To see the other types of publications on this topic, follow the link: Adaptive Network Security.

Dissertations / Theses on the topic 'Adaptive Network Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 30 dissertations / theses for your research on the topic 'Adaptive Network Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Harper, Scott Jeffery. "A Secure Adaptive Network Processor." Diss., Virginia Tech, 2003. http://hdl.handle.net/10919/28023.

Full text
Abstract:
Network processors are becoming a predominant feature in the field of network hardware. As new network protocols emerge and data speeds increase, contemporary general-purpose network processors are entering their second generation and academic research is being actively conducted into new techniques for the design and implementation of these systems. At the same time, systems ranging from secured military communications equipment to consumer devices are being updated to provide network connectivity. Many of these devices require, or would benefit from, the inclusion of device security in addit
APA, Harvard, Vancouver, ISO, and other styles
2

Karunanidhi, Karthikeyan. "ARROS; distributed adaptive real-time network intrusion response." Ohio : Ohio University, 2006. http://www.ohiolink.edu/etd/view.cgi?ohiou1141074467.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Grover, Amit. "Application adaptive bandwidth management using real-time network monitoring." [Johnson City, Tenn. : East Tennessee State University], 2003. http://etd-submit.etsu.edu/etd/theses/available/etd-0715103-211816/unrestricted/GroverA071803f.pdf.

Full text
Abstract:
Thesis (M.S.)--East Tennessee State University, 2003.<br>Title from electronic submission form. ETSU ETD database URN: etd-0715103-211816. Includes bibliographical references. Also available via Internet at the UMI web site.
APA, Harvard, Vancouver, ISO, and other styles
4

Marjanovic, Uros. "Exploration of a method for constructing an industrial ethernet with ethernet enabled devices in an industrial environment using a Cisco adaptive security appliance /." View online, 2009. http://repository.eiu.edu/theses/docs/32211131565124.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Techateerawat, Piya, and piyat33@yahoo com. "Key distribution and distributed intrusion detection system in wireless sensor network." RMIT University. Electrical and Computer Systems Engineering, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20080729.162610.

Full text
Abstract:
This thesis proposes a security solution in key management and Intrusion Detection System (IDS) for wireless sensor networks. It addresses challenges of designing in energy and security requirement. Since wireless communication consumes the most energy in sensor network, transmissions must be used efficiently. We propose Hint Key Distribution (HKD) for key management and Adaptive IDS for distributing activated IDS nodes and cooperative operation of these two protocols. HKD protocol focuses on the challenges of energy, computation and security. It uses a hint message and key chain to consume
APA, Harvard, Vancouver, ISO, and other styles
6

Pfennig, Stefan, and Elke Franz. "Secure Network Coding: Dependency of Efficiency on Network Topology." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2013. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-128456.

Full text
Abstract:
Network Coding is a new possibility to transmit data through a network. By combining different packets instead of simply forwarding, network coding offers the opportunity to reach the Min-Cut/Max-Flow capacity in multicast data transmissions. However, the basic schemes are vulnerable to so-called pollution attacks, where an attacker can jam large parts of the transmission by infiltrating only one bogus message. In the literature we found several approaches which aim at handling this kind of attack with different amounts of overhead. Though, the cost for a specific secure network coding scheme
APA, Harvard, Vancouver, ISO, and other styles
7

Richter, Johannes, Elke Franz, Sabrina Engelmann, Stefan Pfennig, and Eduard A. Jorswieck. "Physical Layer Security vs. Network Layer Secrecy: Who Wins on the Untrusted Two-Way Relay Channel?" Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-145086.

Full text
Abstract:
We consider the problem of secure communications in a Gaussian two-way relay network where two nodes exchange confidential messages only via an untrusted relay. The relay is assumed to be honest but curious, i.e., an eavesdropper that conforms to the system rules and applies the intended relaying scheme. We analyze the achievable secrecy rates by applying network coding on the physical layer or the network layer and compare the results in terms of complexity, overhead, and efficiency. Further, we discuss the advantages and disadvantages of the respective approaches.
APA, Harvard, Vancouver, ISO, and other styles
8

Richter, Johannes, Elke Franz, Sabrina Engelmann, Stefan Pfennig, and Eduard A. Jorswieck. "Physical Layer Security vs. Network Layer Secrecy: Who Wins on the Untrusted Two-Way Relay Channel?" Technische Universität Dresden, 2013. https://tud.qucosa.de/id/qucosa%3A28133.

Full text
Abstract:
We consider the problem of secure communications in a Gaussian two-way relay network where two nodes exchange confidential messages only via an untrusted relay. The relay is assumed to be honest but curious, i.e., an eavesdropper that conforms to the system rules and applies the intended relaying scheme. We analyze the achievable secrecy rates by applying network coding on the physical layer or the network layer and compare the results in terms of complexity, overhead, and efficiency. Further, we discuss the advantages and disadvantages of the respective approaches.
APA, Harvard, Vancouver, ISO, and other styles
9

Renners, Leonard [Verfasser], Gabi [Akademischer Betreuer] Dreo, Rodosek Gabi Gutachter] Dreo, and Felix [Gutachter] [Heine. "Adaptive Prioritization of Network Security Incidents / Leonard Renners ; Gutachter: Gabi Dreo Rodosek, Felix Heine ; Akademischer Betreuer: Gabi Dreo Rodosek ; Universität der Bundeswehr München, Fakultät für Informatik." Neubiberg : Universitätsbibliothek der Universität der Bundeswehr München, 2020. http://d-nb.info/1224624181/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Renners, Leonard [Verfasser], Rodosek Gabi [Akademischer Betreuer] Dreo, Rodosek Gabi [Gutachter] Dreo, and Felix [Gutachter] Heine. "Adaptive Prioritization of Network Security Incidents / Leonard Renners ; Gutachter: Gabi Dreo Rodosek, Felix Heine ; Akademischer Betreuer: Gabi Dreo Rodosek ; Universität der Bundeswehr München, Fakultät für Informatik." Neubiberg : Universitätsbibliothek der Universität der Bundeswehr München, 2020. http://d-nb.info/1224624181/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Gorgues, Alonso Miguel. "Improving Network-on-Chip Performance in Multi-Core Systems." Doctoral thesis, Universitat Politècnica de València, 2018. http://hdl.handle.net/10251/107336.

Full text
Abstract:
La red en el chip (NoC) se han convertido en el elemento clave para la comunicación eficiente entre los núcleos dentro de los chip multiprocesador (CMP). Tanto el uso de aplicaciones paralelas en los CMPs como el incremento de la cantidad de memoria necesitada por las aplicaciones, ha impulsado que la red de comunicación gane una mayor importancia. La NoC es la encargada de transportar toda la información requerida por los núcleos. Además, el incremento en el número de núcleos en los CMPs impulsa las NoC a ser diseñadas de forma escalable, pero al mismo tiempo sin que esto afecte a las presta
APA, Harvard, Vancouver, ISO, and other styles
12

Soewito, Benfano. "Adaptive Security In Computer Networks." Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1879096201&sid=3&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Full text
Abstract:
Thesis (Ph. D.)--Southern Illinois University Carbondale, 2009.<br>"Department of Electrical and Computer Engineering." Keywords: Adaptive security, Computer networks, Intrusion detection. Includes bibliographical references (p. 78-84). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
13

Potnuru, Srinath. "Fuzzing Radio Resource Control messages in 5G and LTE systems : To test telecommunication systems with ASN.1 grammar rules based adaptive fuzzer." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-294140.

Full text
Abstract:
5G telecommunication systems must be ultra-reliable to meet the needs of the next evolution in communication. The systems deployed must be thoroughly tested and must conform to their standards. Software and network protocols are commonly tested with techniques like fuzzing, penetration testing, code review, conformance testing. With fuzzing, testers can send crafted inputs to monitor the System Under Test (SUT) for a response. 3GPP, the standardization body for the telecom system, produces new versions of specifications as part of continuously evolving features and enhancements. This leads to
APA, Harvard, Vancouver, ISO, and other styles
14

Hager, Creighton Tsuan-Ren. "Context Aware and Adaptive Security for Wireless Networks." Diss., Virginia Tech, 2004. http://hdl.handle.net/10919/29875.

Full text
Abstract:
This research investigated methods to determine appropriate security protocols for specific wireless network applications. The specific problem being addressed was that there are tradeoffs between security, performance, and efficiency among current and proposed security protocols. Performance and efficiency issues are particularly important in wireless networks which tend to have constrained network capacity and connect to resource-limited nodes. Existing security protocols address problems such as authentication, availability, confidentiality, integrity, and non-repudiation. However, thes
APA, Harvard, Vancouver, ISO, and other styles
15

Ruth, Michael. "Adapting the Single-Request/Multiple-Response Message Exchange Pattern to Web Services." ScholarWorks@UNO, 2005. http://scholarworks.uno.edu/td/244.

Full text
Abstract:
Single-Request/Multiple-Response (SRMR) is an important messaging exchange pattern because it can be used to model many real world problems elegantly. However, SRMR messaging is not directly supported by Web services, and, since it requires Callback to function it is hampered by current in-practice security schemes, such as firewalls and proxy servers. In this thesis, a framework will be proposed to support SRMR and Callback in the context of Web services and the realities of network security. The central component of the proposed solution is a Clearinghouse Web service (CWS), which s
APA, Harvard, Vancouver, ISO, and other styles
16

Jirattigalachote, Amornrat. "Provisioning Strategies for Transparent Optical Networks Considering Transmission Quality, Security, and Energy Efficiency." Doctoral thesis, KTH, Optical Network Laboratory (ON Lab), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-94011.

Full text
Abstract:
The continuous growth of traffic demand driven by the brisk increase in number of Internet users and emerging online services creates new challenges for communication networks. The latest advances in Wavelength Division Multiplexing (WDM) technology make it possible to build Transparent Optical Networks (TONs) which are expected to be able to satisfy this rapidly growing capacity demand. Moreover, with the ability of TONs to transparently carry the optical signal from source to destination, electronic processing of the tremendous amount of data can be avoided and optical-to-electrical-to-optic
APA, Harvard, Vancouver, ISO, and other styles
17

Geigel, Arturo. "Unsupervised Learning Trojan." NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/17.

Full text
Abstract:
This work presents a proof of concept of an Unsupervised Learning Trojan. The Unsupervised Learning Trojan presents new challenges over previous work on the Neural network Trojan, since the attacker does not control most of the environment. The current work will presented an analysis of how the attack can be successful by proposing new assumptions under which the attack can become a viable one. A general analysis of how the compromise can be theoretically supported is presented, providing enough background for practical implementation development. The analysis was carried out using 3 selected
APA, Harvard, Vancouver, ISO, and other styles
18

Grizzard, Julian B. "Towards Self-Healing Systems: Re-establishing Trust in Compromised Systems." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-04072006-133056/.

Full text
Abstract:
Thesis (Ph. D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2006.<br>Schwan, Karsten, Committee Member ; Schimmel, David, Committee Member ; Copeland, John, Committee Member ; Owen, Henry, Committee Chair ; Wills, Linda, Committee Member.
APA, Harvard, Vancouver, ISO, and other styles
19

Sargolzaei, Arman. "Time-Delay Switch Attack on Networked Control Systems, Effects and Countermeasures." FIU Digital Commons, 2015. http://digitalcommons.fiu.edu/etd/2175.

Full text
Abstract:
In recent years, the security of networked control systems (NCSs) has been an important challenge for many researchers. Although the security schemes for networked control systems have advanced in the past several years, there have been many acknowledged cyber attacks. As a result, this dissertation proposes the use of a novel time-delay switch (TDS) attack by introducing time delays into the dynamics of NCSs. Such an attack has devastating effects on NCSs if prevention techniques and countermeasures are not considered in the design of these systems. To overcome the stability issue caused by T
APA, Harvard, Vancouver, ISO, and other styles
20

Микитенко, Олександр Вікторович. "Моніторинг станів інформаційних ресурсів для реалізації адаптивного управління захищеністю комп’ютерних систем". Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2021. https://ela.kpi.ua/handle/123456789/43792.

Full text
Abstract:
Дипломна робота: 66 c., 6 табл., 13 рис., 1 додаток, 37 джерел. Необхідність використання систем моніторингу безпеки в комп'ютерних системах і мережах (КСМ) визначається тим, що застосування звичайних засобів і механізмів захисту інформації виявляється недостатнім, тому що вони виконують лише базові функції і не дозволяють контролювати безпеку функціонування інформаційних систем в умовах постійних модифікацій вторгнень, оновлення апаратного та програмного забезпечення КСМ. Попередній аналіз, оперативний контроль і реалізація механізмів реагування на вторгнення в КСМ дозволяють не тільки вияви
APA, Harvard, Vancouver, ISO, and other styles
21

Godquin, Tanguy. "Sécurisation adaptative des objets de l'IoT par méthodes logicielles (White box) et combinées (hardware et software)." Thesis, Normandie, 2020. http://www.theses.fr/2020NORMC222.

Full text
Abstract:
Depuis maintenant plusieurs années, nous assistons à l'essor de l'Internet des Objets (IdO ou IoT en anglais). Suite à de récentes attaques sur ces systèmes, les études ont démontré que la sécurité de ces appareils était majoritairement insuffisante. Afin de remédier à ce problème, nous devrions idéalement mettre en place des mécanismes de sécurité sur l'ensemble des périphériques IoT, cependant cette solution n'est pas toujours envisageable.Une approche alternative, pour sécuriser ces systèmes, consiste à déployer des services de sécurité en bordure du réseau afin de rapprocher les mécanismes
APA, Harvard, Vancouver, ISO, and other styles
22

Ed-Daoui, Ilyas. "Towards systems-of-systems structural resilience assessment Resilience assessment as a foundation for systems-of-systems safety evaluation : application to an economic infrastructure An approach to systems-of-systems structural analysis through interoperability assessment : application on Moroccan Case A study of an adaptive approach for systems-of-systems integration A contribution to systems-of-systems concept standardization Unstructured peer-to-peer systems : towards swift Routing A deterministic approach for systems-of-systems resilience quantification Vers des systèmes de systèmes robustes Security enhancement architectural model for IMS based networks Towards reliable IMS-based networks." Thesis, Normandie, 2019. http://www.theses.fr/2019NORMIR07.

Full text
Abstract:
De nos jours, nous attendons des systèmes de systèmes d'être plus que simplement fonctionnel, mais aussi fiable, de préserver leurs performances, de mener les actions requises et, surtout, d'anticiper d'éventuelles défaillances. La résilience fait partie des nombreuses approches d'évaluation de la fiabilité. Elle est directement liée aux conséquences de perturbations et incertitudes. Il s'agit des conséquences en cas de perturbations et des incertitudes associées. La résilience est définie comme la capacité des systèmes à résister à une perturbation majeure selon paramètres de dégradation et à
APA, Harvard, Vancouver, ISO, and other styles
23

Chiang, Tzu-hsiang, and 江自翔. "The Study of Adaptive Automation Network Security." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/udnxmh.

Full text
Abstract:
碩士<br>國立中央大學<br>通訊工程學系在職專班<br>103<br>To explore and study the opportunities and threats SDN related technologies in terms of safety are going to face, discuss about SDN technology-specific focus, controllability and network programmable resistance, to improve the safety performance of the relevant network It has advantages, such as spectrum monitoring network extension; but also made SDN technology will also be introducing new security threats and risk exposure and so on. At the same time can be found from the study, SDN technology for Internet security performance improvements especially thro
APA, Harvard, Vancouver, ISO, and other styles
24

Hsieh, Chou-Ting, and 謝周廷. "An Adaptive Cross-Layer Design Approach for Network Security Management." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/64191416657245367430.

Full text
Abstract:
碩士<br>國立成功大學<br>資訊工程學系碩博士班<br>97<br>With the development of network technology, there are more network services provided in our daily life, and therefore it is getting important to protect network security. In traditional hierarchical network architecture, there are many kinds of security algorithm performed in every layer respectively to protect network security. However to perform security algorithm will cause huge overheads on system performance. Thus it is difficult to protect network security and maintain system performance at the same time. In the thesis, we manage network security by
APA, Harvard, Vancouver, ISO, and other styles
25

Adahrii, Pfokreni. "Adaptive Cruise Control and Co-Operative Adaptive Cruise Control Model Study Based on Traffic and Network Simulation." Thesis, 2017. http://ethesis.nitrkl.ac.in/8798/1/2017_MT_P_Adahri.pdf.

Full text
Abstract:
Vehicular ad hoc networks (VANETs) specially appointed systems is imagined to the bolster for advancement of an extensive variety of appealing applications, for example, installment administrations which require the outline of installment frameworks that fulfill extra prerequisites related with VANETs. The extensive variety for the situations (with or without network confinement) emerging vehicle-to-vehicle and vehicle-to-roadside units correspondences has unlock new security objective through-out by installment framework planners to accomplish a similar protection abilities and free from the
APA, Harvard, Vancouver, ISO, and other styles
26

I-Hsieh, Shih, and 施宜協. "An Application of Grey Prediction , Markov GM(1,1) and Adaptive Network-based Fuzzy Inference System on the Management of Market Neutral-Security Hedge Fund." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/86230834252525520163.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>資訊管理系<br>92<br>The 21st century in Taiwan will be confronted with trends relating to liberalization and internationalization of financial markets. The government pays attention to financial reforms. Therefore, the development of financial innovation is rising and flourishing. The hedge fund industry which seeks absolute returns has experienced enormous growth in the last decade. It is believed that hedge funds will soon become one of the financial investment options in Taiwan. This study is aimed at the electronics stock on the TSEC (1999.1~2003.12, 60 observation
APA, Harvard, Vancouver, ISO, and other styles
27

Hsieh, Meng-Yen, and 謝孟諺. "An Adaptive Security System in Incrementally Deployed Sensor Networks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/16977362289169391593.

Full text
Abstract:
博士<br>國立成功大學<br>工程科學系碩博士班<br>95<br>Distributed wireless sensor networks have problems of detecting and preventing malicious nodes. Therefore, sensor networks need an authentication service for sensor identity and message transmission. Intrusion detection and prevention schemes are always integrated in sensor security appliances to enhance network security. My thesis develops secure communications in a cluster-based sensor network (SecCBSN) using adaptive security modules. A dynamic authentication scheme in the proposed primary security module enables existing nodes to authenticate new incoming
APA, Harvard, Vancouver, ISO, and other styles
28

Tseng, Ryh-Yuh, and 曾日昱. "Toward an Adaptive Security Assurance Mechanism in Mobile Ad Hoc Networks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/65327496946798478420.

Full text
Abstract:
博士<br>國立中正大學<br>通訊工程學系<br>98<br>Mobile Ad Hoc Networks (MANET) is a self-configuring network composed of a significant number of resource-constrained nodes without a fixed network infrastructure. MANET is very vulnerable to attacks due to factors such as being an open medium, possessing dynamically reconfigurable network topology, and functioning in the absence of a centralized authority without prior security associations. The security issues of MANET have become a primary concern in recent years. Advanced hacking techniques make the effective defense in MANET impossible. Many security solut
APA, Harvard, Vancouver, ISO, and other styles
29

Heydenrych, Mark. "An adaptive multi-agent architecture for critical information infrastructure protection." Thesis, 2014. http://hdl.handle.net/10210/12370.

Full text
Abstract:
M.Sc. (Information Technology)<br>The purpose of the research presented in this dissertation is to explore the uses of an adaptive multi-agent system for critical information infrastructure protection (CIIP). As the name suggests, CIIP is the process of protecting the information system which are connected to the infrastructure essential to the continued running of a country or organisation. CIIP is challenging due largely to the diversity of these infrastructures. The dissertation examines a number of artificial intelligence techniques that can be applied to CIIP; these techniques range from
APA, Harvard, Vancouver, ISO, and other styles
30

(6564809), Elisabeth Krueger. "Dynamics of Coupled Natural-Human-Engineered Systems: An Urban Water Perspective on the Sustainable Management of Security and Resilience." Thesis, 2019.

Find full text
Abstract:
<div>The security, resilience and sustainability of water supply in urban areas are of major concern in cities around the world. Their dynamics and long-term trajectories result from external change processes, as well as adaptive and maladaptive management practices aiming to secure urban livelihoods. This dissertation examines the dynamics of urban water systems from a social-ecological-technical systems perspective, in which infrastructure and institutions mediate the human-water-ecosystem relationship. </div><div><br></div><div>The three concepts of security, resilience and sustainability a
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!