To see the other types of publications on this topic, follow the link: Attack and defence.

Dissertations / Theses on the topic 'Attack and defence'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Attack and defence.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Kemp, Benjamin Peter. "Attack and defence in cassava bacterial blight." Thesis, University of Bath, 2002. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268932.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sandin, Michael. "Pre-Emptive Self-Defence : When does an armed attack occur?" Thesis, Stockholms universitet, Juridiska institutionen, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-193754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mella, Luca. "Ict security: Testing methodology for targeted attack defence tools." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6963/.

Full text
Abstract:
La tesi di laurea presentata si inserisce nell’ampio contesto della Sicurezza Informatica, in particolare tratta il problema del testing dei sistemi di sicurezza concepiti per contrapporsi alle odierne minacce: gli attacchi mirati (Targeted Attacks) ed in generale le minacce avanzate persistenti (Advanced Persistent Threats). Il principale obiettivo del lavoro svolto è lo sviluppo e la discussione di una metodologia di test per sistemi di sicurezza focalizzati su questo genere di problemi. Le linee guida proposte hanno lo scopo di aiutare a colmare il divario tra quello che viene testato e qu
APA, Harvard, Vancouver, ISO, and other styles
4

Nsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.

Full text
Abstract:
This study was carried out with the intention of examining the defensive mechanism employed against the latest cyber espionage methods including both insider and outsider attacks. The main focus of this study was on web servers as the targets of the cyber attacks. Information in connection to the study was obtained from researchers’ online articles. A survey was also conducted at MidSweden University in order to obtain information about the latest cyber attacks on web servers and about the existing defensive mechanism against such attacks. The existing defensive mechanism was surveyed and a si
APA, Harvard, Vancouver, ISO, and other styles
5

Mohr, Peter G., and lswan@deakin edu au. "Abscisic acid regulation of plant defence responses during pathogen attack." Deakin University. School of Biological and Chemical Sciences, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20060927.120049.

Full text
Abstract:
The plant hormone, abscisic acid (ABA), has previously been shown to have an impact on the resistance or susceptibility of plants to pathogens. In this thesis, it was shown that ABA had a regulatory effect on an extensive array of plant defence responses in three different plant and pathogen interaction combinations as well as following the application of an abiotic elicitor. In unique studies using ABA deficient mutants of Arabidopsis, exogenous ABA addition or ABA biosynthesis inhibitor application and simulated drought stress, ABA was shown to have a profound effect on the outcome of inte
APA, Harvard, Vancouver, ISO, and other styles
6

Glass, Stephen Mark. "Wireless Networks: Attack and Defence Security in Emergency Communications Netwoks." Thesis, Griffith University, 2011. http://hdl.handle.net/10072/365797.

Full text
Abstract:
Wireless networks are becoming ubiquitous and can be found in domestic, commercial, industrial, military, and health care applications. One application of particular interest is that of emergency communications where an Incident Area Network (IAN) can be rapidly deployed at an incident site. Wireless networks are well suited to such applications because they can be rapidly established and facilitate the exchange of voice, video and multimedia content such as detailed maps, building plans and photographs. The experience of Hurricane Katrina, the Asian Tsunami and Black Saturday demonstrates the
APA, Harvard, Vancouver, ISO, and other styles
7

Arnold, Jacquelyn. "British civil defence policy in response to the threat of nuclear attack, 1972-1986." Thesis, London Metropolitan University, 2014. http://repository.londonmet.ac.uk/1287/.

Full text
Abstract:
This thesis investigates how successive British governments in the last two decades of the Cold War developed and adapted civil defence policies aimed at mitigating the effects of a nuclear attack on the population of Britain. It tests the hypothesis that civil defence in Britain from 1972 until 1986 was shaped by three distinct influences; economic, ideological and external. It establishes in which ways and to what extent policy was shaped by these factors and which, if any, was the primary determinant of the major policy decisions of the time. It explains how changing economic, ideological a
APA, Harvard, Vancouver, ISO, and other styles
8

Catic, Elma. "A right to self-defence or an excuse to use armed force? : About the legality of using self-defence before an armed attack has occurred." Thesis, Stockholms universitet, Stockholm Center for International Law and Justice (SCILJ), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-183513.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Crossley, G. J. "The civil defence debate in Britain 1957-83 : an account and critical analysis of the major issues in the debate about civil defence against nuclear attack." Thesis, University of Bradford, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.355206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ioannou, Georgios. "The Markov multi-phase transferable belief model : a data fusion theory for enhancing cyber situational awareness." Thesis, Brunel University, 2015. http://bura.brunel.ac.uk/handle/2438/13742.

Full text
Abstract:
eXfiltration Advanced Persistent Threats (XAPTs) increasingly account for incidents concerned with critical information exfiltration from High Valued Targets (HVT's) by terrorists, cyber criminals or enemy states. Existing Cyber Defence frameworks and data fusion models do not adequately address (i) the multi-stage nature of XAPTs and (ii) the uncertainty and conflicting information associated with XAPTs. A new data fusion theory, called the Markov Multi-phase Transferable Belief Model (MM-TBM) is developed, for tracking and predicting XAPTs. MM-TBM expands the attack kill-chain model to attac
APA, Harvard, Vancouver, ISO, and other styles
11

Papadopoulos, Panagiotis [Verfasser]. "Hostile Takeovers - The use of Attack and Defence Strategies : A Literature Review of possible theoretical approaches / Panagiotis Papadopoulos." München : GRIN Verlag, 2011. http://d-nb.info/1182342531/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Jawad, Dina, and Felicia Rosell. "Speak-up as a Resource Based Defence against Application Layer Distributed Denial-of-Service Attacks." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166597.

Full text
Abstract:
Under de senaste åren har antalet DDoS-attacker i Internets applikationsskikt ökat. Detta problem behöver adresseras. Den här rapporten presenterar ett antal existerande metoder för att upptäcka och skydda mot DDoS-attacker i applikationsskiktet. En metod för detta ändamål är att hitta avvikelser av olika typer hos de attackerande klienterna, för att urskilja mellan attackerande och vanliga klienter. Detta är ett brett utforskatförsvarsområde med många positiva resultat, men dessa metoder har ett antal brister, som att de kan resultera i både falska positiva och negativa resultat. En metod som
APA, Harvard, Vancouver, ISO, and other styles
13

Navikaitė, Renata. "Teisė į savigyną pagal tarptautinę teisę." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2006. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20060316_182254-43668.

Full text
Abstract:
The Master's Paper analyses the scope of the right to self-defence under international law. The Author seeks to present a thorough evaluation of the provisions of the United Nations Charter, the rules formed in the customary international law, the jurisprudence of the International Court of Justice as well as the state practice in respect of the implementation conditions of the right to self-defence.The Paper also focuses on the analysis of the theory of preventive self-defence undergoing the formation process as well as on the disclosure of the predicted negative entailments attached to its l
APA, Harvard, Vancouver, ISO, and other styles
14

Mannheimer, Elias. "Dangerous Orbits : Applying the Law of Self-defence to Hostile Acts Against Satellite Systems." Thesis, Uppsala universitet, Juridiska institutionen, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-321385.

Full text
Abstract:
The world has found itself in the unsatisfactory position of depending greatly upon the services of satellites, all while the risk of satellites becoming targets during conflict looms ever greater. This paper assesses the lex lata of the law of self-defence as enshrined in the Charter of the United Nations, focusing on the rationae materiae aspect of the armed attack concept. It thereafter applies general conclusions in this regard to the specific context of hostile acts against satellite systems, with an aim to clarify under what conditions such hostile acts justify the exercise force in self
APA, Harvard, Vancouver, ISO, and other styles
15

Melin, Carl Victor. "Does the threshold for an ‘armed attack’ within the meaning of Article 51 of the UN Charter leave a state unable to act vis-à-vis an opponent using hybrid warfare strategies?" Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-9973.

Full text
Abstract:
The purpose of this thesis to to investigate if the complex and ambiguous means of a hybrid warfare strategy in the context of the ‘armed attack’ threshold. The ‘armed attack’ threshold sits within the UN Charter article 51 and it constitutes the legal provision that the right to self-defence, both unilaterally and collectively, is only triggered in the event of an ‘armed attack’. It is therefore important to determine if this threshold can through the ambiguous and complex structure of hybrid warfare be circumvented or obfuscated to prevent, delay or weaken a State’s ability to act in self- d
APA, Harvard, Vancouver, ISO, and other styles
16

Ciavatta, Emiliano. "Analisi e ricostruzione di flussi TCP con il software Caronte." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/23321/.

Full text
Abstract:
Al giorno d'oggi la maggior parte delle applicazioni che utilizziamo sono connesse a Internet. Le aziende hanno iniziato a fornire i servizi su cloud, spostando la computazione e i dati dai dispositivi dei clienti a server raggiungibili attraverso Internet. Questo fenomeno ha causato un aumento esponenziale del traffico di rete. Esponendo però i servizi su Internet sono aumentate le minacce alla sicurezza che provengono dall'esterno e che passano attraverso la rete. Per questo motivo analizzare il traffico di rete è diventata un'attività fondamentale. I volumi di traffico generati però dalle a
APA, Harvard, Vancouver, ISO, and other styles
17

Harris, Rae. "Spectre: Attack and Defense." Scholarship @ Claremont, 2019. https://scholarship.claremont.edu/scripps_theses/1384.

Full text
Abstract:
Modern processors use architecture like caches, branch predictors, and speculative execution in order to maximize computation throughput. For instance, recently accessed memory can be stored in a cache so that subsequent accesses take less time. Unfortunately microarchitecture-based side channel attacks can utilize this cache property to enable unauthorized memory accesses. The Spectre attack is a recent example of this attack. The Spectre attack is particularly dangerous because the vulnerabilities that it exploits are found in microprocessors used in billions of current systems. It involves
APA, Harvard, Vancouver, ISO, and other styles
18

Moore, Tyler Weston. "Cooperative attack and defense in distributed networks." Thesis, University of Cambridge, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.612283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Zhang, Ning. "Attack and Defense with Hardware-Aided Security." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/72855.

Full text
Abstract:
Riding on recent advances in computing and networking, our society is now experiencing the evolution into the age of information. While the development of these technologies brings great value to our daily life, the lucrative reward from cyber-crimes has also attracted criminals. As computing continues to play an increasing role in the society, security has become a pressing issue. Failures in computing systems could result in loss of infrastructure or human life, as demonstrated in both academic research and production environment. With the continuing widespread of malicious software and new
APA, Harvard, Vancouver, ISO, and other styles
20

Bellavista, Daniele. "Ict security: Defence strategies against targeted attacks." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6960/.

Full text
Abstract:
L’avanzare delle tecnologie ICT e l’abbattimento dei costi di produzione hanno portato ad un aumento notevole della criminalità informatica. Tuttavia il cambiamento non è stato solamente quantitativo, infatti si può assistere ad un paradigm-shift degli attacchi informatici da completamente opportunistici, ovvero senza un target specifico, ad attacchi mirati aventi come obiettivo una particolare persona, impresa o nazione. Lo scopo della mia tesi è quello di analizzare modelli e tassonomie sia di attacco che di difesa, per poi valutare una effettiva strategia di difesa contro gli attacchi mirati.
APA, Harvard, Vancouver, ISO, and other styles
21

Asklander, Niklas, and Christian Schmidt. "ILLUSIONEN OM DET VÄPNADE ANGREPPET." Thesis, Högskolan i Halmstad, Akademin för ekonomi, teknik och naturvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42330.

Full text
Abstract:
The Defence Commission has proposed that the Swedish Armed Forces once again will be assigned the main task of defending Sweden against an armed attack. Defence against an armed attack has gained more focus since the defence decision 2015 and prior to the upcoming defence decision it is even more emphasized. Are the politics and the Swedish Armed Forces in agreement regarding the meaning and implications of this on basis of contemporary threats? The overall aim of the study is to understand the interaction between politics and the Swedish Armed Forces in the designing and shaping of the Swedis
APA, Harvard, Vancouver, ISO, and other styles
22

Freeman, Christopher John. "Are chemical defenses allocated within sponges to defend regions most at risk to predator attack?" Click here to access thesis, 2007. http://www.georgiasouthern.edu/etd/archive/spring2007/christopher_j_freeman/Freeman_Christopher_J_200701_MS.pdf.

Full text
Abstract:
Thesis (M.S.)--Georgia Southern University, 2007.<br>"A thesis submitted to the Graduate Faculty of Georgia Southern University in partial fulfillment of the requirements for the degree Master of Science." Under the direction of Daniel F. Gleason. ETD. Electronic version approved: May 2007. Includes bibliographical references (p. 73-83) and appendices.
APA, Harvard, Vancouver, ISO, and other styles
23

Sohail, Imran, and Sikandar Hayat. "Cooperative Defense Against DDoS Attack using GOSSIP Protocol." Thesis, Blekinge Tekniska Högskola, Avdelningen för telekommunikationssystem, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1224.

Full text
Abstract:
The ability to detect and prevent a network from DDoS attack and to ensure the high quality infrastructure is a back bone of today’s network security issues. In this thesis, we have successfully validated an algorithm using OmNet++ Ver. 4.0 simulation to show how a DDoS attack can be detected and how the nodes can be protected from such an attack using GOSSIP protocol.
APA, Harvard, Vancouver, ISO, and other styles
24

Wong, Ka-Yoon. "Robust defense against small boat attacks." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/4957.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Nearly a decade after the small boat attacks against the USS Cole (in 2000) and M/V Limburg (in 2002) in Yemen, small vessels continue to pose a security threat. In part, this is due to the ease of camouflage and the high frequency of small vessels operating in proximity to important maritime infrastructure, such as bridges and petrochemical plants, and to passenger and military ships. In this study, small boat effectiveness in the interception of attacking speedboats is analyzed using the stochastic, time-stepped, agent-based simula
APA, Harvard, Vancouver, ISO, and other styles
25

Almeida, Rui. "Probability models for defense against missile attacks." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/28466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Chen, Suyuan. "Split Manufacturing: Attacks and Defenses." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1554121132885537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Townsend, James R. "Defense of Naval Task Forces from Anti-Ship Missile attack." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA363038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Wang, Xun. "Widespread Internet attacks defense-oriented evolution and countermeasures /." Columbus, Ohio : Ohio State University, 2007. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1185209072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

You, Yonghua. "A defense framework for flooding-based DDoS attacks." Thesis, Kingston, Ont. : [s.n.], 2007. http://hdl.handle.net/1974/653.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Rafighdoust, Hamed. "The right of self-defence against cyber attacks by states and non-state actors." Doctoral thesis, Universitat Autònoma de Barcelona, 2018. http://hdl.handle.net/10803/666857.

Full text
Abstract:
Actualment, l’evolució tecnològica, particularment en el camp del espai cibernètic, ha donat lloc a reptes seriosos per la seguretat dels Estats. Ocasionalment, els atacs cibernètics tenen els mateixos efectes destructius que les armes militars. Donada la manca d’acords entre Estats per tal de constituir noves normes sobre el ciberespai, la comunitat internacional ha provat de fer front als atacs cibernètics mitjançant l’aplicació per analogia del Dret Internacional existent. En el primer capítol, el nostre estudi inicia amb una aproximació històrica al principi de la prohibició de l’ús de la
APA, Harvard, Vancouver, ISO, and other styles
31

Haberlin, Richard J. "Analysis of unattended ground sensors in theater Missile Defense Attack Operations." Thesis, Monterey, California. Naval Postgraduate School, 1997. http://hdl.handle.net/10945/26369.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Unattended ground sensors have a tremendous potential for improving Tactical Ballistic Missile Attack Operations. To date, however, this potential has gone unrealized primarily due to a lack of confidence in the systems and a lack of tactical doctrine for their employment. This thesis provides analyses to demonstrate the effective use of sensor technology and provides recommendations as to how they may best be employed. The probabilistic decision model reports the optimal size array for each of the candidate array locations. It also pro
APA, Harvard, Vancouver, ISO, and other styles
32

Torok, Alexandra. "Halting attack : startle displays and flash coloration as anti-predator defences." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.709452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Widel, Wojciech. "Formal modeling and quantitative analysis of security using attack- defense trees." Thesis, Rennes, INSA, 2019. http://www.theses.fr/2019ISAR0019.

Full text
Abstract:
L'analyse de risque est un processus très complexe. Elle nécessite une représentation rigoureuse et une évaluation approfondie des menaces et de leur contre-mesures. Cette thèse porte sur la modélisation formelle de la sécurité à l'aide d'arbres d'attaque et de défense. Ces derniers servent à représenter et à quantifier les attaques potentielles afin de mieux comprendre les enjeux de sécurité auxquels le système analysé peut être confronté. Ils permettent donc de guider un expert dans le choix des contre-mesures à implémenter pour sécuriser son système. - Le développement d'une méthodologie ba
APA, Harvard, Vancouver, ISO, and other styles
34

Hancock, Alexandra Preste de Sousa. "Lisboa 2100. Projectar a frente ribeirinha em cenários de alterações climáticas. Water - the only way for a wise city." Master's thesis, Faculdade de Arquitectura de Lisboa, 2012. http://hdl.handle.net/10400.5/4718.

Full text
Abstract:
Tese de Mestrado em Arquitectura com a especialização em Gestão Urbanística.<br>O presente relatório tem como principal tema os impactos territoriais da adaptação às alterações climáticas, desenvolvendo a aplicação de um cenário extremo de subida do nível do mar. O caso de estudo é a frente ribeirinha da cidade de Lisboa no ano de 2100. As alterações climáticas fazem parte dos temas mais actuais e preocupantes nas sociedades contemporâneas pelo que é de extrema importância proceder a um estudo aprofundado do fenómeno e das suas implicações na actividade humana. Existem já investigações em
APA, Harvard, Vancouver, ISO, and other styles
35

Hözel, Jana. "The Paris Attach - a case for the right to self-defence?" Master's thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/24994.

Full text
Abstract:
Terrorist attacks pose a huge threat these days. The attack in Paris on 13 November 2015 has shown that. The terrorist organisation Islamic State (hereinafter: IS) claimed responsibility for the attack. France (and the USA) reacted by launching massive air strikes against the IS stronghold in Raqqa/Syria. Furthermore, France declared that it was exercising its right to self-defence, Art. 51 of the United Nations Charter (hereinafter: UNC). According to the traditional view in international law, the right to self-defence requires an armed attack by a state or alternatively, if the attack was la
APA, Harvard, Vancouver, ISO, and other styles
36

Czarlinska, Aleksandra. "Stealthy attacks and defense strategies in competing sensor networks." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Nanda, Sanjeeb. "GRAPH THEORETIC MODELING: CASE STUDIES IN REDUNDANT ARRAYS OF INDEPENDENT DISKS AND NETWORK DEFENSE." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3165.

Full text
Abstract:
Graph theoretic modeling has served as an invaluable tool for solving a variety of problems since its introduction in Euler's paper on the Bridges of K&ouml;nigsberg in 1736 . Two amongst them of contemporary interest are the modeling of Redundant Arrays of Inexpensive Disks (RAID), and the identification of network attacks. While the former is vital to the protection and uninterrupted availability of data, the latter is crucial to the integrity of systems comprising networks. Both are of practical importance due to the continuing growth of data and its demand at increasing numbers of geograph
APA, Harvard, Vancouver, ISO, and other styles
38

Wang, Ping. "The next generation botnet attacks and defenses." Doctoral diss., University of Central Florida, 2010. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4673.

Full text
Abstract:
A "botnet" is a network of compromised computers (bots) that are controlled by an attacker (botmasters). Botnets are one of the most serious threats to today's Internet; they are the root cause of many current Internet attacks, such as email spam, distributed denial of service (DDoS) attacks, click fraud, etc. There have been many researches on how to detect, monitor, and defend against botnets that have appeared and their attack techniques. However, it is equally important for us to investigate possible attack techniques that could be used by the next generation botnets, and develop effective
APA, Harvard, Vancouver, ISO, and other styles
39

Culpepper, Anna M. "Effectiveness of using red-teams to identify maritime security vulnerabilities to terrorist attack." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sept%5FCulpepper.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, Sept. 2004.<br>Thesis advisor(s): Raymond Buettner, Jr., Dorothy Denning. Includes bibliographical references (p. 65-69). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
40

Richerioux, Nicolas. "Analysis of gene expression in barley upon aphid attack." Thesis, Södertörn University College, School of Life Sciences, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-1289.

Full text
Abstract:
<p>Since plants can not escape their predators by walking, they use some other defense systems, like induction or repression of defense genes. A microarray experiment performed with barley attacked by the bird cherry-oat aphid (Rhopalosiphum padi), led to the hypothesis that contig 16360 (similar to ser/thr kinases) could be linked with the resistance of barley against R. padi, and contig 6519 (similar to WIR 1A) with the susceptibility. Time course experiments showed that contig16360 and AJ250283 (similar to BCI-4) are almost induced in the same way, each, by two different aphids (R. padi and
APA, Harvard, Vancouver, ISO, and other styles
41

Mossberg, Sofia. "Self-Defence Against Non-State Cyber Attacks : The Attribution Problem in Cyberspace." Thesis, Uppsala universitet, Juridiska institutionen, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-411823.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Chen, Xiangqian. "Defense Against Node Compromise in Sensor Network Security." FIU Digital Commons, 2007. http://digitalcommons.fiu.edu/etd/7.

Full text
Abstract:
Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deploy
APA, Harvard, Vancouver, ISO, and other styles
43

Hendricksen, Andrew D. "The optimal employment and defense of a deep seaweb acoustic network for submarine communications at speed and depth using a defender-attacker-defender model." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37637.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>The need for submarines to execute communications at speed and depth (CSD) is a vital link in our nations and our allies defense network. A promising method to do this without limiting the inherent stealth and advantage of submarines is to utilize Deep Seaweb, an underwater acoustic communication network. The challenge is to be able to optimally employ such a network in a constantly changing environment. In particular, our goal is to develop a network that is resilient to a given number of adversary attacks that can disable individual n
APA, Harvard, Vancouver, ISO, and other styles
44

Chang, Kuo-Chao, and 張國昭. "Defence System of D3OS Denial of Service Attack." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/49702905801095278592.

Full text
Abstract:
碩士<br>輔仁大學<br>電子工程學系<br>97<br>Denial of Service/Distributed Denial of Service(DoS/DDoS) attacks become serious problems of network security. How to defeat DoS/DDoS attacks effectively is a important issue of network security. This thesis studies a non-intrude DoS/DDoS attack, which attacks system by exploits holes of network protocols. An attacker sends some special requests to exhaust the resources of the victim. This thesis proposes a system to effectively prevent these non-intrude attacks. The proposed system evaluates the attributes of clients (such as packet per second – pps bit per secon
APA, Harvard, Vancouver, ISO, and other styles
45

shen, Tse-Wei, and 沈澤崴. "Geographic Threat, Military Defense Capability and Defence budget-Cold War and 911 Terrorist Attack." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/aqqxfy.

Full text
Abstract:
碩士<br>中原大學<br>企業管理研究所<br>99<br>In the study, we research and analysis the scale of impact of defence budget from defense capabilities and geographic threat. And to further explore the difference of military threat and the factors of changes of its defence budget with before and after the Cold War or 911 Terrorist Attack. The range of data have two division point. The first division point is the end of Cold War. We collected the data before ten years and after ten years of Cold War. The second division point is in 2001, 911Terrorist Attack. The data before the incident occurred five years and f
APA, Harvard, Vancouver, ISO, and other styles
46

Lepáček, Marek. "Nutná obrana v ČR, SR a v Irské republice." Master's thesis, 2017. http://www.nusl.cz/ntk/nusl-316492.

Full text
Abstract:
The purpose of this thesis is to deeply analyze the issue of self-defence as a circumstance excluding an illegality. For its comparison with other countries and for better understanding of its substance this thesis also focuses on the Slovak and Irish legislation of self-defence. For that reason, this dissertation is divided into 4 chapters, where 3 of them talk about self-defence in the different country. The first part briefly displays the evolution of self-defence since 1852. The second part focuses mainly on general knowledge of self-defence and its application in case law. It includes bas
APA, Harvard, Vancouver, ISO, and other styles
47

Imeson, Frank. "An Attack and a Defence in the Context of Hardware Security." Thesis, 2013. http://hdl.handle.net/10012/7596.

Full text
Abstract:
The security of digital Integrated Circuits (ICs) is essential to the security of a computer system that comprises them. We present an improved attack on computer hardware that avoids known defence mechanisms and as such raises awareness for the need of new and improved defence mechanisms. We also present a new defence method for securing computer hardware against modifications from untrusted manufacturing facilities, which is of concern since manufacturing is increasingly outsourced. We improve upon time triggered based backdoors, inserted maliciously in hardware. Prior work has addressed det
APA, Harvard, Vancouver, ISO, and other styles
48

蘇怡萍. "A Defence Scheme Against Identity Theft Attack Based On Multiple Social Networks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/07704035365222959267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Lu, Kaimin, and 呂開明. "MALICIOUS PROGRAM ANALYZER AND IMPLEMENTION BASED ON THE COMPUTER INFORMATION SECURITY ATTACK AND DEFENCE." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/53778078854660584970.

Full text
Abstract:
碩士<br>大同大學<br>通訊工程研究所<br>94<br>Current commercial antivirus software could not guarantee much, because it is not easy to detect the Trojan program. In this thesis, we focus on the characteristics of the Trojan programs and try to realize their key techniques and the correlation between them and the operating system. The system weakness for invasion are analyzed and the finding can be used to design more secure operation system. After the data collection and analysis, we build a Trojan program on the basis of the regular characteristics and test it against both the commercial antivirus software
APA, Harvard, Vancouver, ISO, and other styles
50

Coelho, Rui Cardoso. "Psychopathy in attack and defence conflicts: a triarchic model approach to the neurophysiological correlates of outcome." Master's thesis, 2019. https://hdl.handle.net/10216/123914.

Full text
Abstract:
A relação entre traços de Psicopatia e processos de tomada de decisãoeconómica tem sido amplamente estudada na literatura. Contudo apenas umnúmero limitado de estudos considera estes traços de personalidade na sua relaçãocom paradigmas de tomada de decisão económica em contextos de Ataque eDefesa. No presente estudo, explorou-se o efeito moderador da Ousadia, Maldadee Desinibição no papel preditivo dos correlatos neuronais (FRN e P300 relacionadocom feedback) do resultado do investimento numa versão adaptada do Predator-Prey Game. Foram recrutados 47 voluntários (28 mulheres) da comunidade sem
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!