To see the other types of publications on this topic, follow the link: Activity of attack.

Dissertations / Theses on the topic 'Activity of attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 18 dissertations / theses for your research on the topic 'Activity of attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Meela, Moraba Macdonald. "Evaluation of alien invasive weedy plants for activity against plant pathogenic fungi." Diss., University of Pretoria, 2009. http://hdl.handle.net/2263/23195.

Full text
Abstract:
Plant fungal pathogens are a major threat to food security worldwide. The most important method of protecting plants against fungal attack is the use of fungicides, but the development of resistance towards synthetic fungicides is of great concern. Moreover, the health risks associated with the use of chemical fungicides increase the need to search for safe, efficacious and environmentally friendly fungicides. Plants produce antifungal agents by secondary metabolism to protect themselves from fungal attack, and therefore many plant species have substantial antifungal activity. The use of plant extracts could enable the development of inexpensive and environmentally acceptable fungicides based on locally available natural products. This study was undertaken to investigate weedy and invasive plant species for antifungal activity against plant pathogens in order to develop a useful product using a widely available resource. Acetone leaf extracts of seven invasive species (Chromoleana odorata, Ipomoea alba, Tecoma stans, Passiflora suberosa, Passiflora subpeltata, Aristolochia sp, Solanum seaforthianum) were screened against eight plant fungal pathogens viz Rhizoctonia solani, Fusarium oxysporium, Penicillum janthinellum, Penicillum expansum, Aspergillus parasiticus, Aspergillus niger, Pythium ultimum and Phytophthora nicotiana, using microdilution assay and bioautography. The acetone extract of Tecoma stans had reasonable antifungal activity with an average minimal inhibitory concentration (MIC) value against all the fungi of 550 ìg/ml and clear zones on bioautograms indicating inhibition of fungal growth of a compounds with an Rf of 0.082 in BEA against several of the fungal pathogens. Due to the clear compound on bioautography and availability of Tecoma stans, this species was selected for further work. Bioassay-guided fractionation of the leaves of the Tecoma stans dichloromethane (DCM) extract obtained from solvent-solvent fractionation resulted in one major compound, oleanolic acid. The isolated compound had antifungal activity with an average MIC value of 130 ìg/ml against the 10 plant pathogenic fungi and clear bands with an Rf value of 0.082 on bioautograms, indicating fungal growth inhibition. It was surprising that the MIC value of the crude DCM extract was as high as that of the only compound with antifungal activity based on bioautography. These results clearly indicated the possibility of synergisms especially since the average total activity of the extract was nearly 6.5 times higher than that of oleanolic acid with total activity values of 60154 ml for the extract and 9262 ml for oleanolic acid. Cellular cytotoxicity of DCM extract and oleanolic acid was investigated using tetrazoliumbased colorimetric assay (MTT) on Vero monkey kidney cells. The toxicity of the extract and oleanolic acid was determined by LC50 values. The DCM extract and oleanolic acid were toxic with and LC50 of 0.413 mg/ml and 0.129 mg/ml respectively, lower than that of berberine the toxic compound used as control. However therapeutic index which can be defined here as the LC50 in (ìg/ml)/MIC in (ìg/ml), indicated that though the extract and oleanolic acid were toxic, they could be used under controlled conditions against infections of certain of the fungal pathogens. The crude extract had a high therapeutic index value of 21 against microorganisms T. harzianum, R. solani, F. oxysporium and P. expansum; and oleanolic acid had high therapeutic index values of 16 and 64 of against T. harzianum and R.solani respectively. This high therapeutic index value of crude extract and oleanolic acid means that, crude extract and oleanolic acid may be used for treatment of infections by these tested fungi with very little toxicity under controlled conditions. Oleanolic acid had very low antibacterial activity (MIC >250 ìg/ml). against two Grampositive (Staphylococcus aureus, ATCC 29213 and Enterococcus faecalis, ATCC 29212) and two Gram-negative bacteria (Escherichia coli, ATCC 27853 and Pseudomonas aeruginosa, ATCC 25922). Animal pathogenic fungi were more resistant than the plant fungal pathogens. Based on the good activity of the DCM crude extract, the surprising selectivity in activity against different fungi coupled with reasonably good therapeutic indexes and the wide availability of T stans leaves opens up the possibility that a commercial product to protect plants against certain pathogens may be developed from T. stans leaves. Copyright
Dissertation (MSc (Veterinary Science))--University of Pretoria, 2008.
Paraclinical Sciences
unrestricted
APA, Harvard, Vancouver, ISO, and other styles
2

Smith, Kelly Lynne. "Individual Differences in Activity and Responses to a Predator Attack in Juvenile Smallmouth Bass (Micropterus Dolomieui)." Bowling Green State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1182192767.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.

Full text
Abstract:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2007.
Xu, Jun, Committee Chair ; Ahamad, Mustaque, Committee Member ; Ammar, Mostafa, Committee Member ; Bing, Benny, Committee Member ; Zegura, Ellen, Committee Member.
APA, Harvard, Vancouver, ISO, and other styles
4

Quilliam, Richard S. "The role of cell wall invertase activity in source-sink relations in vegetative tissues of Arabidopsis thaliana and in response to wounding and pathogen attack." Thesis, University of Sheffield, 2007. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.752717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Palm, Emelie, and Sara Josefsson. "Fysisk aktivitet, rörelserädsla och livskvalitet hos individer som genomgått hjärtinfarkt och/eller hjärtoperation." Thesis, Uppsala universitet, Fysioterapi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-337629.

Full text
Abstract:
Sammanfattning Bakgrund: Hjärt -och kärlsjukdom är den vanligaste folksjukdomen i Sverige. Fler män än kvinnor drabbas och c:a 20% av de som drabbats lider utav rörelserädsla. Fysisk aktivitet är en viktig del i primär- och sekundärprevention. Livskvaliteten kan påverkas negativt efter hjärt-och kärlsjukdom. Syfte: Syftet var att studera samband mellan självskattad fysisk aktivitet, självskattad rörelserädsla och självskattad livskvalitet hos individer som drabbats av hjärtinfarkt och/eller genomgått hjärtoperation. Syftet var även att studera om det fanns några könsskillnader avseende rörelserädsla och livskvalitet i denna patientgrupp. Metod: Studien var en icke-experimentell kvantitativ tvärsnittsstudie där enkäter lagt grunden till beskrivande, korrelerande och jämförande design. Resultat: 29 deltagare medverkade. Totalt 19% av deltagarna led av rörelserädsla. Det förekom ingen skillnad mellan könen i median avseende varken rörelserädsla eller livskvalitet. Korrelationskoefficienten var 0,387 (p = 0,07) mellan fysisk aktivitet och livskvalitet i hela gruppen. Sambandet mellan rörelserädsla och livskvalitet var r = -0,460 (p = 0,03). Konklusion: Resultatet stämmer överens med tidigare forskning avseende andelen individer som lider utav rörelserädsla. Inga skillnader påvisades mellan fysisk aktivitet och livskvalitet men ett måttligt negativt samband förelåg mellan rörelserädsla och livskvalitet.
APA, Harvard, Vancouver, ISO, and other styles
6

Bajan, Pierre-Marie. "Simulation d'activités et d'attaques : application à la cyberdéfense." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLL014/document.

Full text
Abstract:
Alors que l'importance des infrastructures ne fait que croître, les systèmes de détections et de traitements des attaques sont majoritairement faits pour remonter un seul type des deux grands formats d'attaques : les attaques de masses. Les attaques ciblées quant à elle, bien que d'une grande dangerosité de par leur spécificité et des profondeurs atteintes dans les systèmes, restent traités avec une certaine inefficacité par les systèmes informatiques. Pourtant il y a des équipements remontants des informations et des alertes mais les opérateurs souvent peu entraînés à la gestion des incidents se retrouvent engloutis par la quantité d'informations qu'ils leur sont remontés. Le principe de cette thèse serait de fournir des outils permettant la formation des opérateurs et un meilleur traitement des informations remontées. On approcherait le problème de la manière suivante : on va tout d'abord émuler le système informatique d'une petite entreprise avec ces différents utilisateurs et ces services informatiques. Cela servira à générer les données d'un comportement normal et régulier du système mais également le comportement d'une attaque. Une fois le système est émulé et les données sont générées on va se servir de ces données pour simuler le système selon les besoins que nous avons de la simulation. Cette simulation sera plus légère que l'émulation et sera capable de passage à l'échelle et une modification plus dynamique de l'architecture et du comportement du système. Le but étant d'avoir un outil léger et adaptable capable de simuler différents comportements et conditions d'un système d'entreprise pour être utiliser pour faire des formations d'opérateurs et des tests d'utilisation plus complet d'outil de sécurité. Le tout sera supervisé par la console de contrôle de simulation qui va gérer la simulation mais également recevoir les informations de chaque composant et de la console opérateur. Le contrôle de la simulation inclue la capacité de créer des incidents et problèmes dans le système mais également de créer des attaques à l'encontre du système
The concern over the security of the infrastructure of a company is only growing deeper and became a source of worries for companies. They use different systems to detect and deal with attack but those systems are usually made to detect one type only of the two main type of attack: attacks made to target the largest amount of people possible. Targeted attacks are rarer but more dangerous as it penetrates deep into a system and are very specifics. However the systems used to deal with it are proved of limited efficiency. Even when they send alerts and news to the operator, there is just to much information going along with it making the often ill-trained operators unable to react and overwhelm by massive information. The goal of this thesis is to create a tool that would help to form operator but also help to test more efficiently security systems. We'll approach the problem by first emulating the infrastructure and services of a small company with its different users and services. It will be use to create the data of the regular operations and interactions of a company during normal activity but also under attack. Once the system is emulated and we collected the necessary data, we will start to simulate the system according to what we need the simulation for. This simulation would need less resources than the emulation and will be scalable and capable to be dynamically change according to the needs. The aim is to have a light tool capable to simulate different behaviors and different type of realist simulation of a system to help improve the formation of operators and also test security devices more fully. The whole would be supervised by a console of control of the simulation who will receive the information of the simulated elements and the simulated operator console. It would have the capacity to create incidents and problems into the systems along with attacks
APA, Harvard, Vancouver, ISO, and other styles
7

Hammi, Badis. "Vers une détection à la source des activités malveillantes dans les clouds publics : application aux attaques de déni de service." Thesis, Troyes, 2015. http://www.theses.fr/2015TROY0023/document.

Full text
Abstract:
Le cloud computing, solution souple et peu couteuse, est aujourd'hui largement adopté pour la production à grande échelle de services IT. Toutefois, des utilisateurs malveillants tirent parti de ces caractéristiques pour bénéficier d'une plate-forme d'attaque prête à l'emploi dotée d'une puissance colossale. Parmi les plus grands bénéficiaires de cette conversion en vecteur d’attaque, les botclouds sont utilisés pour perpétrer des attaques de déni de service distribuées (DDoS) envers tout tiers connecté à Internet.Si les attaques de ce type, perpétrées par des botnets ont été largement étudiées par le passé, leur mode opératoire et leur contexte de mise en œuvre sont ici différents et nécessitent de nouvelles solutions. Pour ce faire, nous proposons dans le travail de thèse exposé dans ce manuscrit, une approche distribuée pour la détection à la source d'attaques DDoS perpétrées par des machines virtuelles hébergées dans un cloud public. Nous présentons tout d'abord une étude expérimentale qui a consisté à mettre en œuvre deux botclouds dans un environnement de déploiement quasi-réel hébergeant une charge légitime. L’analyse des données collectées permet de déduire des invariants comportementaux qui forment le socle d'un système de détection à base de signature, fondé sur une analyse en composantes principales. Enfin, pour satisfaire au support du facteur d'échelle, nous proposons une solution de distribution de notre détecteur sur la base d'un réseau de recouvrement pair à pair structuré qui forme une architecture hiérarchique d'agrégation décentralisée
Currently, cloud computing is a flexible and cost-effective solution widely adopted for the large-scale production of IT services. However, beyond a main legitimate usage, malicious users take advantage of these features in order to get a ready-to-use attack platform, offering a massive power. Among the greatest beneficiaries of this cloud conversion into an attack support, botclouds are used to perpetrate Distributed Denial of Service (DDoS) attacks toward any third party connected to the Internet.Although such attacks, when perpetrated by botnets, have been extensively studied in the past, their operations and their implementation context are different herein and thus require new solutions. In order to achieve such a goal, we propose in the thesis work presented in this manuscript, a distributed approach for a source-based detection of DDoS attacks perpetrated by virtual machines hosted in a public cloud. Firstly, we present an experimental study that consists in the implementation of two botclouds in a real deployment environment hosting a legitimate workload. The analysis of the collected data allows the deduction of behavioural invariants that form the basis of a signature based detection system. Then, we present in the following a detection system based on the identification of principal components of the deployed botclouds. Finally, in order to deal with the scalability issues, we propose a distributed solution of our detection system, which relies on a mesh peer-to- peer architecture resulting from the overlap of several overlay trees
APA, Harvard, Vancouver, ISO, and other styles
8

Ocampo, Mascaró Javier, Salazar Vera Jimena Silva, and Costa Bullón Abilio da. "Correlación entre conocimientos sobre consecuencias de la obesidad y grado de actividad física en universitarios." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2015. http://hdl.handle.net/10757/621624.

Full text
Abstract:
Introducción. El objetivo del presente estudio es determinar si existe correlación entre los conocimientos sobre las consecuencias de la obesidad y el grado de actividad física de las personas. Métodos. Se realizó un estudio transversal analítico durante los años 2013 y 2014. Participaron 215 alumnos de pregrado seleccionados por conveniencia no relacionados a carreras del campo de la salud en una universidad de Lima, Perú. Se evaluó el grado de actividad física utilizando el International Physical Activity Questionnaire (IPAQ) y el nivel de conocimientos sobre consecuencias de la obesidad utilizando la escala Obesity Risk Knowledge-10 (ORK-10). También, se consignó las fuentes de información de donde obtuvieron el conocimiento para responder dicho cuestionario. Resultados. La mediana de edad fue 20 (rango intercuartílico=4) y 63% eran mujeres. De acuerdo al IPAQ, 53,9% realizaban actividad física alta, 35,4%, moderada y 10,7%, leve. Se encontró una correlación muy baja (rs=0,06) entre el puntaje del ORK-10 y la cantidad de equivalentes metabólicos/minuto consumidos por semana, pero no era significativa (p=0,38). Las personas informadas por medios de comunicación y por personal de salud obtuvieron mayores puntajes en el ORK- 10 que quienes se informaron por otras vías (p<0,05). Conclusiones. La correlación entre los conocimientos sobre consecuencias de la obesidad y el grado de actividad física es muy baja. Es necesario utilizar enfoques multidisciplinarios que incluyan todos los determinantes de la realización de actividad física para poder lograr cambios en la conducta de la población.
APA, Harvard, Vancouver, ISO, and other styles
9

Liao, Zhe Hui, and 廖哲輝. "A Method to Defend Against Activity Hijacking Attack by Using Shared-memory Side Channel." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/6vy494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Бігун, Олеся Вікторівна. "Еколого-фауністичні особливості родини Culicidae у Херсонській області." Магістерська робота, 2020. https://dspace.znu.edu.ua/jspui/handle/12345/4175.

Full text
Abstract:
Бігун О. В. Еколого-фауністичні особливості родини Culicidae у Херсонській області : кваліфікаційна робота магістра спеціальності 101 "Екологія" / наук. керівник В. В. Горбань. Запоріжжя : ЗНУ, 2020. 73 с.
UA : Робота виконана на 73 сторінках, 26 рисунки, 2 таблиці, 58 літературних джерел, з них 6 іноземною мовою. Об’єкт дослідження: кровосисні комарі Херсонської області. Предмет дослідження: еколого-фауністичні особливості родини Culicidae. Методи дослідження: загальноприйняті ентомологічні методи збору, лабораторного аналізу та статистичної обробки. Метою кваліфікаційної роботи було вивчення еколого-фауністичні особливості родини Culicidae Херсонської області. Теоретично та експериментально визначено: видовий склад кровосисних комарів та їх масовість, домінуючі види кровосисних комарів, сезонну та річну динаміку чисельності комарів, профілактичні заходи щодо зменшення чисельності кровосисних комарів. Новизна та актуальність досліджень полягає у тому, що подібні дослідження дозволять прогнозувати поширення кровосисними комарами небезпечних трансмісивних захворювань у Херсонській області. Значущість роботи полягає в тому, що отримані результати можуть будь використані ентомологами районних, міських санітарно-епідеміологічними станціями для ефективного проведення заходів з обмеження чисельності кровосисних комарів на території Херсонської області.
EN : Work is executed on 73 pages, 26 рисунки, 2 tables, 58 literary sources, from them 6 by a foreign language. The object of the research is bloodsucking mosquitoes of the Kherson area. The subject of the study is ecologo-faunistic features of family of Culicidae. Research methods: the generally accepted methods of entomologist of collection, labtest and statistical treatment. The purpose of the qualification work is a study ecologo-faunistic features of family of Culicidae of the Kherson area. Theoretically and experimentally determined: specific composition of bloodsucking mosquitoes and their mass character, dominant types of bloodsucking mosquitoes, seasonal and annual dynamics of quantity of mosquitoes, prophylactic measures in relation to reduction to the quantity of bloodsucking mosquitoes. A novelty and actuality of researches consist in that similar researches will allow to forecast distribution of dangerous трансмісивних diseases bloodsucking mosquitoes in the Kherson area. Meaningfulness of work consists in that the got results can be used by the entomologists of district, municipal the санітарно-епідеміологічними stations for effective realization of measures on the limit of quantity of bloodsucking mosquitoes on territory of the Kherson area.
APA, Harvard, Vancouver, ISO, and other styles
11

Bittengl, Martin. "Analýza ofenzivní a defenzivní činnosti při standardních situacích." Master's thesis, 2011. http://www.nusl.cz/ntk/nusl-300516.

Full text
Abstract:
Title: An analysis of the ofensive and defensive activities in set plays Objectives: The main objective of this work is to analyze the implementation of set-plays in the offensive phase of the game matches teams selected for the Champions League 2009/2010. Identification of the key moments leading to successful or unsuccessful completion. Description and graphical representation of the set-plays. Methods: In our work we used as the primary method of obtaining data on the phenomenon of mediated reference, registered observations. It is the indirect observation of DVDs with each team, where we watched our investigation established criteria. The research section has been used both quantitative and qualitative analysis. Quantitative analysis, we obtained data on the frequency of observed phenomena, qualitative analysis shows the critical points and the current developments in implementation of set-plays . Models based on the graphical representation we then facilitate the application of this knowledge in the training practical. Results: The results reveal the ways plays for set-plays were used in the Champions League 2009/2010 in the offensive phase of game and the negotiations in the process of defense. They point to developments and changes occurring with different frequency factors. Keywords:...
APA, Harvard, Vancouver, ISO, and other styles
12

McElligott, Paul Edward Kaye. "Seasonal abundance, physiological age, and daily activity of host-seeking horse flies (Diptera: Tabanidae) at Seven Sisters, Manitoba, with an evaluation of permethrin spray treatments as a means of increasing the performance of growing beef heifers subject to horse fly attack." 1989. http://hdl.handle.net/1993/7190.

Full text
Abstract:
Effects of biweekly permethrin treatments on the weight gain performance of growing beef heifers subject to attack by large numbers of blood-feeding tabanids was evaluated. In 1987 and 1988 respectively, groups of 55 and 72 heifers (of similar age and weight) were divided into two herds. Animals in one herd received biweekly whole-body sprays of permethrin (aqueous emulsion, 0.5% permethrin, applied at 1 L/animal), while the other herd was left untreated. Animals in both herds were weighed biweekly and those in one herd were treated concomitantly from early June through mid July. Permethrin spray treatments did not effectively reduce the impact of horse flies on the animals' weight gains. No consistent trend was apparent in differences between the average daily weight gains of animals in untreated and treated herds, and animals in both herds gained, on average, from 35.38 to 44.82 kg over the 6-week experimental period in both years. Tabanids were trapped from dawn until dusk using four Manitoba Horse Fly Traps (MHFT's) at Seven Sisters, from mid May until mid July in 1987, and from mid May until mid August in 1988, to determine the seasonal activity patterns of the various species present. Thirty one tabanid species in four genera (Hybomitra (15 spp.), Tabanus (4 spp.), Chrysops (11 spp.), Haematopota (1 sp.)), of which ten Hybomitra sp. were abundant, were present in MHFT catches. Hybomitra lurida (Fallen), and H. nitidifrons nuda (McDunnough) peaked in abundance in late May to early June; H. illota (Osten Sacken) and H. lasiophthalma (Macquart) in early June; H. affinis (Kirby), H. arpadi (Szilady), and H. zonalis (Kirby) in mid June; and H. epistates(O.S.) and H. pechumani Teskey & Thomas in late June to early August. Hybomitra trepid (McD.) peaked in abundance twice, in late June and early August. Tabanid density and diversity was greatest during June, and few flies were present at the site after mid July. Subsamples (10-30 flies) of daily trap catches were dissected to determine seasonal changes in the per cent parity of ten abundant Hybomitra species. At the beginning of the flight season, 80 to 100% of flies dissected were nulliparous. As the flight season progressed, however, an increasing proportion of flies captured were parous. After approximately one month of flight activity, parity in all but three species reached levels approaching 100%, and remained high thereafter. Hybomitra lurida and H. nitidifrons nuda were 100% parous within two weeks of their first appearance in trap catches, and parity of H. trepida increased to 100% after four weeks, declined to 40% two weeks later, and rose again to 100% after a further 2 weeks...
APA, Harvard, Vancouver, ISO, and other styles
13

Lin, Liang-Hsuan, and 林良軒. "AHA: An Event-Driven Solution to Activity Hijacking Attacks." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/cb8yvj.

Full text
Abstract:
碩士
國立中央大學
資訊工程學系
103
In recent years, the Android Component Hijacking Vulnerabilities are widely discussed. This kind of vulnerabilities may cause tremendous problem in the system. If any of the Android Components has been hijacked, it may disclose user’s personal information or private data to the attacker. To be more precisely, those attacks will redirect or hijack the Android Component’s original workflow to malicious code or even to the extent that execute a malware. One of the Android Components is Activity, it construct the UI frames for the user. In this paper, we focus on Activity Hijacking Attacks. As the name implies, Activity Hijacking Attacks is to hijack the original activity workflow while users are using. We construct our solution in Android framework called AHA to keep track of every activity workflow and knowing the layout about the activity. Our solution AHA can stop the attack which using the Activity Hijacking Attacks to steal user’s personal information. Furthermore, AHA can easily patched into existing Android system and with ignorable overhead.
APA, Harvard, Vancouver, ISO, and other styles
14

Silva, Fábio Alexandre Henriques da. "Detection of distributed denial of service attacks at source." Master's thesis, 2018. http://hdl.handle.net/10773/27819.

Full text
Abstract:
From year to year new records of the amount of traffic in an attack are established, which demonstrate not only the constant presence of distributed denialof-service attacks, but also its evolution, demarcating itself from the other network threats. The increasing importance of resource availability alongside the security debate on network devices and infrastructures is continuous, given the preponderant role in both the home and corporate domains. In the face of the constant threat, the latest network security systems have been applying pattern recognition techniques to infer, detect, and react more quickly and assertively. This dissertation proposes methodologies to infer network activities patterns, based on their traffic: follows a behavior previously defined as normal, or if there are deviations that raise suspicions about the normality of the action in the network. It seems that the future of network defense systems continues in this direction, not only by increasing amount of traffic, but also by the diversity of actions, services and entities that reflect different patterns, thus contributing to the detection of anomalous activities on the network. The methodologies propose the collection of metadata, up to the transport layer of the osi model, which will then be processed by the machien learning algorithms in order to classify the underlying action. Intending to contribute beyond denial-of-service attacks and the network domain, the methodologies were described in a generic way, in order to be applied in other scenarios of greater or less complexity. The third chapter presents a proof of concept with attack vectors that marked the history and a few evaluation metrics that allows to compare the different classifiers as to their success rate, given the various activities in the network and inherent dynamics. The various tests show flexibility, speed and accuracy of the various classification algorithms, setting the bar between 90 and 99 percent.
De ano para ano são estabelecidos novos recordes de quantidade de tráfego num ataque, que demonstram não só a presença constante de ataques de negação de serviço distribuídos, como também a sua evolução, demarcando-se das outras ameaças de rede. A crescente importância da disponibilidade de recursos a par do debate sobre a segurança nos dispositivos e infraestruturas de rede é contínuo, dado o papel preponderante tanto no dominio doméstico como no corporativo. Face à constante ameaça, os sistemas de segurança de rede mais recentes têm vindo a aplicar técnicas de reconhecimento de padrões para inferir, detetar e reagir de forma mais rápida e assertiva. Esta dissertação propõe metodologias para inferir padrões de atividades na rede, tendo por base o seu tráfego: se segue um comportamento previamente definido como normal, ou se existem desvios que levantam suspeitas sobre normalidade da ação na rede. Tudo indica que o futuro dos sistemas de defesa de rede continuará neste sentido, servindo-se não só do crescente aumento da quantidade de tráfego, como também da diversidade de ações, serviços e entidades que refletem padrões distintos contribuindo assim para a deteção de atividades anómalas na rede. As metodologias propõem a recolha de metadados, até á camada de transporte, que seguidamente serão processados pelos algoritmos de aprendizagem automática com o objectivo de classificar a ação subjacente. Pretendendo que o contributo fosse além dos ataques de negação de serviço e do dominio de rede, as metodologias foram descritas de forma tendencialmente genérica, de forma a serem aplicadas noutros cenários de maior ou menos complexidade. No quarto capítulo é apresentada uma prova de conceito com vetores de ataques que marcaram a história e, algumas métricas de avaliação que permitem comparar os diferentes classificadores quanto à sua taxa de sucesso, face às várias atividades na rede e inerentes dinâmicas. Os vários testes mostram flexibilidade, rapidez e precisão dos vários algoritmos de classificação, estabelecendo a fasquia entre os 90 e os 99 por cento.
Mestrado em Engenharia de Computadores e Telemática
APA, Harvard, Vancouver, ISO, and other styles
15

Jeng, Liang-Yi, and 鄭良儀. "Wind Tunnel Verification of Actively Controlled High-Rise Building under Varied Attack Angle of Wind." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/34230446891234885425.

Full text
Abstract:
碩士
淡江大學
土木工程學系
89
Slender structures, if appropriately designed, are safe under wind load, yet the excessive deflection of such structures due to its high flexibility might degrade the serviceability. A traditional way by directly augmenting the member cross-section to increase the structural stiffness is a choice, however, it will increase the construction fee and decrease the usable space of the structure. Recently, the idea of active control is proved to be an effective way in this aspect. By using active control, both of the structural damping and stiffness can be properly adjusted such that the structural responses are decreased. In this way, the requirements for structural strength and serviceability are simultaneously satisfied. In the last decade, many research efforts have demonstrated that the use of active control is able to achieve remarkable results in reducing the wind-induced vibration for high-rise buildings. However, most of them are accomplished using numerical simulation, in which the wind loads used can not fully represent the real situation in site. The response of the actual structure under wind loads hall is much more complicated than numerical simulation, especially when active control is employed. Therefore, experimental study of active control via wind tunnel tests is very important toward mature implementation to actual buildings. In this paper, a 4 degree-of-freedom scaled (1:300) model of a high-rise building equipped with active mass driver (AMD) is constructed on a wind tunnel to experimentally verify the applicability of active control for wind-induced motion under varied attack angle of wind. To account for the time delay problem caused by active device, the interaction effect between the actuator and structure, i.e., the so-called control-structure interaction (CSI), is considered in the system identification scheme. Then, a system reduction method called the balance state reduction is further applied to the identified system to obtain the nominal system for the design of control law. The control law is designed based on the Linear Quadratic Gaussian (LQG) theorem in which a dynamic output feedback equation with acceleration feedback is formed for practical implementation. From the experimental results, it is shown that the performance of active controller is remarkable in reducing the building responses due to the buffeting effect under different attack angle of wind. Furthermore, the numerical simulation using the identified analytical model is conducted and the results are compared with those from the experiments. It is demonstrated that the correlation between the experimental and simulated results is quite satisfactory.
APA, Harvard, Vancouver, ISO, and other styles
16

Lee, Hsin-Hsiung, and 李新雄. "Exploring the Intention of Electronic Commerce Activity consider with Phishing Attacks by Theory of Planned Behavior View." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/51156789026615775962.

Full text
Abstract:
碩士
華梵大學
資訊管理學系碩士班
94
The Internet becomes more popular to promote the higher rapidly development of the new online business model, E-commerce. The E-commerce has brought the more benefits and convenience on the personal consumption, the regional economy, the global logistics as well as the online e-services. However, the online theft and attacks through the Internet tend to be on the rise progressively to gain illegal blood money. The Phishing attack is one of the major fraud crimes, which may inhibit consumers to use the e-commerce. Hence, we proposed a research model to explore the consumer intention of the e-commerce activities considering with the Phishing attack. This study is based on the Decomposed Theory of Planned Behavior with The Behavior Intention of Trust factor. By looking at the aspects of the Attitude to use, the Subjective Norm, and the Perceived Behavior Control, we will discuss if the attacks have affected the consumers’ behavior intention towards E-commerce activities under the epidemic Internet Phishing of E-mail attaches. Also, we will discuss if the threats of loses caused by Phishing attacks will affect consumers’ “Trust” and further reduce the intention of using the E-commerce. The sample size of data analysis is 229. Then the method of Structural Equation Modeling (SEM) is used to test the goodness of fit and the causal-effect of the proposed model. The result of this study shows that the model has the suitable goodness of fit. The major findings of this study are as follows:(1)”Perceived trust” will positively affect the consumer intention to use the e-commerce ;(2)” Perceived Phishing attack ” will negatively affect the consumer intention to use the e-commerce; (3)The consumers’ “Attitudes to use”, “Perceived Behavioral Control”, and “Trust” will has significantly positively affected consumers’ behavioral intention of using E-commerce. (4) As for the aspect of the Subjective Norm, it is unremarkably affected by the Phishing attacks. In the conclusion of this study, we suggest that ISPs and Enterprises should be the gatekeepers for the consumers. They should reinforce the inspection of Phishing attacks, Web-sites as well as E-mail. In addition, they should adopt the Anti-Phishing technology as well as definitely declare and educate the consumers to protect their own personal private information to avoid being the Phishing attacks. The more consumers trust to the e-commerce, the stronger consumers’ intention to use the e-commerce. Furthermore, it will decrease the consumers’ and the enterprises’ financial loses at the same time.
APA, Harvard, Vancouver, ISO, and other styles
17

Martins, Inês Alexandra Henriques. "Lisboa Desporto: how to attract and maintain motivated non-professional athletes." Master's thesis, 2018. http://hdl.handle.net/10071/18406.

Full text
Abstract:
As part of the application for Lisbon – European Capital of Sport 2021 developed in partnership between INDEG-ISCTE-IUL and the City Council, this study aims to analyse the determinants that people face when practising physical activity or sport. The positive outcomes from practising sport and physical activity are vast and vary from health related factors to psychological factors. Despite the attempts made nationally and by the EU, the active population practising sport or physical activity still is lower than expected. Therefore, this study contributes to the clarification of motivations and constraints that influence different genders and age range to practise sport and physical activity. This way, adequate policies and strategies can be developed and applied. After the literature review, the main factors, widely used to explain participation were identified. In fact, they were divided into three main dimensions: Motivations, Individuals’ limitations and environmental barriers. Data was collected from professionals directly related to physical activity and sport participation in Lisbon. Through the statistical analysis, the information was segmented, and conclusions regarding the differences between gender and age ranges were drawled. It was concluded that the months where the abandonment is higher, regardless age or gender, are January and February. Concerning the sport and physical activity determinants: it were found differences in gender for all determinants, it were found differences in all determinants, with the exception of environmental barriers, for different age ranges.
No âmbito do projeto do projeto Lisboa – Capital Europeia do desporto, desenvolvido pelo INDEG-ISCTE-IUL em parceria com a Câmara Municipal de Lisboa, este estudo pretende analisar quais os fatores que motivam e limitam as pessoas a praticar desporto e atividade física. Os impactos positivos da prática de exercício físico e desporto são vastos e variam desde fatores de saúde a fatores psicológicos. Apesar dos esforços feitos nacionalmente e pela União Europeia, as taxas de população ativa a nível da prática desportiva continuam aquém do esperado. Deste modo, visou-se perceber quais os determinantes que influenciam os diferentes géneros e faixas etárias a praticar desporto e atividade física para que, possam ser desenvolvidas e aplicas estratégias adequadas. Após a revisão de literatura foi possível identificar os fatores mais relevantes e amplamente utilizados para estudar a participação. Na realidade, foram divididos em três grandes grupos: Motivações, limitações do indivíduo e barreiras do meio envolvente. A informação foi recolhida junto de profissionais diretamente relacionados com a realidade desportiva em Lisboa. Através da análise estatística foi possível segmentar a informação e perceber quais as motivações e barreiras para diferentes géneros e faixas etárias. Concluiu-se a maior taxa de abandono ocorre nos meses de Dezembro e Janeiro, independentemente do género ou idade dos participantes. Relativamente aos determinantes da prática desportiva de atividade física: encontraram-se diferenças ao nível de todos os determinantes para os géneros e ao nível de todos os determinantes com a exceção das barreiras do meio ambientes para as diferentes faixas etárias.
APA, Harvard, Vancouver, ISO, and other styles
18

Bizubová, Kateřina. "Aktivismus a kolektivní násilí: Šluknovské nepokoje 2011." Master's thesis, 2016. http://www.nusl.cz/ntk/nusl-353201.

Full text
Abstract:
This thesis is focused on the issue of violence in civil society. Using Charles Tilly's political theory, it attempts to point out that the emergence of collective violence can be well understood by tracing small scale causes (mechanisms), rather than large causes (poverty, extremism etc.). This argument is empirically studied in the context of anti-Roma riots that took place in Šluknov Hook, Czech republic, in the year 2011. The research is based on a broad concept of civil society, which doesn't assume fixed division between civil and uncivil subjects, but works with a number of actors, whose identity is unstable and their acting strategy fluently changes from nonviolent to violent and contra. The data show, that radical actors are generally more prone to use force. However, Tilly's theory provides opportunity to explain their influence on majority through the dynamics of relationships that is studied in this paper. The catalogue of events was created on the basis of news and document analysis and the incidence of theoretically defined mechanisms is identified by process tracing method: Boundary activation between us and them (mainly network-based escalation, signaling spirals), polarization, competitive display, selective retaliation, containment, monitoring, certification/decertification and...
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography