To see the other types of publications on this topic, follow the link: 3D security.

Dissertations / Theses on the topic '3D security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 21 dissertations / theses for your research on the topic '3D security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Rolland-Nevière, Xavier. "Tatouage 3D robuste." Thesis, Nice, 2014. http://www.theses.fr/2014NICE4083/document.

Full text
Abstract:
Les modèles 3D sont des contenus précieux très utilisés dans l'industrie, et donc la cible potentielle de piratages. Le tatouage robuste pour les maillages 3D apporte une réponse au problème du traçage de traître. Dans l'état de l'art du domaine, la couche d'adaptation du contenu en particulier est testée face des attaques standards. Une approche robuste à la pose est alors étudiée. Elle utilise une estimation robuste de l'épaisseur, définie comme la distance un nuage de points construits à partir de mesures du diamètre. Les performances expérimentales montrent qu'elle forme un point de départ
APA, Harvard, Vancouver, ISO, and other styles
2

Musa, Shahrulniza. "Visualising network security attacks with multiple 3D visualisation and false alert classification." Thesis, Loughborough University, 2008. https://dspace.lboro.ac.uk/2134/14241.

Full text
Abstract:
Increasing numbers of alerts produced by network intrusion detection systems (NIDS) have burdened the job of security analysts especially in identifying and responding to them. The tasks of exploring and analysing large quantities of communication network security data are also difficult. This thesis studied the application of visualisation in combination with alerts classifier to make the exploring and understanding of network security alerts data faster and easier. The prototype software, NSAViz, has been developed to visualise and to provide an intuitive presentation of the network security
APA, Harvard, Vancouver, ISO, and other styles
3

Nunnally, Troy J. "Advanced visualizations for network security." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52993.

Full text
Abstract:
Monitoring volumes of malicious network data for across multiple sources can potentially be overwhelming. As a result, vital data is at a greater risk of being overlooked and the time span for analyzing it could be too lengthy. One way to address this issue is to employ network security visualization techniques to evaluate security risks and identify malicious activity to help mitigate compromised nodes on a network. The purpose of this thesis is to introduce a visualization framework to help reduce task-completion time, enhance situational awareness, and decrease user error of complex visua
APA, Harvard, Vancouver, ISO, and other styles
4

Bishop, Craig, Ian Armstrong, and Rolando Navarette. "A Novel Method for 3D Printing High Conductivity Alloys for UHF Applications." International Foundation for Telemetering, 2014. http://hdl.handle.net/10150/577400.

Full text
Abstract:
ITC/USA 2014 Conference Proceedings / The Fiftieth Annual International Telemetering Conference and Technical Exhibition / October 20-23, 2014 / Town and Country Resort & Convention Center, San Diego, CA<br>Traditional approaches to constructing 3D structural electronics with conductive and dielectric materials include ink-jet printed, silver-bearing ink and fine copper wire meshes. One approach combines stereo-lithographic 3D-printed photo-polymers with direct-printed silver-bearing conductive inks. Results have shown 3D conductive structures with conductivities in the range 2x10⁶ to 1x10⁷ S/
APA, Harvard, Vancouver, ISO, and other styles
5

Thomas, Andrew Scott. "Exploring the Efficiency of Software-Defined Radios in 3D Heat Mapping." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/7754.

Full text
Abstract:
A common method of connecting to the internet is a wireless network. These networks can be monitored to discover the area of their coverage, but commercial receivers don't always provide the most accurate results. A software-defined radio was programmed to sniff wireless signals and tested against a commercial receiver and the results were compared. The results suggest that the software-defined radio performs at least as well as the commercial receiver in distance measurements and significantly better in samples taken per minute. It was determined that the software-defined radio is a viable re
APA, Harvard, Vancouver, ISO, and other styles
6

Mouton, Andre. "On artefact reduction, segmentation and classification of 3D computed tomography imagery in baggage security screening." Thesis, Cranfield University, 2014. http://dspace.lib.cranfield.ac.uk/handle/1826/8501.

Full text
Abstract:
This work considers novel image-processing and computer-vision techniques to advance the automated analysis of low-resolution, complex 3D volumetric Computed Tomography (CT) imagery obtained in the aviation-security-screening domain. Novel research is conducted in three key areas: image quality improvement, segmentation and classification. A sinogram-completion Metal Artefact Reduction (MAR) technique is presented. The presence of multiple metal objects in the scanning Field of View (FoV) is accounted for via a distance-driven weighting scheme. The technique is shown to perform comparably to t
APA, Harvard, Vancouver, ISO, and other styles
7

Norwood, Charles Ellis. "Demonstration of Vulnerabilities in Globally Distributed Additive Manufacturing." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/99104.

Full text
Abstract:
Globally distributed additive manufacturing is a relatively new frontier in the field of product lifecycle management. Designers are independent of additive manufacturing services, often thousands of miles apart. Manufacturing data must be transmitted electronically from designer to manufacturer to realize the benefits of such a system. Unalterable blockchain legers can record transactions between customers, designers, and manufacturers allowing each to trust the other two without needing to be familiar with each other. Although trust can be established, malicious printers or customers sti
APA, Harvard, Vancouver, ISO, and other styles
8

Peña, Guevara Javier Nilo, Acuña Leslie Dueñas, and Lynch Oscar Dupuy. "Distribuidores exclusivos de la marca MADPAX en el Perú." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2018. http://hdl.handle.net/10757/626040.

Full text
Abstract:
Esta investigación plantea un escenario de negocio de importación de ventas minorista, dónde la idea del negocio es distribuir de manera exclusiva una marca de mochilas con modelos innovadores líder en el mercado extranjero al mercado nacional, a fin de poder construir una identidad que sitúe la marca en el top of mind de nuestro mercado objetivo. Este trabajo está estructurado con los siguientes temas que representan cada uno un capítulo de esta investigación los cuales son: los aspectos generales del negocio con visión global, planeamiento estratégico analizando los factores internos y
APA, Harvard, Vancouver, ISO, and other styles
9

Beugnon, Sébastien. "Sécurisation des maillages 3D pour l'industrie de la chaussure et la maroquinerie." Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS097.

Full text
Abstract:
Avec l'augmentation des échanges de données et les évolutions technologiques et sociales récentes, les contenus multimédias prennent une place importante dans le trafic mondial. Aujourd'hui, les objets 3D sont utilisés dans un large nombre d'applications, par exemple, les applications médicales, les simulations, les jeux vidéo, l'animation et les effets spéciaux. La consommation d'objets 3D par le grand public est devenue un marché lucratif pouvant prendre la forme de plateformes de téléchargement d'objets 3D dans différents formats.Cette thèse, en collaboration avec la société STRATEGIES, con
APA, Harvard, Vancouver, ISO, and other styles
10

Itier, Vincent. "Nouvelles méthodes de synchronisation de nuages de points 3D pour l'insertion de données cachées." Thesis, Montpellier, 2015. http://www.theses.fr/2015MONTS017/document.

Full text
Abstract:
Cette thèse aborde les problèmes liés à la protection de maillages d'objets 3D. Ces objets peuvent, par exemple, être créés à l'aide d'outil de CAD développés par la société STRATEGIES. Dans un cadre industriel, les créateurs de maillages 3D ont besoin de disposer d'outils leur permettant de vérifier l'intégrité des maillages, ou de vérifier des autorisations pour l'impression 3D par exemple. Dans ce contexte nous étudions l'insertion de données cachées dans des maillages 3D. Cette approche permet d'insérer de façon imperceptible et sécurisée de l'information dans un maillage. Il peut s'agir d
APA, Harvard, Vancouver, ISO, and other styles
11

Mehdi, Ali. "Developing a Computer System for the Generation of Unique Wrinkle Maps for Human Faces. Generating 2D Wrinkle Maps using Various Image Processing Techniques and the Design of 3D Facial Ageing System using 3D Modelling Tools." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5144.

Full text
Abstract:
Facial Ageing (FA) is a very fundamental issue, as ageing in general, is part of our daily life process. FA is used in security, finding missing children and other applications. It is also a form of Facial Recognition (FR) that helps identifying suspects. FA affects several parts of the human face under the influence of different biological and environmental factors. One of the major facial feature changes that occur as a result of ageing is the appearance and development of wrinkles. Facial wrinkles are skin folds; their shapes and numbers differ from one person to another, therefore, an adva
APA, Harvard, Vancouver, ISO, and other styles
12

Jansen, van rensburg Bianca. "Sécurisation des données 3D par insertion de données cachées et par chiffrement pour l'industrie de la mode." Electronic Thesis or Diss., Université de Montpellier (2022-....), 2023. http://www.theses.fr/2023UMONS044.

Full text
Abstract:
Au cours des dernières décennies, les objets 3D sont devenus un élément essentiel de la vie quotidienne, tant dans le contexte privé que professionnel. Ces objets 3D sont souvent stockés sur le cloud et transférés sur des réseaux plusieurs fois au cours de leur existence, où ils sont susceptibles de faire l'objet d'attaques malveillantes. Par conséquent, des méthodes de sécurisation des objets 3D, comme le chiffrement ou l'insertion des données cachées, sont essentielles. Le chiffrement est utilisé pour protéger la confidentialité visuelle du contenu d’un objet 3D. Il est également possible d'
APA, Harvard, Vancouver, ISO, and other styles
13

Uddman, Lindh Carl, and Johan Norberg. "Augmented reality with holograms for combat management systems : Performance limitations for sonar tracks in a 3D map, presented with Microsoft HoloLens." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209412.

Full text
Abstract:
Technical advancements in 3D projection has recently made presentation of holographic images possible by using self-contained devices. Instead of using a screen to present objects, glasses like Microsoft HoloLens can render objects that appear as holograms around the user. SAAB Defence and Security are evaluating if this new technology can complement their command and control system 9LV Combat Management System. This degree project is a study of the technical possibilities and limitations of introducing holographic display of sonar tracks used for detecting submarines or sea mines. The project
APA, Harvard, Vancouver, ISO, and other styles
14

Brandman, Joshua Erich. "A Physical Hash for Preventing and Detecting Cyber-Physical Attacks in Additive Manufacturing Systems." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/86412.

Full text
Abstract:
This thesis proposes a new method for detecting malicious cyber-physical attacks on additive manufacturing (AM) systems. The method makes use of a physical hash, which links digital data to the manufactured part via a disconnected side-channel measurement system. The disconnection ensures that if the network and/or AM system become compromised, the manufacturer can still rely on the measurement system for attack detection. The physical hash takes the form of a QR code that contains a hash string of the nominal process parameters and toolpath. It is manufactured alongside the original geometry
APA, Harvard, Vancouver, ISO, and other styles
15

Song, Qiang. "Design of synthetic diffractive structures for 3D visualization applications and their fabrication by a novel parallel-write two-photon polymerization process." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0199.

Full text
Abstract:
Les éléments optiques diffractifs (EOD) sont maintenant largement utilisés dans les applications universitaires et industrielles grâce à leurs caractéristiques ultra-minces et compactes et à leur très flexible manipulation des fronts d'ondes lumineuses. Malgré ces excellentes propriétés, la portée d'application des EOD est souvent limitée par le fait que la plupart des DOE sont conçus pour générer uniquement des motifs projetés en 2D, et plus important encore, pour être utilisés uniquement avec des sources laser monochromatiques, cohérentes, souvent collimatées. Les contraintes de coût et de s
APA, Harvard, Vancouver, ISO, and other styles
16

Mursalin, Md. "Human identification using ear biometrics: A complete pipeline from detection to recognition." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2023. https://ro.ecu.edu.au/theses/2622.

Full text
Abstract:
Biometrics is a critical component of cybersecurity that identifies persons by verifying their behavioral and physical traits. It is the most precise and powerful physical security solution for identity verification presently in use. In biometric-based authentication, each individual can be correctly recognized based on their intrinsic behavioral or physical features. The human ear is an important biometric with highly discriminating features such that even identical twins have different ear shapes. Owing to the easy acquisition, invariance to expression, and stable structure over a long perio
APA, Harvard, Vancouver, ISO, and other styles
17

Resler, Tomáš. "Návrh domácí brány pro zařízení IoT využívající technologii Z-Wave." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400940.

Full text
Abstract:
This dissertation deals with the platform Z-Wave. This platform tries to create an universal system for smart home. The theoretical part of the work describes in details the platform itself as well as the applicable libraries for programming of applications and the available equipments. The practical part presents the new custom gateway. The hardware of this gateway is designed with utilization of the Z-Wave module, Raspberry Pi 3 microcomputer, touchscreen, powerbank and the body of the system. The body has been designed in the Solid Works CAD system and printed on a 3D printer. The needed fi
APA, Harvard, Vancouver, ISO, and other styles
18

Langin, Chester Louis. "A SOM+ Diagnostic System for Network Intrusion Detection." OpenSIUC, 2011. https://opensiuc.lib.siu.edu/dissertations/389.

Full text
Abstract:
This research created a new theoretical Soft Computing (SC) hybridized network intrusion detection diagnostic system including complex hybridization of a 3D full color Self-Organizing Map (SOM), Artificial Immune System Danger Theory (AISDT), and a Fuzzy Inference System (FIS). This SOM+ diagnostic archetype includes newly defined intrusion types to facilitate diagnostic analysis, a descriptive computational model, and an Invisible Mobile Network Bridge (IMNB) to collect data, while maintaining compatibility with traditional packet analysis. This system is modular, multitaskable, scalable, i
APA, Harvard, Vancouver, ISO, and other styles
19

Gaw, Tyler J. "ARL-VIDS visualization techniques : 3D information visualization of network security events." 2014. http://liblink.bsu.edu/uhtbin/catkey/1745749.

Full text
Abstract:
Government agencies and corporations are growing increasingly reliant on networks for day-to-day operations including communication, data processing, and data storage. As a result, these networks are in a constant state of growth. These burgeoning networks cause the number of network security events requiring investigation to grow exceptionally, creating new problems for network security analysts. The increasing number of attacks propagated against high-value networks only increases the gravity. Therefore, security analysts need assistance to be able to continue to monitor network events at an
APA, Harvard, Vancouver, ISO, and other styles
20

Moein, Samer. "Systematic Analysis and Methodologies for Hardware Security." Thesis, 2015. http://hdl.handle.net/1828/6954.

Full text
Abstract:
With the increase in globalization of Integrated Circuit (IC) design and production, hardware trojans have become a serious threat to manufacturers as well as consumers. These trojans could be intensionally or accidentally embedded in ICs to make a system vulnerable to hardware attacks. The implementation of critical applications using ICs makes the effect of trojans an even more serious problem. Moreover, the presence of untrusted foundries and designs cannot be eliminated since the need for ICs is growing exponentially and the use of third party software tools to design the circuits i
APA, Harvard, Vancouver, ISO, and other styles
21

Chen, Kuan-Chieh, and 陳冠傑. "A Study on Autonomous Vehicle Navigation by 2D Object Image Matching and 3D Computer Vision Analysis for Indoor Security Patrolling Applications." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/34337662999305229023.

Full text
Abstract:
碩士<br>國立交通大學<br>多媒體工程研究所<br>96<br>A vision-based vehicle system for security patrolling in indoor environments using an autonomous vehicle is proposed. A small vehicle with wireless control and a web camera which has the capabilities of panning, tilting, and zooming is used as a test bed. At first, an easy-to-use learning technique is proposed, which has the capability of extracting specific features, including navigation path, floor color, monitored object, and vehicle location with respect to monitored objects. Next, a security patrolling method by vehicle navigation with obstacle avoidance
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!