Dissertations / Theses on the topic 'Attack rate'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Attack rate.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Chui, Hiu-fai Sam. "Evaluation of measures taken by financial institutes under the interest rate swing caused by the currency attack /." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19882117.
Full textChui, Hiu-fai Sam, and 徐曉暉. "Evaluation of measures taken by financial institutes under the interest rate swing caused by the currency attack." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31268766.
Full textSaran, Nurdan A. "Time Memory Trade Off Attack On Symmetric Ciphers." Phd thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12610437/index.pdf.
Full textDistinguished Point Method and Rainbow Method. Finally, we discuss the adjustment of the parameters to achieve a high success rate. To support our theoretical framework, we also present empirical results of our analysis to actual ciphers.
Xia, Yu. "Selective Dropping of Rate Limiting Against Denial of Service Attacks." University of Dayton / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1461705316.
Full textBencel, Jozef. "Analýza bezpečnosti bezdrátových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218125.
Full textIkusan, Ademola A. "Collaboratively Detecting HTTP-based Distributed Denial of Service Attack using Software Defined Network." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1515067456228498.
Full textTaylor, Matthew H. "Defining a Model for Tool Consumption Rate on Asphalt Reclamation Machines." BYU ScholarsArchive, 2006. https://scholarsarchive.byu.edu/etd/1293.
Full textLarsson, Niklas, and Josefsson Fredrik Ågren. "A study of slow denial of service mitigation tools and solutions deployed in the cloud." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-157721.
Full textSEGAFREDO, GIULIA. "New Heart Failure Hospitalization in the Italian region of Lombardy - Epidemiological and economic impact." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2015. http://hdl.handle.net/10281/76821.
Full textCarvalho, Thiago Lima de Carvalho. "Comparação de respotas funcionais de duas espécie de peixes píscivoras." Universidade Federal Rural do Semi-Árido, 2016. http://bdtd.ufersa.edu.br:80/tede/handle/tede/573.
Full textMade available in DSpace on 2017-03-20T15:42:35Z (GMT). No. of bitstreams: 1 ThiagoLC_DISSERT.pdf: 1446311 bytes, checksum: f9df761557b8cd9c1f4395f10697bdbd (MD5) Previous issue date: 2016-02-22
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
Species of the Cichla genus have been introduced in a variety of tropical aquatic ecosystems, thus resulting in a marked reduction in diversity and population size of native fish assemblies due to their predatory behavior. Despite Cichla induced impact the mechanisms by which the species are still poorly known. In this study we compared the functional response of an alien predator fish C. kelberi and a native predator H. aff. malabaricus. More specifically, the tested hypotheses were: 1) both predator species have functional responses of type II on different prey species, and 2) the functional responses of the alien predator were higher for all preys when compared to the native predator. The predators were acclimated in tanks of 500 liters and fed twice daily with preys O. niloticus and L.vannamei for 3 days, 4 preys in the morning and 4 in the afternoon. Hunger levels were standardized after a fast of 48 hours. After the pre-experimental phase an exemplar of C. kelberi was randomly introduced in each tank of O. niloticus with initial prey densities of 2, 4, 8, 16, 25 and 40, and for L. vannamei 2, 4, 8, 16, 32 and 64 (n = 4 per density). After 24 hours the number of prey consumed was counted. This method was repeated for the native predator H. aff. malabaricus. Totaling 48 experimental units. The functional response C. kelberi was greater than or equivalent to the native predator H. aff. malabaricus. There was no difference in consumption between the two species at low densities. The attack rate did not differ between the two predators and handling time was driven by C. kelberi for the species O. niloticus. However, the two species showed functional response type II, thus corroborating with the comparative functional response method to predict the impact on native communities. Functional Comparative Response is a quick and reliable method to predict the ecological impacts of invasive species
Espécies do gênero Cichla têm sido introduzidas em vários ecossistemas aquáticos tropicais, resultando em uma redução na diversidade e tamanho populacional de assembleias de peixes nativos, devido a sua atuação predatória. Os mecanismos de predação pelos quais o tucunaré (Cichla kelberi) permanece pouco conhecido. Nesse estudo foram comparadas as resposta funcionais de um peixe predador alienígena C. kelberi e de um predador nativo Hoplias aff. malabaricus. Especificamente, foram testadas as hipóteses: 1) que ambas as espécies de predador apresentam respostas funcionais do Tipo II, na qual a espécie preda em baixa densidade, sobre diferentes espécies de presas, e que 2) as respostas funcionais do predador alienígena foram maiores para todas as presas, quando comparados com o predador nativo. Os predadores foram aclimatados nos tanques de 500 litros e alimentados duas vezes ao dia com alevinos de Oreochromis niloticus e Litopenaeus vannamei durante 3 dias, 4 presas pela manhã e 4 presas a tarde. Os níveis de fome foram padronizados depois de um jejum de 48 horas. Foi introduzido aleatoriamente um exemplar de C. kelberi em cada tanque de O. niloticus com densidades iniciais de presas de 2, 4, 8, 16, 25 e 40 e para L. vannamei 2, 4, 8, 16, 32 e 64 (n = 4 por densidade), e depois de 24 horas contabilizado o número de presas consumidas. Este método foi repetido para o predador nativo H. aff. malabaricus. Totalizando 48 unidades experimentais. A resposta funcional de C, kelberi foi maior ou equivalente a do predador nativo H. aff. malabaricus. Não houve diferença no consumo entre as duas espécies nas baixas densidades. A taxa de ataque não diferenciou entre os dois predadores e o tempo de manipulação foi impulsionado por C, kelberi para a espécie O. niloticus. As duas espécies apresentaram resposta funcional do tipo II corroborando com o método de resposta funcional comparativa de prever os impactos nas comunidades nativas. Respostas funcionais é um método rápido e confiável para previsão de impactos ecológicos de espécies invasoras
2017-03-20
Hilborn, Anne Winona. "The effect of individual variability and larger carnivores on the functional response of cheetahs." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/82040.
Full textPh. D.
Lyons, James Edward. "Population Ecology and Foraging Behavior of Breeding Birds in Bottomland Hardwood Forests of the Lower Roanoke River." Diss., Virginia Tech, 2001. http://hdl.handle.net/10919/26429.
Full textPh. D.
Huang, Wei. "A Population-Based Perspective on Clinically Recognized Venous Thromboembolism: Contemporary Trends in Clinical Epidemiology and Risk Assessment of Recurrent Events: A Dissertation." eScholarship@UMMS, 2014. https://escholarship.umassmed.edu/gsbs_diss/730.
Full textHuang, Wei. "A Population-Based Perspective on Clinically Recognized Venous Thromboembolism: Contemporary Trends in Clinical Epidemiology and Risk Assessment of Recurrent Events: A Dissertation." eScholarship@UMMS, 2011. http://escholarship.umassmed.edu/gsbs_diss/730.
Full textWong, Yuen-ting, and 黃婉婷. "Inferring influenza epidemic attack rates from serological surveillance data." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45174696.
Full textMakke, Ali. "Détection d'attaques dans un système WBAN de surveillance médicale à distance." Thesis, Paris 5, 2014. http://www.theses.fr/2014PA05S006/document.
Full textOne of the major challenges of the world in recent decades is the continued increase in the elderly population in developed countries. Hence the need to provide quality care to a rapidly growing population while reducing the costs of health care is becoming a strategic challenge. In this context, many researches focus on the use of wireless sensor networks in WBAN (Wireless Body Area Network) systems to facilitate and improve the quality of medical care and remote monitoring. These WBAN systems pose new technological challenges in terms of security and protection against faults and attacks. The wireless communication mode used between the sensors and the collection node accentuates these vulnerabilities. Indeed vulnerabilities in a WBAN system are divided into two main parts. The first part consists of the possible attacks on the network of medical sensors and on the wireless communications medium between the sensors and the processing unit. The second part consists of possible attacks on high-speed communications between the WBAN system and the medical server. The objective of this thesis is to meet some of the problems of detecting attacks in a WBAN system for remote medical monitoring. To achieve this goal, we propose an algorithm to detect the jamming attacks targeting the wireless communications medium between the sensors and the processing unit. In addition we propose a method of measuring divergence to detect the flooding attacks targeting the high-speed communications between the WBAN system and the medical server
Broome, Simon Jeremy. "Essays on exchange rate target zone theory and speculative attacks." Thesis, University of York, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.362061.
Full textLu, Yuanchao. "On Traffic Analysis Attacks To Encrypted VoIP Calls." Cleveland State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=csu1260222271.
Full textVuchuru, Mayura Uppuluri Prem. "Detecting race condition attacks on file systems." Diss., UMK access, 2005.
Find full text"A thesis in computer science." Typescript. Advisor: Prem Uppuluri. Vita. Title from "catalog record" of the print edition Description based on contents viewed June 27, 2006. Includes bibliographical references (leaves 80-82). Online version of the print edition.
SHARMA, RISHIE. "Detection of Low-Rate DoS Attacks againstHTTP Servers using Spectral Analysis." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-155895.
Full textAl-Saydali, Josef, and Mahdi Al-Saydali. "Performance comparison between Apache and NGINX under slow rate DoS attacks." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-103181.
Full textSyrichas, G. "Balance of payments crises : The theory of speculative attacks and optimal regime switching." Thesis, University of Essex, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.381260.
Full textAndell, Oscar, and Albin Andersson. "Slow rate denial of service attacks on dedicated- versus cloud based server solutions." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148480.
Full textSilva, Maria Luiza Falcao. "Modern exchange-rate regimes, stabilisation programmes, and co-ordination of macroeconomic policies : recent experiences of selected developing Latin American economies." Thesis, Heriot-Watt University, 1997. http://hdl.handle.net/10399/1237.
Full textSola, Martin. "Essays on speculative attacks on fixed exchange rate regimes, speculative bubbles and endogenous switching regime estimation." Thesis, University of Southampton, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.316309.
Full textSikora, Marek. "Detekce slow-rate DDoS útoků." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-317019.
Full textMilutin, Otilia Clara. "Panic attacks violent female displacement in The Tale of Genji /." Connect to this title, 2008. http://scholarworks.umass.edu/theses/128/.
Full textBeck, Tino Niclas. "Zelluläre und humorale Faktoren für das Überleben diskordanter Herzxenotransplantate in Abwesenheit des Membran-Attack-Complex eine experimentelle Studie im Meerschweinchen-Ratte-Xenotransplantationsmodell /." [S.l.] : [s.n.], 2002. http://deposit.ddb.de/cgi-bin/dokserv?idn=967127319.
Full textLefébure, Robert. "Effects of temperature and terrestrial carbon on fish growth and pelagic food web efficiency." Doctoral thesis, Umeå universitet, Institutionen för ekologi, miljö och geovetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-54028.
Full textSchwarz, Christopher Charles. "Attack-ademically Ineligible: Student Athlete Sex Crimes and the Dangerous Misunderstandings of FERPA." The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1457096185.
Full textBianco, Ilaria <1995>. "The correlation between crude oil price and key geopolitical events. An investigation of crude death rate of terroristic attacks and Pandemics from 1968 to 2019." Master's Degree Thesis, Università Ca' Foscari Venezia, 2020. http://hdl.handle.net/10579/18108.
Full textBianco, Ilaria <1995>. "The correlation between crude oil price and key geopolitical events. An investigation of crude death rate of terroristic attacks and Pandemics from 1968 to 2019." Master's Degree Thesis, Università Ca' Foscari Venezia, 2020. http://hdl.handle.net/10579/18480.
Full textNyberg, Ralph Heinz-Erik [Verfasser], Georg [Akademischer Betreuer] Sigl, Dirk [Gutachter] Rabe, Ulf [Gutachter] Schlichtmann, and Georg [Gutachter] Sigl. "New Techniques for Emulating Fault Attacks / Ralph Heinz-Erik Nyberg ; Gutachter: Dirk Rabe, Ulf Schlichtmann, Georg Sigl ; Betreuer: Georg Sigl." München : Universitätsbibliothek der TU München, 2018. http://d-nb.info/1176701770/34.
Full textSicard, Kenneth M. "Multimodal MRI, Behavioral Testing, and Histology in a Rat Model of Transient Focal Cerebral Ischemia : A Dissertation." eScholarship@UMMS, 2006. http://escholarship.umassmed.edu/gsbs_diss/318.
Full textHabr, Soraya Ferreira. "Efeitos da administração de interleucina-2 na liberação in vivo de dopamina no nucleus accumbens e no comportamento maternal em ratas." Universidade de São Paulo, 2008. http://www.teses.usp.br/teses/disponiveis/42/42136/tde-24032009-133946/.
Full textInterleukin-2 (IL-2) modulates the dopaminergic neurotransmission, that into the nucleus accumbens (N.Ac) plays a role in maternal behavior. The IL-2 dose used in this study does not have motor effects. Both peripheral and central N.Ac injections decreased the percent of mothers grouping pups together and the number of grouped pups. IL-2 injections into the N.Ac resulted in longer latencies to retrieve first and second pups and increased aggressive behavior. In order to test if these behavioral effects would be related to the IL-2 reduced the DOPAC (dopamine metabolite) concentrations in the N.Ac of virgin rats treated with IL-2. This suggests suggest that the IL-2 dose used in this study does not alter so much the dopaminergic transmission by influencing extracellular levels of this neurotransmitter.
Bonsall, Todd Andrew. "The geochemistry of carbonate-hosted Pb-Zn-Ag mineralization in the Lavrion District, Attica, Greece fluid inclusion, stable isotope, and rare earth element studies /." [Ames, Iowa : Iowa State University], 2008.
Find full textAl-Aulaqi, Nader. "Arab-Muslim views, images and stereotypes in United States." CSUSB ScholarWorks, 2003. https://scholarworks.lib.csusb.edu/etd-project/2275.
Full text陳志偉. "Preventing Low-Rate TCP Targeted Denial-of-Service Attack." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/70045731415546316093.
Full text國立交通大學
資訊工程系所
92
Spurious timeout is very harmful to TCP. Two kinds of approaches were proposed to mitigate this problem, conservative approach and aggressive approach. In conservative approach, a conservative RTO (Retransmission Timeout), minRTO, is used. When RTO estimate form RTT (Round Trip Time) is less than minRTO, it is set to minRTO. This makes RTO become predictable and may be exploited by attackers. Low-Rate TCP Targeted Denial of Service is such kind of attack. In this thesis, we propose four schemes to deal with this problem. We make RTO unpredictable and keep conservative property. Analysis and experiment will be made to show that our schemes survive the attack. In our scheme, much better throughput is gained under attack. Besides, in usual condition, our schemes affect TCP performance only slightly. We will also analysis how Low-Rate TCP Targeted Denial of Service damages TCP operation inherently and how to gain the best throughput even if it is not achieved successfully.
Chang, Chi-yu, and 張志宇. "A Coordinated defense scheme against high-rate DDoS Attack." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/19604905058759151790.
Full text國立屏東商業技術學院
資訊管理系(所)
98
Distributed denial-of-service (DDoS) attacks can be regarded as the most serious threats for current Internet. This paper presents a two-tier coordination approach for detecting and mitigating DDoS attacks. The first tier filter (1st TF) filters suspicious traffic for possible flooding. This is achieved by using proactive tests to identify and isolate the malicious traffic. The second tier filter (2nd TF), which is deployed on network routers, performs online monitoring on queue length status with RED/Droptail mechanism for any incoming traffic. The simulation shows that the scheme can detect attacks accurately and effectively.
"Defending against low-rate TCP attack: dynamic detection and protection." 2005. http://library.cuhk.edu.hk/record=b5892579.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2005.
Includes bibliographical references (leaves 89-96).
Abstracts in English and Chinese.
Abstract --- p.i
Chinese Abstract --- p.iii
Acknowledgement --- p.iv
Chapter 1 --- Introduction --- p.1
Chapter 2 --- Background Study and Related Work --- p.5
Chapter 2.1 --- Victim Exhaustion DoS/DDoS Attacks --- p.6
Chapter 2.1.1 --- Direct DoS/DDoS Attacks --- p.7
Chapter 2.1.2 --- Reflector DoS/DDoS Attacks --- p.8
Chapter 2.1.3 --- Spoofed Packet Filtering --- p.9
Chapter 2.1.4 --- IP Traceback --- p.13
Chapter 2.1.5 --- Location Hiding --- p.20
Chapter 2.2 --- QoS Based DoS Attacks --- p.22
Chapter 2.2.1 --- Introduction to the QoS Based DoS Attacks --- p.22
Chapter 2.2.2 --- Countermeasures to the QoS Based DoS Attacks --- p.22
Chapter 2.3 --- Worm based DoS Attacks --- p.24
Chapter 2.3.1 --- Introduction to the Worm based DoS Attacks --- p.24
Chapter 2.3.2 --- Countermeasures to the Worm Based DoS Attacks --- p.24
Chapter 2.4 --- Low-rate TCP Attack and RoQ Attacks --- p.26
Chapter 2.4.1 --- General Introduction of Low-rate Attack --- p.26
Chapter 2.4.2 --- Introduction of RoQ Attack --- p.27
Chapter 3 --- Formal Description of Low-rate TCP Attacks --- p.28
Chapter 3.1 --- Mathematical Model of Low-rate TCP Attacks --- p.28
Chapter 3 2 --- Other forms of Low-rate TCP Attacks --- p.31
Chapter 4 --- Distributed Detection Mechanism --- p.34
Chapter 4.1 --- General Consideration of Distributed Detection . --- p.34
Chapter 4.2 --- Design of Low-rate Attack Detection Algorithm . --- p.36
Chapter 4.3 --- Statistical Sampling of Incoming Traffic --- p.37
Chapter 4.4 --- Noise Filtering --- p.38
Chapter 4.5 --- Feature Extraction --- p.39
Chapter 4.6 --- Pattern Matching via the Dynamic Time Warping (DTW) Method --- p.41
Chapter 4.7 --- Robustness and Accuracy of DTW --- p.45
Chapter 4.7.1 --- DTW values for low-rate attack: --- p.46
Chapter 4.7.2 --- DTW values for legitimate traffic (Gaussian): --- p.47
Chapter 4.7.3 --- DTW values for legitimate traffic (Self-similar): --- p.48
Chapter 5 --- Low-Rate Attack Defense Mechanism --- p.52
Chapter 5.1 --- Design of Defense Mechanism --- p.52
Chapter 5.2 --- Analysis of Deficit Round Robin Algorithm --- p.54
Chapter 6 --- Fluid Model of TCP Flows --- p.56
Chapter 6.1 --- Fluid Math. Model of TCP under DRR --- p.56
Chapter 6.1.1 --- Model of TCP on a Droptail Router --- p.56
Chapter 6.1.2 --- Model of TCP on a DRR Router --- p.60
Chapter 6.2 --- Simulation of TCP Fluid Model --- p.62
Chapter 6.2.1 --- Simulation of Attack with Single TCP Flow --- p.62
Chapter 6.2.2 --- Simulation of Attack with Multiple TCP flows --- p.64
Chapter 7 --- Experiments --- p.69
Chapter 7.1 --- Experiment 1 (Single TCP flow vs. single source attack) --- p.69
Chapter 7.2 --- Experiment 2 (Multiple TCP flows vs. single source attack) --- p.72
Chapter 7.3 --- Experiment 3 (Multiple TCP flows vs. synchro- nized distributed low-rate attack) --- p.74
Chapter 7.4 --- Experiment 4 (Network model of low-rate attack vs. Multiple TCP flows) --- p.77
Chapter 8 --- Conclusion --- p.83
Chapter A --- Lemmas and Theorem Derivation --- p.85
Bibliography --- p.89
Tseng, Sung-Chih, and 曾嵩智. "Attack Rate and Associated Factors of Intestinal Parasites Infection Among Foreign Workers." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/25618206463432584720.
Full text國立陽明大學
公共衛生研究所
97
Background In order to meet the pressing human resource needs of employers, Taiwan hire thousands of foreign workers to help address skill and labour shortages every years. Most of the foreign workers are come from Philippine, Thailand, Indonesia and Vietnam. By the health policy, all foreign workers must complete a health examination before hiring in Taiwan. According to the statistic data from Centers for Disease Control, Taiwan;the highest abnormal health examination result was intestinal parasites infection. Object This study is focus on the analysis of intestinal parasites infection and associated factors of the Southeast Asia foreign workers who had work in Taiwan, base on our health examination data. Matterial and Methods We collected the health examination data of foreign worker who received examination in Lishin hospital , Taiwan from 2006 Jan to 2007 Dec. We included the Southeast Asia foreign workers who had received immigrate and regular health exam in Lishin hospital. Results We collected 9,363 foreign workers in this study. There were 4,415(47.2%) men, and 4,948(52.8%) women. There were 2,018(21.4%) persons from Indonesia, 2,741 (29.3%) from Philippine, 3,067(32.8%) from Thailand and 1,537(16.4%) from. Vietnam The abnormal stool examination rate of regular health exam is 6.5%(611 persons). According to sex, the prevalence rate in male is 4.7%, female 8.2%. The age specified prevalence rate in group younger than 25 years old is the highest.(6.5%). The overweight group has lower abnormal rate(5.6%). According to the country, the prevalence rate in Indonesia is 10.2%(206), 9.1%(109) in Vietnam, 5.8%(159) in Philippine and 4.5%(137) in Thailand. The worker who had abnormal stool data in immigrate health exam has higher abnormal rate(17.5%) in regular health exam. After multiple logistic regression analysis, we found The abnormal stool examination rate of regular health exam is associated with gender, age, nation, BMI, and stool exam data in immigrate health exam. Conclusion This study shows the intestinal parasites infection rate in the foreign workers from Indonesia, female, younger than 25 years old, and had abnormal stool exam in immigrate health exam was higher than others. Our government should pay more attention to prevent parasite infection from Southeast Asia country.
Jen, Kuo han, and 郭瀚仁. "The Research of Interaction of Interest Rate and Exchange Rate - an Empirical Work of 911 terrorist attack in United States." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/74154802014106385097.
Full text國立暨南國際大學
國際企業學系
94
In 1980s, the increase of the federal budget deficit and the trade deficit both happened. Feldstein (1982) stated the federal budget deficit will cause unprecedented trade deficit. In 2001, the 911 terrorist attack severely destroyed the New York and American society. The disaster had huge impact on the financial institutions and the international trade with foreign countries. We want to evaluate the impact of 911 disaster on capital mobility with the break in Sep 11 2001. In comparison with the past studies of interaction of the interest rate and exchange rate to evaluate the capital mobility, we use the new time series methodology to investigate the issue of the capital mobility and discuss the main theses about this research. According to the research by Hatemi-J and Irandoust (2000), we use the Granger-causality test of the interest rate and exchange rate to evaluate the capital mobility based on the model from the balance of payments. About the empirical results, at first, we use the unit root test to check if the series data are stationary. Secondly, we use Granger-causality test to find out the empirical results. Finally, we can prove that the Granger-causality relationships between the interest rate & the exchange rate, the interest rate & the financial account have been changed because they have unidirectional causality causes after the 911 terrorist attack. Hence, the 911 terrorist attack could have the significant influence on the capital mobility through the empirical results of Granger-causality test.
Padhye, Jaideep D. "Stepping-stone network attack kit (SNEAK) for evading timing-based detection methods under the cloak of constant rate multimedia streams." 2008. http://hdl.handle.net/10106/1046.
Full textShu-Hui, Shen. "Time Trend in Mortality and Attack rate of Nosocomial Infection by specific pathogens :surveillence data between 1994-2003 in SKH Hospital ,Taiwan." 2005. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2107200517364600.
Full textShen, Shu-Hui, and 沈淑惠. "Time Trend in Mortality and Attack rate of Nosocomial Infection by specific pathogens :surveillence data between 1994-2003 in SKH Hospital ,Taiwan." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/64608726151372533324.
Full text國立臺灣大學
預防醫學研究所
93
Objective We aimed to (1) assess time trend in attack rate, case-fatality rate, and mortality rate; (2) assess whether time trend vary multiple episodes, infection site , and pathogen; and to evaluate the interval between admission and onset of infection by pathogen Methods Data on surveillance of nosocomial infection in SKMH was available electronically. We collected information on discharged patients, episodes of nosocomial Infections, and deaths between 1994 and 2003. After excluding 19,271 deliveries in the contemporaneous period, a total of 282,898 discharged patients were included in the following analysis. Of these patients, we identified 5330 patients with 8885 episodes of NI during 10-year period. After linkage with Taiwan National Mortality Registry, 1,711 deaths were ascertained, including 965 in-hospital deaths and 746 critical against advice discharge (AAD) deaths. Among death cases, 1,495 deaths (87.4%) died within 30 days after onset of NIs. We used a decomposition method to divide mortality related to NI into attack rate and case-fatality rate and assess time trend for these three rates. Time-series Poisson regression model was used to assess the change of three rate after controlling for other significant factors. The comparison of interval between admission and onset of infection between the USA and Taiwan was also made. Results The overall time trend in attack rate has declined by 6%, decreasing from 3.30% in 1994 to 3.14 in 2003. However, the overall case-fatality rate was elevated by 55%, increasing from 13.96% in 1994 to 21.6% in 2003. Both yielded 46% increase in mortality rate attributed to NI, from 0.46% in 1994 to 0.67% in 2003.pathogens has declined from 1996 but rebounded since 2000. Episodes without culture had a slight increase since 1996. For case-fatality, the majority of pathogens showed an increasing trend. Only coagulase-negative Staphylococcus s and K pneumoniae showed a decreasing trend. The finding form attack rate together with case-fatality gives the results of mortality rate with an increasing trend for most pathogens. Only coagulase-negative Staphylococcus showed a decreasing trend. The mortality trend for P. aeruginosa, K.pneumoniae, and E. cloacae was fairly constant. For multiple pathogens, time trend in mortality trend was pursuant to that in attack rate with declining from the year of 1996 and resurged from the year of 2000. By using time-series Poisson regression analysis, after controlling for gender, age, frequency of admission, length of stays, and infection site, an increase (per week) in attack rate was 0.04% for fungus, 0.001% for S.aureus, 0.1% for E.coli, 0.047% for Acinetobacter spp, 0.037% for Enterococcus, and 0.33% for Enterobacter spp. The remaining pathogens showed a decline trend including Pseudomonas aeruginosa , coagulase-negative Staphylococcus, and E.coloacae. Episodes with multiple pathogens has declined from 1996 but rebounded since 2000. The average interval between admission and onset of infection in our study was longer that that in the USA. This is particularly seen for S.aureus, Coagulase-nagative Staphylococcus, fungus, and E.coli. Conclusions Nosocomial infection with time trend decomposed in to attack rate, case-fatality rate and mortality using data from a large medical center varied with age, pathogen and site of infection. Such heterogeneity of time trend in attack rate and case-fatality rate may imply different measures for control nosocomial infection and need to be clarified in future research.
Chen, Che-Feng, and 陳哲鋒. "The detection and prevention of low-rate DoS attacks." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/03361065215645788942.
Full text國防大學理工學院
資訊工程碩士班
101
The number of internet user increase in these years. According to the survey report of 2012 Internet Worlds Stats, the global online population is nearly up to 2.1 billion, compared to 1.15 billion people in 2007.It is about twice the growth. As the number of Internet population is doubling, information security incidents also are increasing. The Kaspersky Lab report said the Internet attacks in the past month (2013/4/6 ~ 2013/5/4) is about four million. That is a long-term job for IT staff to keep the network secure but not offence the network convenience. In Kaspersky Lab's data, denial of service attacks is about 70 % of all. The attacking target is to run out the servers’ resources. Therefore legal users cannot access servers normally. That result from attackers send a large number of packets. Defenders check the packet contents and observe flow change rate to figure out the attacks. The attackers then evolve into another type of attacks, named Low-Rate DoS. They use few packets to achieve the effect of denial of service attacks, which is different from traditional attacks sending a large number of packets in a short time. The attacks send “enough” packets to fill the buffer of service servers or “complex” packets to consume the computation power of service servers. There are many defense methods on low rate attacking proposed for making legal users access the server resources. Actually attacker can send requests to consume a lot of resources of the system, so legal users need waiting for a long time to get the response from servers. That is a kind of denial of service attacks. This thesis proposes the defense methods by observing the frequency of the user accessing times. Furthermore, we introduce the concept of priority to further obstruct the distributed low rate attacks. The maximum waiting time is assumed as the user response time tolerated. If the responding time exceeds the tolerate response time, the denial of service attacks achieve. According to the current network information magazine, the human maximum tolerate request time is 8 seconds. Without using the proposed defense methods, only 1.8% legal users can access servers. With the proposed defense mechanism, legal users access rate increases to 96.6%. It is about 50 times in increase.
Yi-Hsuang, Chang, and 章玉鉉. "Target Zones and Speculative Attacks: An Analysis of Dual Exchange Rate Markets." Thesis, 1994. http://ndltd.ncl.edu.tw/handle/06166686583695023887.
Full textAnantharam, Karunakar. "An autonomous router-based solution to detect and defend low rate DDoS attacks." Thesis, 2005. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2005-002.
Full textCHEN, CHI-WEN, and 陳麒文. "A novel research on defense against for low-rate distributed denial of service attacks." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/p6t9s9.
Full text國立勤益科技大學
資訊工程系
106
This paper mainly discusses and studies the evolution of the current web protocol (HTTP), and how to face and effectively guard against the current attacks on this communication protocol. The HTTP protocol is currently the most widely used and most widely used protocol on the Internet, because currently all industries and industries use their own brands, products, images, advertisements, etc. to make use of the rich and diverse web pages. Content is used for promotion, marketing, etc... Beyond the B2C model; companies and companies will also use HTTP as a convenient communication protocol and use different HTTP methods (GET / POST / PUT / DELETE) to quickly establish APIs (Application) The communication interface of the Programming Interface allows both companies to more quickly integrate products and conduct business transactions. For example, online shopping websites that are very popular at present are using this feature to connect with third-party payment services and the system of logistics providers, so that consumers can choose not only to purchase a variety of products for purchase on the website, but also to allow Consumers can choose various payment modes and logistics methods to complete product distribution during checkout, thereby stimulating consumers' willingness to shop. As the most mainstream communication protocol, of course, it has become the biggest target of attacks. The HTTP-based attack model and methods are also dazzling. This dissertation focuses on one of the most common attack modes, Low-Rate Distributed Denial of Service, as the topic of this dissertation. In the paper's research results, it proposes how to build Nginx. A low-cost and effective defense against low-speed blocking attacks.
LIOU, YAN-JIE, and 劉彥頡. "A Study on the Defense of Low-Rate Denial-of-Service Attacks against HTTP/2 Services." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/31216180136535154237.
Full text國立高雄應用科技大學
資訊管理研究所碩士班
104
Network security has always been one of the most critical agenda to enterprises and researchers. Nowadays, with the widespread adoption of HTTP/2, more and more research has indicated that HTTP/2 is more vulnerable to Denial-of-Service (DoS) attacks. However, few solutions and mechanisms are available to defend the Denial-of-Service (DoS) attacks against the HTTP/2 services. In this paper, an algorithm for defending Low-Rate Denial-of-Service Attacks against HTTP/2 Services is proposed to reduce the security risk of HTTP/2 services.