • 5
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 118
  • 25
  • 24
  • 24
  • 24
  • 24
  • 17
  • 16
  • 15
  • 13
  • 11
  • 10
  • 10
  • 10
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Dares and Dictys; an introduction to the study of medieval versions of the story of Troy ...

Griffin, Nathaniel Edward, January 1907 (has links)
Thesis (Ph. D.)--Johns Hopkins University, 1899. / Life.
62

Explorando o processo da análise de códigos maliciosos

Oliveira, Silvio Danilo de 08 August 2013 (has links)
Submitted by João Arthur Martins (joao.arthur@ufpe.br) on 2015-03-12T16:55:51Z No. of bitstreams: 2 Dissertaçao Silvio de Oliveira.pdf: 604569 bytes, checksum: 5837923262c0c58827bf0437204a80c7 (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) / Approved for entry into archive by Daniella Sodre (daniella.sodre@ufpe.br) on 2015-03-13T13:15:24Z (GMT) No. of bitstreams: 2 Dissertaçao Silvio de Oliveira.pdf: 604569 bytes, checksum: 5837923262c0c58827bf0437204a80c7 (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) / Made available in DSpace on 2015-03-13T13:15:24Z (GMT). No. of bitstreams: 2 Dissertaçao Silvio de Oliveira.pdf: 604569 bytes, checksum: 5837923262c0c58827bf0437204a80c7 (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) Previous issue date: 2013-08-08 / Programas maliciosos tornaram-se uma crescente ameaça para a sensibilidade e a disponibilidade dos dados em serviços críticos. Com a grande conectividade dos dias atuais, sistemas tornaram-se onipresentes e extremamente integrados e esta integração e onipresença facilita atividades tais como, ciberterrorismo e fraudes financeiras. O surgimento dos malwares não é algo novo, ele data de muitos anos atrás, concomitantemente com o surgimento destes códigos, também surgiram pesquisadores que não eram somente fascinados por algoritmos de computadores, mais também pela natureza matemática e a aproximação biológica encontrada nestes códigos. No começo era relativamente fácil categorizar estes tipos de códigos, mas atualmente existe uma variedade imensa, onde suas características por muitas vezes se sobrepõem, ficando assim, difícil de identificar com exatidão a que categoria o malware pertence. O espectro dos malwares cobre uma ampla variedade de ameaças específicas incluindo vírus, worms, trojan horses e spyware. Para combater estas pragas eletrônicas, precisamos antes de tudo analisar o seu código e seu comportamento, existem duas grandes vertentes no ramo da análise de malwares, a análise de código de estática, ou seja, sem executar o programa, e a análise dinâmica, existindo a necessidade da execução. Para ambos os processos de análises foram criadas inúmeras ferramentas e metodologias no intuito de facilitar suas atividades e fazer com que usuários com certo grau de conhecimento fosse capaz de identificar e classificar um código de natureza maliciosa. Mas como existe sempre dois lados da moeda, os escritores de malwares estão sempre aperfeiçoando suas técnicas para dificultar a exploração de seus códigos, dentre estas técnicas incluímos códigos polimórficos, oligomórficos, metamórficos e vários tipos de ofuscação e empacotamento de código. Neste sentido, esta dissertação visa explorar de maneira clara e objetiva os conceitos inerentes à análise de um código malicioso, mostrando suas técnicas e seus desafios. Também é objeto deste estudo, a criação de uma ferramenta que atuará no estágio inicial de uma análise estática, examinando os arquivos PE doWindows, extraindo informações do seu formato assim como a detecção de técnicas de empacotamento e anti-debugging.
63

As pinturas do templo de Juno e o Ciclo Troiano - imagem e memória épica na arquitetura da Eneida / The Pictures of Junos Temple and the Trojan Cycle: image and epic memory in the architecture of the Aeneid

Francisco Edi de Oliveira Sousa 09 September 2008 (has links)
Intitulada As Pinturas do Templo de Juno e o Ciclo Troiano: imagem e memória épica na arquitetura da Eneida, esta tese aborda relações entre essa obra e o ciclo troiano a partir do episódio das pinturas do templo de Juno (I, v. 450-493). Na vastíssima bibliografia de estudos virgilianos, tal questão ocupa ainda pouco espaço. A fim de fundamentar a investigação dessas relações, efetua-se no capítulo inicial uma análise e uma reconstituição dos poemas perdidos desse ciclo (Cantos Cíprios, Etíope, Pequena Ilíada, Saque de Ílion, Retornos e Telegonia). Recorrendo-se ao capitulo I, demonstram-se quatro proposições nos capítulos II e III: as imagens desse templo evocam em especial epopéias do ciclo troiano (cap. II.1); as imagens encontram-se ordenadas conforme essa evocação (cap. II.2); na composição desse episódio, emprega-se e encena-se a teoria retórica da arte da memória (cap. II.3); a seqüência de épicos cíclicos evocados tem continuidade nos seis cantos iniciais e desse modo participa da arquitetura da Eneida (cap. III). As investigações realizadas para demonstrar essas proposições revelam um diálogo conscientemente urdido com poemas desse ciclo e assim propiciam a concretização de novos sentidos na leitura da Eneida. Com tal procedimento, Virgílio não apenas reaviva a memória da saga de Tróia, na qual insere sua epopéia, mas também reedita o ciclo troiano em função de Enéias. / Entitled The Pictures of Junos Temple and the Trojan Cycle: image and epic memory in the architecture of the Aeneid, this dissertation focus on the relations between this literary piece of work and the Trojan cycle inspired in the episode of the paintings of Junos temple (I, v. 450-493). Despite the extensive bibliography about the Virgilian studies, this issue has not been given appropriate attention throughout the years. In order to lay the foundations of these relations, the first chapter of this study presents an analysis and a reconstitution of the Trojan cycle lost poems (Cypria, Aethiopis, Little Iliad, Sack of Ilion, Returns and Telegony). The second and third chapters deal with four propositions: the pictures of Junos temple specially evoke some poems from the Trojan cycle (cap. II.1); the images are disposed in conformity with this evocation (chapter II.2); in the composition of this episode, rhetoric theory of the art of memory is used and illustrated (chapter II.3); the sequence of evoked cyclic poems is continued in the first six books and being so plays some important role in the architecture of the Aeneid (chapter III). The investigations developed to demonstrate these propositions have revealed a dialogue consciously woven with the poems of this cycle and, therefore, propitiate the conveyance of new meanings in the reading of the Aeneid. With such proceeding Virgil not only revive the memory of the saga of Troy, in which his epic is contextualized, but he also reedit the Trojan cycle, this time, revolving around Aeneas.
64

A Proposed Taxonomy of Software Weapons / Ett förslag på taxonomi för programvaruvapen

Karresand, Martin January 2002 (has links)
The terms and classification schemes used in the computer security field today are not standardised. Thus the field is hard to take in, there is a risk of misunderstandings, and there is a risk that the scientific work is being hampered. Therefore this report presents a proposal for a taxonomy of software based IT weapons. After an account of the theories governing the formation of a taxonomy, and a presentation of the requisites, seven taxonomies from different parts of the computer security field are evaluated. Then the proposed new taxonomy is introduced and the inclusion of each of the 15 categories is motivated and discussed in separate sections. Each section also contains a part briefly outlining the possible countermeasures to be used against weapons with that specific characteristic. The final part of the report contains a discussion of the general defences against software weapons, together with a presentation of some open issues regarding the taxonomy. There is also a part discussing possible uses for the taxonomy. Finally the report is summarised.
65

Reversing Malware : A detection intelligence with in-depth security analysis

Theerthagiri, Dinesh January 2009 (has links)
More money nowadays moves online and it is very understandable that criminals want to make more money online aswell, because these days’ banks don’t have large sums of money in their cash box. Since there are many other internalrisks involved in robbing a bank, criminals have found many other ways to commit crimes and much lower risMore money nowadays moves online and it is very understandable that criminals want to make more money online as well, because these days’ banks don’t have large sums of money in their cash box. Since there are many other internal risks involved in robbing a bank, criminals have found many other ways to commit crimes and much lower risk in online crime. The first level of change involved was email-based phishing, but later circumstances changed again. Authentication methods and security of online bank has been improved over the period. This will drastically reduce effects of phishing based on emails and fraudulent website. The next level of online bank fraud is called banking Trojans. These Trojans infect the online customers of banks. These Trojans monitors customer’s activities and uses their authenticated session to steal customers’ money. A lot of money is made by these kinds of attacks. Comparatively few perpetrators have been caught, and the problem is getting worse day by day. To have a better understanding of this problem, I have selected a recent malware sample named as SilentBanker. It had the capability of attacking more than 400 banks. This thesis presents the problem in general and includes my results in studying the behaviour of the SilentBanker Trojan.
66

Determinants of silver nanoparticle toxicity

Promtong, Pawika January 2015 (has links)
Silver nanoparticles (AgNPs) containing consumer products have increasingly emerged in the market because of their potential antibacterial property, which might result in increased human exposure and environmental contamination. AgNPs are toxic to mammalian and other cells but the determinants of this toxicity remain to be fully characterised and the potential impact of DNA repair systems has been poorly explored. This study, therefore, examined to what extent the size and shape of synthesised AgNPs determined AgNP toxicity in DNA repair proficient and deficient (8-oxoguanine DNAglycosylase; WT and OGG1-/-, respectively) mouse embryonic fibroblasts (MEFs) as well as a well-known human cell line used in the toxicity testing, HepG2 cells. Citrate-stabilised spherical- and triangular-shaped AgNPs (S-AgNPs andT-AgNPs, respectively) were synthesised chemically from AgNO3 using combinations of NaBH4 and sodium citrate as a reducing and stabilising agent, respectively, and purified by dialysis. Three different sized S-AgNPs were prepared with diameters of 7.6 ± 1.2, 14.3 ± 4.2, and 52.5 ± 17.9 nm as measured using transmission electron microscope (TEM), and their zeta potentials were -36.1±2.7, -39.5±2.7 and -36.7±4.1 mV, respectively. T-AgNPs had an edge length and thickness of 71.4 ± 11.1 nm and 5.7 ± 0.8 nm, respectively. The size and zeta potential of the purified AgNPs were constant in distilled water for at least 6 months. The uptake of both S- and T-AgNPs by cells resulted in a time and dose-dependent increase in the number of cellular AgNPs and the amount of Ag+ released intracellularly. These increases were associated with a decrease in cell viability (as measured using the MTT assay) and cell survival (the clonogenic assay), and an induction in ROS generation (the DCF assay) and DNA damage(the alkaline Comet assay) for all three cell lines. AgNPs were observed in cells using TEM, suggesting the uptake of AgNPs via an endocytosis pathway. Results suggested that an increase in cellular AgNP level and intracellular released Ag+ content were associated with a time and dose-dependent toxicity. Interestingly, cellular AgNP level and intracellular released Ag+ content might play an important role in size-dependent AgNP toxicity, in which exposure to the smaller S-AgNP sizes (7nm and 14nm) resulted in higher levels of both cellular AgNPs and Ag+ released intracellularly, and then to increased toxicity when compared with the larger S-AgNP size (50nm). Moreover, different shaped AgNPs might induce toxicity by different mechanisms: ROS-mediated toxicity might be induced by both 70nm T-AgNPs and 50nm S-AgNPs and 70nm T-AgNPs might also induce cell membrane damage. AgNP-induced toxicity was different in different cell lines with HepG2 cells being more sensitive to AgNPs particularly using the clonogenic assay, and this toxicity was associated with higher DNA damage observed in HepG2 cells after 24 h. OGG1-/- MEFs were more sensitive to intracellular released Ag+, leading to higher ROS formation and DNA damage in OGG1-/- MEFs than that observed in WT MEFs. In summary, this study strongly suggests that AgNPs induce toxicity via a Trojan-horse type mechanism, and not only Ag+ released intracellularly but also cellular AgNPs take part in this toxicity, and will eventually result in the biological responses of the cells.
67

Protocols and algorithms for secure Software Defined Network on Chip (SDNoC)

Ellinidou, Soultana 16 February 2021 (has links) (PDF)
Under the umbrella of Internet of Things (IoT) and Internet of Everything (IoE), new applications with diverse requirements have emerged and the traditional System-on-Chips (SoCs) were unable to support them. Hence, new versatile SoC architectures were designed, like chiplets and Cloud-of-Chips (CoC). A key component of every SoC, is the on-chip interconnect technology, which is responsible for the communication between Processing Elements (PEs) of a system. Network-on-Chip (NoC) is the current widely used interconnect technology, which is a layered, scalable approach. However, the last years the high structural complexity together with the functional diversity and the challenges (QoS, high latency, security) of NoC motivated the researchers to explore alternatives of it. One NoC alternative that recently gained attention is the Software Defined Network-on-Chip (SDNoC). SDNoC originated from Software Defined Network (SDN) technology, which supports the dynamic nature of future networks and applications, while lowering operating costs through simplified hardware and software. Nevertheless, SDN technology designed for large scale networks. Thus, in order to be ported to micro-scale networks proper alterations and new hardware architectures need to be considered.In this thesis, an exploration of how to embed the SDN technology within the micro scale networks in order to provide secure and manageable communication, improve the network performance and reduce the hardware complexity is presented. Precisely, the design and implementation of an SDNoC architecture is thoroughly described followed by the creation and evaluation of a novel SDNoC communication protocol, called MicroLET, in order to provide secure and efficient communication within system components. Furthermore, the security aspect of SDNoC constitutes a big gap in the literature. Hence, it has been addressed by proposing a secure SDNoC Group Key Agreement (GKA) communication protocol, called SSPSoC, followed by the exploration of Byzantine faults within SDNoC and the investigation of a novel Hardware Trojan (HT) attack together with a proposed detection and defend method. / Doctorat en Sciences de l'ingénieur et technologie / info:eu-repo/semantics/nonPublished
68

Operation Trojan Shield : Om rättsstridig bevisinhämtning och utrymmet att beakta den omständigheten i strafflindrande riktning / Operation Trojan Shield : Unlawfully Obtained Evidence and its Consideration Regarding Sentence Reductions

Lindvall, Annie January 2022 (has links)
No description available.
69

Stratégies de ciblage des macrophages alvéolaires pour l’administration de glucocorticoïdes / Targeting strategies for glucocorticoid administration to alveolar macrophages

Pinheiro do nascimento, Ludmila 15 July 2019 (has links)
Au cours de ce travail de thèse nous avons proposé une stratégie de ciblage des macrophages alvéolaires afin d’y vectoriser des glucocorticoïdes. Une prodrogue de budésonide, le palmitate de budésonide (BP) a été synthétisée dans le but de prolonger sa demi-vie dans les poumons après inhalation. Des nanoparticules PEGylées de BP ont été développées et étudiées pour obtenir une formulation stable avec des caractéristiques physico-chimiques appropriées et un taux de charge élevé pour pénétrer dans les macrophages alvéolaires, cellules centrales dans l'inflammation pulmonaire. Des tests in vitro sur les macrophages RAW 264.7 ont confirmé l'activité anti-inflammatoire et l'absence de cytotoxicité des nanoparticules. Celles-ci ont ensuite été séchée au sein de microparticules Troyennes obtenues par atomisation-séchage afin de faciliter leur administration pulmonaire sous forme de poudres et libérer les nanoparticules à proximité des alvéoles pulmonaires. Les microparticulessphériques creuses contenant de 0 % à 20 % de nanoparticules de BP présentent des diamètres aérodynamiques et une fraction de particules fines appropriés pour la délivrance pulmonaire. Les études pharmacocinétiques in vivo montrent des concentrations élevées et prolongées de budésonide dans les poumons, avec de faibles concentrations plasmatiques. Dans la deuxième partie de cette thèse, une autre stratégie de ciblage des macrophages a été évaluée par la décoration de la surface des nanoparticules avec du mannose. Après la synthèse d'un lipide mannosylé, des nanoparticules ont été formulées et caractérisées, démontrant un taux de charge élevé et une bonne stabilité jusqu'à 30 jours. Des tests in vitro sur les macrophages RAW 264.7 ont montré que la présence du mannose à la surface augmente l'internalisation des nanoparticules d’un facteur 2 après 48 h d'incubation, par rapport aux nanoparticules PEGylées. / This work focuses on strategies to target glucocorticoids to alveolar macrophages. We have synthesized a budesonide prodrug, budesonide palmitate (BP), increasing its lipophilicity to extend drug half-life in the lungs. BP PEGylated nanoparticles were developed and studied to obtain a stable formulation with suitable physicochemical characteristics and high drug loading to enter alveolar macrophages, key players in lung inflammation. In vitro tests on RAW 264.7 macrophages confirmed the anti-inflammatory activity and absence of cytotoxicity of nanoparticles. These were then encapsulated into Trojan microparticles obtained by spray-drying to facilitate their delivery to the lung as dry powders and release nanoparticles directly to the pulmonary alveoli. Spherical hollow microparticles containing from 0 % to 20 % of BP nanoparticles presented suitable aerodynamic diameters and fine particle fraction for lung delivery. In vivo pharmacokinetic studies demonstrated high and extended budesonide concentrations in the lungs, with low plasma concentrations. In the second part of this thesis, another macrophage targeting strategy was assessed by decoration of nanoparticle surface with mannose. After synthesis of a mannosylated lipid, nanoparticles were formulated and characterized, demonstrating high drug loading and stability up to 30 days. In vitro tests on RAW 264.7 macrophages showed that the presence of mannose on the surface increases nanoparticles internalization 2 fold after 48 h incubation, as compared with PEGylated nanoparticles.
70

Anti-Counterfeit and Anti-Tamper Hardware Implementation using Hardware Obfuscation

Desai, Avinash R. 06 September 2013 (has links)
Tampering and Reverse Engineering of a chip to extract the hardware Intellectual Property (IP) core or to inject malicious alterations is a major concern. First, offshore chip manufacturing allows the design secrets of the IP cores to be transparent to the foundry and other entities along the production chain. Second, small malicious modifications to the design may not be detectable after fabrication without anti-tamper mechanisms. Counterfeit Integrated Circuits (ICs) also have become an important security issue in recent years, in which counterfeit ICs that perform incorrectly or sub-par to the expected can lead to catastrophic consequences in safety and/or mission-critical applications, in addition to the tremendous economic toll they incur to the semiconductor industry. Some techniques have been developed in the past to improve the defense against such attacks but they tend to fall prey to the increasing power of the attacker. We present a new way to protect against tampering by a clever obfuscation of the design, which can be unlocked with a specific, dynamic path traversal. Hence, the functional mode of the controller is hidden with the help of obfuscated states, and the functional mode is made operational only on the formation of a specific interlocked Code-Word during state transition. A novel time-stamp is proposed that can provide the date at which the IC was manufactured for counterfeit detection. Furthermore, we propose a second layer of tamper resistance to the time-stamp circuit to make it even more difficult to modify. Results show that methods proposed offer higher levels of security with small area overhead. A side benefit is that any small alteration will be magnified via the obfuscated design proposed in these methods. / Master of Science

Page generated in 0.0308 seconds