To see the other types of publications on this topic, follow the link: Cyber Algorithm.

Dissertations / Theses on the topic 'Cyber Algorithm'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 27 dissertations / theses for your research on the topic 'Cyber Algorithm.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Thames, John Lane. "Advancing cyber security with a semantic path merger packet classification algorithm." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45872.

Full text
Abstract:
This dissertation investigates and introduces novel algorithms, theories, and supporting frameworks to significantly improve the growing problem of Internet security. A distributed firewall and active response architecture is introduced that enables any device within a cyber environment to participate in the active discovery and response of cyber attacks. A theory of semantic association systems is developed for the general problem of knowledge discovery in data. The theory of semantic association systems forms the basis of a novel semantic path merger packet classification algorithm. The theo
APA, Harvard, Vancouver, ISO, and other styles
2

Chatterjee, Aakriti. "Development of an RSA Algorithm using Reduced RISC V instruction Set." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1617104502129937.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Roychowdhury, Sayak. "Data-Driven Policies for Manufacturing Systems and Cyber Vulnerability Maintenance." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1493905616531091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Guymon, Daniel Wade. "Cyber-physical Algorithms for Enhancing Collaboration." Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/31919.

Full text
Abstract:
The research presented in this thesis covers two specific problems within the larger domain of cyber-physical algorithms for enhancing collaboration between one or more people. The two specific problems are 1) determining when people are going to arrive late to a meeting and 2) creating ad-hoc secure pairing protocols for short-range communication. The domain was broken down at opposite extremes in order to derive these problems to work on: 1) collaborations that are planned long in advance and deviations from the plan need to be detected and 2) collaborations that are not planned and need t
APA, Harvard, Vancouver, ISO, and other styles
5

Gujrati, Sumeet. "Models and algorithms for cyber-physical systems." Diss., Kansas State University, 2013. http://hdl.handle.net/2097/16922.

Full text
Abstract:
Doctor of Philosophy<br>Department of Computing and Information Sciences<br>Gurdip Singh<br>In this dissertation, we propose a cyber-physical system model, and based on this model, present algorithms for a set of distributed computing problems. Our model specifies a cyber-physical system as a combination of cyber-infrastructure, physical-infrastructure, and user behavior specification. The cyber-infrastructure is superimposed on the physical-infrastructure and continuously monitors its (physical-infrastructure's) changing state. Users operate in the physical-infrastructure and interact with th
APA, Harvard, Vancouver, ISO, and other styles
6

Furrer, Frank J., and Georg Püschel. "From Algorithmic Computing to Autonomic Computing." Technische Universität Dresden, 2018. https://tud.qucosa.de/id/qucosa%3A30773.

Full text
Abstract:
In algorithmic computing, the program follows a predefined set of rules – the algorithm. The analyst/designer of the program analyzes the intended tasks of the program, defines the rules for its expected behaviour and programs the implementation. The creators of algorithmic software must therefore foresee, identify and implement all possible cases for its behaviour in the future application! However, what if the problem is not fully defined? Or the environment is uncertain? What if situations are too complex to be predicted? Or the environment is changing dynamically? In many such cases algor
APA, Harvard, Vancouver, ISO, and other styles
7

Kem, Oudom. "Modélisation et exploitation des connaissances de l’environnement : une approche multi-agents pour la recherche d’itinéraires multi-objectifs dans des environnements ubiquitaires." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSEM023.

Full text
Abstract:
L'utilisation des téléphones intelligents, le recours aux assistants personnels intelligents ou encore le développement des maisons intelligentes sont autant d'exemples illustrant le développement toujours plus rapide de l'informatique ubiquitaire, de l'Internet des objets et de l'intelligence artificielle. Le croisement des résultats issus de ces domaines de recherche contribue à changer notre quotidien et constitue un environnement fertile pour de nouveaux travaux. Ainsi, l’intégration des entités cyber-physiques dans des environnements sociaux de différentes échelles allant des maisons aux
APA, Harvard, Vancouver, ISO, and other styles
8

Staub, Nicolas. "Models, algorithms and architectures for cooperative manipulation with aerial and ground robots." Thesis, Toulouse 3, 2018. http://www.theses.fr/2018TOU30169/document.

Full text
Abstract:
Les dernières années ont vu le développement de recherches portant sur l'interaction physique entre les robots aériens et leur environnement, accompagné de l'apparition de nombreux nouveaux systèmes mécaniques et approches de régulation. La communauté centrée autour de la robotique aérienne observe actuellement un déplacement de paradigmes des approches classiques de guidage, de navigation et de régulation vers des tâches moins triviales, telle le développement de l'interaction physique entre robots aériens et leur environnement. Ceci correspond à une extension des tâches dites de manipulation
APA, Harvard, Vancouver, ISO, and other styles
9

Markwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.

Full text
Abstract:
This dissertation treats a variety of topics in the computer security domain which have direct impact on everyday life. The first extends false data injection attacks against state estimation in electric power grids and then provides a novel power flow model camouflage method to hamper these attacks. The second deals with automotive theft response, detailing a method for a car to intelligently identify when it has been stolen, based on collected behavioral traits of its driver. The third demonstrates a new attack against the content integrity of the PDF file format, caus- ing humans and comput
APA, Harvard, Vancouver, ISO, and other styles
10

Rukavina, Ivan. "Cyber-physics intrinsic modelling for smart systems." Thesis, Compiègne, 2021. http://bibliotheque.utc.fr/EXPLOITATION/doc/IFD/2021COMP2581.

Full text
Abstract:
Dans le cadre de cette thèse, une approche de calcul de couplage multi-échelle et multi-physique en 2D et en 3D est présentée. La modélisation multi-échelle d’une structure consiste de l’échelle macro qui représente la réponse homogénéisée de la structure entière, tandis que l’échelle micro peut capturer les détails du comportement à la petite échelle du matériau, où des mécanismes inélastiques, tels que la plasticité ou l’endommagement, peuvent être pris en compte. L’intérieur de chaque macro-élément est rempli par le maillage à l’échelle micro qui s’y adapte entièrement. Les deux échelles so
APA, Harvard, Vancouver, ISO, and other styles
11

Parizad, Ali. "False Data and Threat Detection Methods for Power Systems Under Cyber Attacks Based On Big Data and Deep Learning Algorithms." OpenSIUC, 2021. https://opensiuc.lib.siu.edu/dissertations/1941.

Full text
Abstract:
Power systems play a crucial role in the national economy and public safety of the countries. After the technological revolution in modern power systems, a large volume of data is incorporated into the processes of generation companies and customers. Consistent with this issue, we have the integration of Information and Communication Technologies (ICT) into the power system, making it a form of Cyber-Physical System (CPS). With the introduction of the ICT components, we have a new concept in the power system known as Big Data. Big data refers to a large volume of received data from gateways wi
APA, Harvard, Vancouver, ISO, and other styles
12

Haj, kacem Mohamed Amine. "Contribution au développement d'une méthodologie de diagnostic des systèmes Cyber-Physique." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT119.

Full text
Abstract:
Les systèmes industriels recouvrent de nombreuses formes. Aujourd'hui, ils sont le plus souvent organisés en réseaux. Les nouvelles technologies de l'information et de la communication apportent un ensemble de moyens supplémentaires pour réaliser des applications ayant un intérêt majeur pour renforcer l'exploitation sûre de ces systèmes et la sécurité des personnes.Parmi ces systèmes industriels, on peut citer les systèmes cyber-physiques (CPS) caractérisés par un grand nombre de variables, des non linéarités et des incertitudes. Leur décomposition en sous-systèmes, permet de les rendre plus f
APA, Harvard, Vancouver, ISO, and other styles
13

Al, Khatib Mohammad. "Analyse de stabilité, ordonnancement, et synthèse des systèmes cyber-physiques." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM041/document.

Full text
Abstract:
Il s'agit d'une étude menée sur les systèmes cyber-physiques sur trois aspects principaux: la vérification de la stabilité, l'ordonnancement et la synthèse des paramètres. Les systèmes de contrôle embarqués (ECS) agissant dans le cadre de contrats temporels sont la classe considérée de systèmes cyber-physiques dans la thèse. ECS fait référence à des intégrations d'un dispositif informatique avec le système physique. En ce qui concerne les contrats temporels, ils sont des contraintes de temps sur les instants où se produisent certains événements tels que l'échantillonnage, l'actionnement et le
APA, Harvard, Vancouver, ISO, and other styles
14

Wei, Longfei. "Game-Theoretic and Machine-Learning Techniques for Cyber-Physical Security and Resilience in Smart Grid." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3850.

Full text
Abstract:
The smart grid is the next-generation electrical infrastructure utilizing Information and Communication Technologies (ICTs), whose architecture is evolving from a utility-centric structure to a distributed Cyber-Physical System (CPS) integrated with a large-scale of renewable energy resources. However, meeting reliability objectives in the smart grid becomes increasingly challenging owing to the high penetration of renewable resources and changing weather conditions. Moreover, the cyber-physical attack targeted at the smart grid has become a major threat because millions of electronic devices
APA, Harvard, Vancouver, ISO, and other styles
15

Petersen, Rebecca. "Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28002.

Full text
Abstract:
Data mining can be defined as the extraction of implicit, previously un-known, and potentially useful information from data. Numerous re-searchers have been developing security technology and exploring new methods to detect cyber-attacks with the DARPA 1998 dataset for Intrusion Detection and the modified versions of this dataset KDDCup99 and NSL-KDD, but until now no one have examined the performance of the Top 10 data mining algorithms selected by experts in data mining. The compared classification learning algorithms in this thesis are: C4.5, CART, k-NN and Naïve Bayes. The performance of t
APA, Harvard, Vancouver, ISO, and other styles
16

Gracy, Sebin. "Input and State Observability of Linear Network Systems with Application to Security of Cyber Physical Systems." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT075/document.

Full text
Abstract:
Cette thèse traite de la notion d’observabilité états-entrées (ISO) dans les systèmes de réseaux linéaires. On cherche des caractérisations graphiques en utilisant la notion de structure (resp. s-structural) ISO. Tout d’abord nous nous concentrons sur les systèmes de réseaux linéaires invariant en temps, représentés par des graphes fixes et fournissons des caractérisations pour structure ISO fortes. Par la suite, nous nous intéressons aux systèmes de réseaux linéaires variant en temps, dans lesquels nous nous concentrons d’abord sur le cas particulier des graphes fixes (la structure du graphe
APA, Harvard, Vancouver, ISO, and other styles
17

Ujjwal, Kumar. "Cyber haggler web based bargaining using genetic algorithm /." 2007. http://purl.galileo.usg.edu/uga%5Fetd/ujjwal%5Fkumar%5F200705%5Fms.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Yang, Shun-Chieh, and 楊順傑. "A Discrete Cyber Swarm Algorithm with Intensification and Diversification Strategies." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/27775423616829818686.

Full text
Abstract:
碩士<br>國立暨南國際大學<br>資訊管理學系<br>101<br>Metaheuristic technique is one of the important methods for solving optimization problems. Many related researches were proposed. Among them, hybrid algorithms combining advantageous features of multiple algorithms appear to be more significant for solving complex problems. Cyber Swarm Algorithm (CSA) is a hybrid algorithm and has been shown to be more effective than several state-of-the-art algorithms for the continuous optimization problem, such as PSO, SS, and GRASP. This paper proposes a discrete version of CSA (to be referred to as DCSA) by considering t
APA, Harvard, Vancouver, ISO, and other styles
19

CHAO, CHING-HUI, and 趙景暉. "Cyber Swarm Algorithm Based Multiple Prediction Methods for Taiwan Electricity Demand." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/80321751010797910367.

Full text
Abstract:
碩士<br>國立暨南國際大學<br>資訊管理學系<br>104<br>Stable electricity supply is the basis of economic development for many countries. In order to satisfy the electric power demand of Taiwan's future economic development and environmental protection, new power plants using green energy must be developed, especial the potential solar and wind energy sources in off-island areas. Accurate electricity demand forecasting plays an important role in the economic dispatch of electricity system. This study develops three demand forecasting models based on the Cyber Swarm Algorithm (CSA) which inherits the main features
APA, Harvard, Vancouver, ISO, and other styles
20

(8782601), Puwadol Dusadeerungsikul. "Operations Analytics and Optimization for Unstructured Systems: Cyber Collaborative Algorithms and Protocols for Agricultural Systems." Thesis, 2020.

Find full text
Abstract:
<p>Food security is a major concern of human civilization. A way to ensure food security is to grow plants in a greenhouse under controlled conditions. Even under careful greenhouse production, stress in plants can emerge, and can cause damaging disease. To prevent yield loss farmers, apply resources, e.g., water, fertilizers, pesticides, higher/lower humidity, lighting, and temperature, uniformly in the infected areas. Research, however, shows that the practice leads to non-optimal profit and environmental protection.</p><p>Precision agriculture (PA) is an approach to address such challenges.
APA, Harvard, Vancouver, ISO, and other styles
21

Zheng, Renda, and 鄭仁達. "A study for the implementation of discrete cyber swarm algorithms." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/44755480295420644635.

Full text
Abstract:
碩士<br>國立暨南國際大學<br>資訊管理學系<br>99<br>Cyber Swarm Algorithm (CSA) combining Particle Swarm Optimization (PSO) and Scatter Search/Path relinking (SS/PR) concepts has been empirically shown to effectively solve continuous optimization problems. However, the extension to discrete optimization problems is still uncharted. This motivates the thesis for proposing a Discrete Cyber Swarm Algorithm (DCSA). In addition to the applications of PSO and SS/PR, DCSA also marries with techniques such as aging, solution guide selection, and uncertainty principle in the machine learning domain. Further, DCSA applie
APA, Harvard, Vancouver, ISO, and other styles
22

"From Algorithmic Computing to Autonomic Computing." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2018. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-232820.

Full text
Abstract:
In algorithmic computing, the program follows a predefined set of rules – the algorithm. The analyst/designer of the program analyzes the intended tasks of the program, defines the rules for its expected behaviour and programs the implementation. The creators of algorithmic software must therefore foresee, identify and implement all possible cases for its behaviour in the future application! However, what if the problem is not fully defined? Or the environment is uncertain? What if situations are too complex to be predicted? Or the environment is changing dynamically? In many such cases algor
APA, Harvard, Vancouver, ISO, and other styles
23

Bigazzi, Luca. "Development of navigation techniques and algorithms for small uavs (unmanned aerial vehicle) able to follow trajectories with centimeter precision." Doctoral thesis, 2021. http://hdl.handle.net/2158/1247581.

Full text
Abstract:
This thesis work presents project ``Dart'', i.e. the development of an UAV prototype able to perform autonomous navigation using only on-board systems and sensors. The main objective is to achieve positioning and path following with centimetric precision by using only mass market technologies, in order to ascertain the gap between a completely autonomous ultra-high precision drones and commercial products with reasonable costs. To this aim, Dart core has been designed to feature a high precision on-board vision-based positioning system exploiting the following components: a small camera carrie
APA, Harvard, Vancouver, ISO, and other styles
24

Saradha, R. "Malware Analysis using Profile Hidden Markov Models and Intrusion Detection in a Stream Learning Setting." Thesis, 2014. http://etd.iisc.ac.in/handle/2005/3129.

Full text
Abstract:
In the last decade, a lot of machine learning and data mining based approaches have been used in the areas of intrusion detection, malware detection and classification and also traffic analysis. In the area of malware analysis, static binary analysis techniques have become increasingly difficult with the code obfuscation methods and code packing employed when writing the malware. The behavior-based analysis techniques are being used in large malware analysis systems because of this reason. In prior art, a number of clustering and classification techniques have been used to classify the malware
APA, Harvard, Vancouver, ISO, and other styles
25

Saradha, R. "Malware Analysis using Profile Hidden Markov Models and Intrusion Detection in a Stream Learning Setting." Thesis, 2014. http://hdl.handle.net/2005/3129.

Full text
Abstract:
In the last decade, a lot of machine learning and data mining based approaches have been used in the areas of intrusion detection, malware detection and classification and also traffic analysis. In the area of malware analysis, static binary analysis techniques have become increasingly difficult with the code obfuscation methods and code packing employed when writing the malware. The behavior-based analysis techniques are being used in large malware analysis systems because of this reason. In prior art, a number of clustering and classification techniques have been used to classify the malware
APA, Harvard, Vancouver, ISO, and other styles
26

Kumar, Pawan. "Memory Efficient Regular Expression Pattern Matching Architecture For Network Intrusion Detection Systems." Thesis, 2012. https://etd.iisc.ac.in/handle/2005/2321.

Full text
Abstract:
The rampant growth of the Internet has been coupled with an equivalent growth in cyber crime over the Internet. With our increased reliance on the Internet for commerce, social networking, information acquisition, and information exchange, intruders have found financial, political, and military motives for their actions. Network Intrusion Detection Systems (NIDSs) intercept the traffic at an organization’s periphery and try to detect intrusion attempts. Signature-based NIDSs compare the packet to a signature database consisting of known attacks and malicious packet fingerprints. The signatures
APA, Harvard, Vancouver, ISO, and other styles
27

Kumar, Pawan. "Memory Efficient Regular Expression Pattern Matching Architecture For Network Intrusion Detection Systems." Thesis, 2012. http://etd.iisc.ernet.in/handle/2005/2321.

Full text
Abstract:
The rampant growth of the Internet has been coupled with an equivalent growth in cyber crime over the Internet. With our increased reliance on the Internet for commerce, social networking, information acquisition, and information exchange, intruders have found financial, political, and military motives for their actions. Network Intrusion Detection Systems (NIDSs) intercept the traffic at an organization’s periphery and try to detect intrusion attempts. Signature-based NIDSs compare the packet to a signature database consisting of known attacks and malicious packet fingerprints. The signatures
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!