Dissertations / Theses on the topic 'Activity of attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 18 dissertations / theses for your research on the topic 'Activity of attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Meela, Moraba Macdonald. "Evaluation of alien invasive weedy plants for activity against plant pathogenic fungi." Diss., University of Pretoria, 2009. http://hdl.handle.net/2263/23195.
Full textDissertation (MSc (Veterinary Science))--University of Pretoria, 2008.
Paraclinical Sciences
unrestricted
Smith, Kelly Lynne. "Individual Differences in Activity and Responses to a Predator Attack in Juvenile Smallmouth Bass (Micropterus Dolomieui)." Bowling Green State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1182192767.
Full textSung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.
Full textXu, Jun, Committee Chair ; Ahamad, Mustaque, Committee Member ; Ammar, Mostafa, Committee Member ; Bing, Benny, Committee Member ; Zegura, Ellen, Committee Member.
Quilliam, Richard S. "The role of cell wall invertase activity in source-sink relations in vegetative tissues of Arabidopsis thaliana and in response to wounding and pathogen attack." Thesis, University of Sheffield, 2007. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.752717.
Full textPalm, Emelie, and Sara Josefsson. "Fysisk aktivitet, rörelserädsla och livskvalitet hos individer som genomgått hjärtinfarkt och/eller hjärtoperation." Thesis, Uppsala universitet, Fysioterapi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-337629.
Full textBajan, Pierre-Marie. "Simulation d'activités et d'attaques : application à la cyberdéfense." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLL014/document.
Full textThe concern over the security of the infrastructure of a company is only growing deeper and became a source of worries for companies. They use different systems to detect and deal with attack but those systems are usually made to detect one type only of the two main type of attack: attacks made to target the largest amount of people possible. Targeted attacks are rarer but more dangerous as it penetrates deep into a system and are very specifics. However the systems used to deal with it are proved of limited efficiency. Even when they send alerts and news to the operator, there is just to much information going along with it making the often ill-trained operators unable to react and overwhelm by massive information. The goal of this thesis is to create a tool that would help to form operator but also help to test more efficiently security systems. We'll approach the problem by first emulating the infrastructure and services of a small company with its different users and services. It will be use to create the data of the regular operations and interactions of a company during normal activity but also under attack. Once the system is emulated and we collected the necessary data, we will start to simulate the system according to what we need the simulation for. This simulation would need less resources than the emulation and will be scalable and capable to be dynamically change according to the needs. The aim is to have a light tool capable to simulate different behaviors and different type of realist simulation of a system to help improve the formation of operators and also test security devices more fully. The whole would be supervised by a console of control of the simulation who will receive the information of the simulated elements and the simulated operator console. It would have the capacity to create incidents and problems into the systems along with attacks
Hammi, Badis. "Vers une détection à la source des activités malveillantes dans les clouds publics : application aux attaques de déni de service." Thesis, Troyes, 2015. http://www.theses.fr/2015TROY0023/document.
Full textCurrently, cloud computing is a flexible and cost-effective solution widely adopted for the large-scale production of IT services. However, beyond a main legitimate usage, malicious users take advantage of these features in order to get a ready-to-use attack platform, offering a massive power. Among the greatest beneficiaries of this cloud conversion into an attack support, botclouds are used to perpetrate Distributed Denial of Service (DDoS) attacks toward any third party connected to the Internet.Although such attacks, when perpetrated by botnets, have been extensively studied in the past, their operations and their implementation context are different herein and thus require new solutions. In order to achieve such a goal, we propose in the thesis work presented in this manuscript, a distributed approach for a source-based detection of DDoS attacks perpetrated by virtual machines hosted in a public cloud. Firstly, we present an experimental study that consists in the implementation of two botclouds in a real deployment environment hosting a legitimate workload. The analysis of the collected data allows the deduction of behavioural invariants that form the basis of a signature based detection system. Then, we present in the following a detection system based on the identification of principal components of the deployed botclouds. Finally, in order to deal with the scalability issues, we propose a distributed solution of our detection system, which relies on a mesh peer-to- peer architecture resulting from the overlap of several overlay trees
Ocampo, Mascaró Javier, Salazar Vera Jimena Silva, and Costa Bullón Abilio da. "Correlación entre conocimientos sobre consecuencias de la obesidad y grado de actividad física en universitarios." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2015. http://hdl.handle.net/10757/621624.
Full textLiao, Zhe Hui, and 廖哲輝. "A Method to Defend Against Activity Hijacking Attack by Using Shared-memory Side Channel." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/6vy494.
Full textБігун, Олеся Вікторівна. "Еколого-фауністичні особливості родини Culicidae у Херсонській області." Магістерська робота, 2020. https://dspace.znu.edu.ua/jspui/handle/12345/4175.
Full textUA : Робота виконана на 73 сторінках, 26 рисунки, 2 таблиці, 58 літературних джерел, з них 6 іноземною мовою. Об’єкт дослідження: кровосисні комарі Херсонської області. Предмет дослідження: еколого-фауністичні особливості родини Culicidae. Методи дослідження: загальноприйняті ентомологічні методи збору, лабораторного аналізу та статистичної обробки. Метою кваліфікаційної роботи було вивчення еколого-фауністичні особливості родини Culicidae Херсонської області. Теоретично та експериментально визначено: видовий склад кровосисних комарів та їх масовість, домінуючі види кровосисних комарів, сезонну та річну динаміку чисельності комарів, профілактичні заходи щодо зменшення чисельності кровосисних комарів. Новизна та актуальність досліджень полягає у тому, що подібні дослідження дозволять прогнозувати поширення кровосисними комарами небезпечних трансмісивних захворювань у Херсонській області. Значущість роботи полягає в тому, що отримані результати можуть будь використані ентомологами районних, міських санітарно-епідеміологічними станціями для ефективного проведення заходів з обмеження чисельності кровосисних комарів на території Херсонської області.
EN : Work is executed on 73 pages, 26 рисунки, 2 tables, 58 literary sources, from them 6 by a foreign language. The object of the research is bloodsucking mosquitoes of the Kherson area. The subject of the study is ecologo-faunistic features of family of Culicidae. Research methods: the generally accepted methods of entomologist of collection, labtest and statistical treatment. The purpose of the qualification work is a study ecologo-faunistic features of family of Culicidae of the Kherson area. Theoretically and experimentally determined: specific composition of bloodsucking mosquitoes and their mass character, dominant types of bloodsucking mosquitoes, seasonal and annual dynamics of quantity of mosquitoes, prophylactic measures in relation to reduction to the quantity of bloodsucking mosquitoes. A novelty and actuality of researches consist in that similar researches will allow to forecast distribution of dangerous трансмісивних diseases bloodsucking mosquitoes in the Kherson area. Meaningfulness of work consists in that the got results can be used by the entomologists of district, municipal the санітарно-епідеміологічними stations for effective realization of measures on the limit of quantity of bloodsucking mosquitoes on territory of the Kherson area.
Bittengl, Martin. "Analýza ofenzivní a defenzivní činnosti při standardních situacích." Master's thesis, 2011. http://www.nusl.cz/ntk/nusl-300516.
Full textMcElligott, Paul Edward Kaye. "Seasonal abundance, physiological age, and daily activity of host-seeking horse flies (Diptera: Tabanidae) at Seven Sisters, Manitoba, with an evaluation of permethrin spray treatments as a means of increasing the performance of growing beef heifers subject to horse fly attack." 1989. http://hdl.handle.net/1993/7190.
Full textLin, Liang-Hsuan, and 林良軒. "AHA: An Event-Driven Solution to Activity Hijacking Attacks." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/cb8yvj.
Full text國立中央大學
資訊工程學系
103
In recent years, the Android Component Hijacking Vulnerabilities are widely discussed. This kind of vulnerabilities may cause tremendous problem in the system. If any of the Android Components has been hijacked, it may disclose user’s personal information or private data to the attacker. To be more precisely, those attacks will redirect or hijack the Android Component’s original workflow to malicious code or even to the extent that execute a malware. One of the Android Components is Activity, it construct the UI frames for the user. In this paper, we focus on Activity Hijacking Attacks. As the name implies, Activity Hijacking Attacks is to hijack the original activity workflow while users are using. We construct our solution in Android framework called AHA to keep track of every activity workflow and knowing the layout about the activity. Our solution AHA can stop the attack which using the Activity Hijacking Attacks to steal user’s personal information. Furthermore, AHA can easily patched into existing Android system and with ignorable overhead.
Silva, Fábio Alexandre Henriques da. "Detection of distributed denial of service attacks at source." Master's thesis, 2018. http://hdl.handle.net/10773/27819.
Full textDe ano para ano são estabelecidos novos recordes de quantidade de tráfego num ataque, que demonstram não só a presença constante de ataques de negação de serviço distribuídos, como também a sua evolução, demarcando-se das outras ameaças de rede. A crescente importância da disponibilidade de recursos a par do debate sobre a segurança nos dispositivos e infraestruturas de rede é contínuo, dado o papel preponderante tanto no dominio doméstico como no corporativo. Face à constante ameaça, os sistemas de segurança de rede mais recentes têm vindo a aplicar técnicas de reconhecimento de padrões para inferir, detetar e reagir de forma mais rápida e assertiva. Esta dissertação propõe metodologias para inferir padrões de atividades na rede, tendo por base o seu tráfego: se segue um comportamento previamente definido como normal, ou se existem desvios que levantam suspeitas sobre normalidade da ação na rede. Tudo indica que o futuro dos sistemas de defesa de rede continuará neste sentido, servindo-se não só do crescente aumento da quantidade de tráfego, como também da diversidade de ações, serviços e entidades que refletem padrões distintos contribuindo assim para a deteção de atividades anómalas na rede. As metodologias propõem a recolha de metadados, até á camada de transporte, que seguidamente serão processados pelos algoritmos de aprendizagem automática com o objectivo de classificar a ação subjacente. Pretendendo que o contributo fosse além dos ataques de negação de serviço e do dominio de rede, as metodologias foram descritas de forma tendencialmente genérica, de forma a serem aplicadas noutros cenários de maior ou menos complexidade. No quarto capítulo é apresentada uma prova de conceito com vetores de ataques que marcaram a história e, algumas métricas de avaliação que permitem comparar os diferentes classificadores quanto à sua taxa de sucesso, face às várias atividades na rede e inerentes dinâmicas. Os vários testes mostram flexibilidade, rapidez e precisão dos vários algoritmos de classificação, estabelecendo a fasquia entre os 90 e os 99 por cento.
Mestrado em Engenharia de Computadores e Telemática
Jeng, Liang-Yi, and 鄭良儀. "Wind Tunnel Verification of Actively Controlled High-Rise Building under Varied Attack Angle of Wind." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/34230446891234885425.
Full text淡江大學
土木工程學系
89
Slender structures, if appropriately designed, are safe under wind load, yet the excessive deflection of such structures due to its high flexibility might degrade the serviceability. A traditional way by directly augmenting the member cross-section to increase the structural stiffness is a choice, however, it will increase the construction fee and decrease the usable space of the structure. Recently, the idea of active control is proved to be an effective way in this aspect. By using active control, both of the structural damping and stiffness can be properly adjusted such that the structural responses are decreased. In this way, the requirements for structural strength and serviceability are simultaneously satisfied. In the last decade, many research efforts have demonstrated that the use of active control is able to achieve remarkable results in reducing the wind-induced vibration for high-rise buildings. However, most of them are accomplished using numerical simulation, in which the wind loads used can not fully represent the real situation in site. The response of the actual structure under wind loads hall is much more complicated than numerical simulation, especially when active control is employed. Therefore, experimental study of active control via wind tunnel tests is very important toward mature implementation to actual buildings. In this paper, a 4 degree-of-freedom scaled (1:300) model of a high-rise building equipped with active mass driver (AMD) is constructed on a wind tunnel to experimentally verify the applicability of active control for wind-induced motion under varied attack angle of wind. To account for the time delay problem caused by active device, the interaction effect between the actuator and structure, i.e., the so-called control-structure interaction (CSI), is considered in the system identification scheme. Then, a system reduction method called the balance state reduction is further applied to the identified system to obtain the nominal system for the design of control law. The control law is designed based on the Linear Quadratic Gaussian (LQG) theorem in which a dynamic output feedback equation with acceleration feedback is formed for practical implementation. From the experimental results, it is shown that the performance of active controller is remarkable in reducing the building responses due to the buffeting effect under different attack angle of wind. Furthermore, the numerical simulation using the identified analytical model is conducted and the results are compared with those from the experiments. It is demonstrated that the correlation between the experimental and simulated results is quite satisfactory.
Lee, Hsin-Hsiung, and 李新雄. "Exploring the Intention of Electronic Commerce Activity consider with Phishing Attacks by Theory of Planned Behavior View." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/51156789026615775962.
Full text華梵大學
資訊管理學系碩士班
94
The Internet becomes more popular to promote the higher rapidly development of the new online business model, E-commerce. The E-commerce has brought the more benefits and convenience on the personal consumption, the regional economy, the global logistics as well as the online e-services. However, the online theft and attacks through the Internet tend to be on the rise progressively to gain illegal blood money. The Phishing attack is one of the major fraud crimes, which may inhibit consumers to use the e-commerce. Hence, we proposed a research model to explore the consumer intention of the e-commerce activities considering with the Phishing attack. This study is based on the Decomposed Theory of Planned Behavior with The Behavior Intention of Trust factor. By looking at the aspects of the Attitude to use, the Subjective Norm, and the Perceived Behavior Control, we will discuss if the attacks have affected the consumers’ behavior intention towards E-commerce activities under the epidemic Internet Phishing of E-mail attaches. Also, we will discuss if the threats of loses caused by Phishing attacks will affect consumers’ “Trust” and further reduce the intention of using the E-commerce. The sample size of data analysis is 229. Then the method of Structural Equation Modeling (SEM) is used to test the goodness of fit and the causal-effect of the proposed model. The result of this study shows that the model has the suitable goodness of fit. The major findings of this study are as follows:(1)”Perceived trust” will positively affect the consumer intention to use the e-commerce ;(2)” Perceived Phishing attack ” will negatively affect the consumer intention to use the e-commerce; (3)The consumers’ “Attitudes to use”, “Perceived Behavioral Control”, and “Trust” will has significantly positively affected consumers’ behavioral intention of using E-commerce. (4) As for the aspect of the Subjective Norm, it is unremarkably affected by the Phishing attacks. In the conclusion of this study, we suggest that ISPs and Enterprises should be the gatekeepers for the consumers. They should reinforce the inspection of Phishing attacks, Web-sites as well as E-mail. In addition, they should adopt the Anti-Phishing technology as well as definitely declare and educate the consumers to protect their own personal private information to avoid being the Phishing attacks. The more consumers trust to the e-commerce, the stronger consumers’ intention to use the e-commerce. Furthermore, it will decrease the consumers’ and the enterprises’ financial loses at the same time.
Martins, Inês Alexandra Henriques. "Lisboa Desporto: how to attract and maintain motivated non-professional athletes." Master's thesis, 2018. http://hdl.handle.net/10071/18406.
Full textNo âmbito do projeto do projeto Lisboa – Capital Europeia do desporto, desenvolvido pelo INDEG-ISCTE-IUL em parceria com a Câmara Municipal de Lisboa, este estudo pretende analisar quais os fatores que motivam e limitam as pessoas a praticar desporto e atividade física. Os impactos positivos da prática de exercício físico e desporto são vastos e variam desde fatores de saúde a fatores psicológicos. Apesar dos esforços feitos nacionalmente e pela União Europeia, as taxas de população ativa a nível da prática desportiva continuam aquém do esperado. Deste modo, visou-se perceber quais os determinantes que influenciam os diferentes géneros e faixas etárias a praticar desporto e atividade física para que, possam ser desenvolvidas e aplicas estratégias adequadas. Após a revisão de literatura foi possível identificar os fatores mais relevantes e amplamente utilizados para estudar a participação. Na realidade, foram divididos em três grandes grupos: Motivações, limitações do indivíduo e barreiras do meio envolvente. A informação foi recolhida junto de profissionais diretamente relacionados com a realidade desportiva em Lisboa. Através da análise estatística foi possível segmentar a informação e perceber quais as motivações e barreiras para diferentes géneros e faixas etárias. Concluiu-se a maior taxa de abandono ocorre nos meses de Dezembro e Janeiro, independentemente do género ou idade dos participantes. Relativamente aos determinantes da prática desportiva de atividade física: encontraram-se diferenças ao nível de todos os determinantes para os géneros e ao nível de todos os determinantes com a exceção das barreiras do meio ambientes para as diferentes faixas etárias.
Bizubová, Kateřina. "Aktivismus a kolektivní násilí: Šluknovské nepokoje 2011." Master's thesis, 2016. http://www.nusl.cz/ntk/nusl-353201.
Full text