Dissertations / Theses on the topic 'Hybrid security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Hybrid security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Chaulagain, Dewan. "Hybrid Analysis of Android Applications for Security Vetting." Bowling Green State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1555608766287613.
Full textMundi, Anuj V. "PLC-WiFi hybrid broadband Internet deployment and security /." [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0006964.
Full textTeo, Hong-Siang. "Security of sensor networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Jun%5FTeo.pdf.
Full textThesis Advisor(s): John McEachen. "June 2006." Includes bibliographical references (p. 49-51). Also available in print.
Van, der Horst Timothy W. "Thor : the hybrid online repository /." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd696.pdf.
Full textCheng, Carol Shaoyu. "A hybrid approach to power system voltage security assessment." Diss., Georgia Institute of Technology, 1991. http://hdl.handle.net/1853/15469.
Full textKatsis, Grigorios. "Multistage security mechanism for hybrid, large scale wireless sensor networks." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Jun%5FKatsis.pdf.
Full textThesis Advisor(s): Murali Tummala, Gamani Karunasiri. "June 2007." Includes bibliographical references (p. 57-59). Also available in print.
Warmington, Sheray Kimberlyn. "State failure and hybrid security governance : the case of Jamaica." Thesis, University of York, 2017. http://etheses.whiterose.ac.uk/21205/.
Full textSuru, Hassan U. "Security and usability in a hybrid property based graphical authentication system." Thesis, University of Salford, 2018. http://usir.salford.ac.uk/48724/.
Full textСабадаш, Віктор Володимирович, Виктор Владимирович Сабадаш, Viktor Volodymyrovych Sabadash, and В. В. Сабадаш. "The security challenges of hybrid work formats in a digital economy." Thesis, ДВНЗ «Приазовський державний технічний університет», 2021. https://essuir.sumdu.edu.ua/handle/123456789/84066.
Full textИсследованы ключевые вызовы безопасности гибридных форматов работы в цифровой экономике
The key security challenges of hybrid work formats in the digital economy are investigated
Sunkaralakunta, Venkatarama Reddy Rakesh. "A User-Centric Security Policy Enforcement Framework for Hybrid Mobile Applications." University of Dayton / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1564744609523447.
Full textFießler, Andreas Christoph Kurt. "Hybrid Hardware/Software Architectures for Network Packet Processing in Security Applications." Doctoral thesis, Humboldt-Universität zu Berlin, 2019. http://dx.doi.org/10.18452/20023.
Full textNetwork devices like switches, bridges, routers, and firewalls are subject to a continuous development to keep up with ever-rising requirements. As the overhead of software network processing already became the performance-limiting factor for a variety of applications, also former software functions are shifted towards dedicated network processing hardware. Although such application-specific circuits allow fast, parallel, and low latency processing, they require expensive and time-consuming development with minimal possibilities for adaptions. Security can also be a major concern, as these circuits are virtually a black box for the user. Moreover, the highly parallel processing capabilities of specialized hardware are not necessarily an advantage for all kinds of tasks in network processing, where sometimes a classical CPU is better suited. This work introduces and evaluates concepts for building hybrid hardware-software-systems that exploit the advantages of both hardware and software approaches in order to achieve performant, flexible, and versatile network processing and packet classification systems. The approaches are evaluated on standard software systems, extended by a programmable hardware circuit (FPGA) to provide full control and flexibility. One key achievement of this work is the identification and mitigation of challenges inherent when a hybrid combination of multiple packet classification circuits with different characteristics is used. We introduce approaches to reduce redundant classification effort to a minimum, like re-usage of intermediate classification results and determination of dependencies by header space analysis. In addition, for some further challenges in hardware based packet classification like filtering circuits with dynamic updates and fast hash functions for lookups, we describe feasibility and optimizations. At last, the hybrid approach is evaluated using a standard SDN switch instead of the FPGA accelerator to prove portability.
Li, Jianzhou, and University of Lethbridge Faculty of Arts and Science. "Design of a novel hybrid cryptographic processor." Thesis, Lethbridge, Alta. : University of Lethbridge, Faculty of Arts and Science, 2005, 2005. http://hdl.handle.net/10133/266.
Full textviii, 87 leaves : ill. (some col.) ; 28 cm.
Tamagna-Darr, Lucas. "Evaluating the effectiveness of an intrusion prevention system-honeypot hybrid /." Online version of thesis, 2009. http://hdl.handle.net/1850/10837.
Full textAbdul, Kadir Muhd K. "Food security modelling using two stage hybrid model and fuzzy logic risk assessment." Thesis, University of Warwick, 2013. http://wrap.warwick.ac.uk/55721/.
Full textHomonyuk, Angelina Anatoliyivna, and Ангеліна Анатоліївна Гомонюк. "Information security of Ukraine in the conditions of globalizations challenges and hybrid war." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51636.
Full textThe urgency of the work lies in the fact that recently the problem of information security in Ukraine has become more and more frequent, which is especially relevant in connection with the escalation of the active phase of the hybrid war. The armed conflict in eastern Ukraine, the annexation of Crimea, and terrorist actions against Ukrainian statehood are all superimposed on the harsh, fake anti-Ukrainian information rhetoric used in the state-run media. The issue of dissemination of negative and unreliable information via the Internet is especially acute. In the context of globalization, information and communication technologies are an integral part of human life. They have become a factor involved in the production of goods and services. Such changes entail the transformation of both the social structure of society and, in all spheres — economic, sociopolitical, and spiritual — profound revolutionary transformations are taking place. In the context of an armed conflict, information technologies are becoming levers of influence that threaten the loss of Ukraine’s sovereignty. The creation and dissemination of the latest technologies and global means of communication has led to the global information revolution. The growing role of information in public life has raised to a new level the problem of information security. They are extremely relevant at the present stage of development of information and communication technologies. This suggests that the results of the scientific and technological revolution can be used not only for positive purposes, but also to have negative consequences for society. The most obvious challenges caused by uneven access to technology are the widening of the digital divide between countries, opportunities to preserve the cultural identity of nation states in a globalized world, the rise in cybercrime, and so on. This has given rise to a new phenomenon of the modern world - «information security», which affects the interests of each individual country and, at the regional and global levels, is an element of the overall system of international security.
Актуальність роботи полягає в тому, що останнім часом проблема інформаційної безпеки в Україні стає дедалі частішою, що особливо актуально у зв'язку з загостренням активної фази гібридної війни. Збройний конфлікт на сході України, анексія Криму та терористичні акції проти української державності накладаються на жорстку, фейкову антиукраїнську інформаційну риторику, що використовується в державних ЗМІ. Особливо гостро стоїть питання поширення негативної та недостовірної інформації через Інтернет. В умовах глобалізації інформаційно-комунікаційні технології є невід’ємною частиною людського життя. Вони стали чинником виробництва товарів та послуг. Такі зміни тягнуть за собою трансформацію як соціальної структури суспільства, так і в усіх сферах - економічної, соціально-політичної та духовної - відбуваються глибокі революційні перетворення. В умовах збройного конфлікту інформаційні технології стають важелями впливу, які загрожують втратою суверенітету України. Створення та розповсюдження новітніх технологій та глобальних засобів комунікації призвели до глобальної інформаційної революції. Зростання ролі інформації в суспільному житті підняло на новий рівень проблему інформаційної безпеки. Вони надзвичайно актуальні на сучасному етапі розвитку інформаційно-комунікаційних технологій.Це говорить про те, що результати науково-технічної революції можуть бути використані не тільки в позитивних цілях, а й мати негативні наслідки для суспільства. Найбільш очевидними проблемами, спричиненими нерівномірним доступом до технологій, є збільшення цифрового розриву між країнами, можливості збереження культурної самобутності національних держав у глобалізованому світі, зростання кіберзлочинності тощо. Це породило нове явище сучасного світу - «інформаційну безпеку», яке зачіпає інтереси кожної окремо взятої країни і на регіональному та глобальному рівнях є елементом загальної системи міжнародної безпеки.
Roy-Chowdhury, Ayan. "Improving network performance, security and robustness in hybrid wireless networks using a satellite overlay." College Park, Md.: University of Maryland, 2008. http://hdl.handle.net/1903/8879.
Full textThesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Sapegin, Andrey [Verfasser], Christoph [Akademischer Betreuer] Meinel, and Andreas [Akademischer Betreuer] Polze. "High-Speed Security Log Analytics Using Hybrid Outlier Detection / Andrey Sapegin ; Christoph Meinel, Andreas Polze." Potsdam : Universität Potsdam, 2019. http://d-nb.info/1217813047/34.
Full textAli, Ayaz. "Analysis of key security and privacy concerns and viable solutions in Cloud computing." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-90806.
Full textButton, Mark. "'Big fish in little ponds' : private security officers and the policing of private and hybrid space." Thesis, London School of Economics and Political Science (University of London), 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.423018.
Full textRen, Yonglin. "Towards Secure and Trustworthy Wireless Ad hoc Networks." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22909.
Full textRamsey, Glenn. "Hardware/software optimizations for elliptic curve scalar multiplication on hybrid FPGAs /." Online version of thesis, 2008. http://hdl.handle.net/1850/7765.
Full textShankar, Sonu. "Parameter assignment for improved connectivity and security in randomly deployed wireless sensor networks via hybrid omni/uni-directional antennas." Thesis, [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2892.
Full textBorison, Torbjorn. "Object Synchronization and Security for Mobile Communications Devices." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93276.
Full textAli-Gombe, Aisha Ibrahim. "Malware Analysis and Privacy Policy Enforcement Techniques for Android Applications." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2290.
Full textKim, Hyunho. "Comparing the policing and management of security in private/hybrid space in South Korea and the United Kingdom." Thesis, University of Portsmouth, 2016. https://researchportal.port.ac.uk/portal/en/theses/comparing-the-policing-and-management-of-security-in-privatehybrid-space-in-south-korea-and-the-united-kingdom(b544835f-f25b-483a-89cd-79f6bf2d4f24).html.
Full textKhomlyak, Olha. "An investigation of lightweight cryptography and using the key derivation function for a hybrid scheme for security in IoT." Thesis, Blekinge Tekniska Högskola, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14982.
Full textWunderer, Thomas [Verfasser], Johannes [Akademischer Betreuer] Buchmann, and Martin [Akademischer Betreuer] Albrecht. "On the Security of Lattice-Based Cryptography Against Lattice Reduction and Hybrid Attacks / Thomas Wunderer ; Johannes Buchmann, Martin Albrecht." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2018. http://d-nb.info/116879868X/34.
Full textManocha, Jitendra. "Using innovation from block chain technology to address privacy and security problems of Internet of Things." Thesis, KTH, Industriell Marknadsföring och Entreprenörskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209682.
Full textFießler, Andreas Christoph Kurt [Verfasser], Björn [Gutachter] Scheuermann, Andrew W. [Gutachter] Moore, and Georg [Gutachter] Carle. "Hybrid Hardware/Software Architectures for Network Packet Processing in Security Applications / Andreas Christoph Kurt Fießler ; Gutachter: Björn Scheuermann, Andrew W. Moore, Georg Carle." Berlin : Humboldt-Universität zu Berlin, 2019. http://d-nb.info/1189213710/34.
Full textFießler, Andreas [Verfasser], Björn [Gutachter] Scheuermann, Andrew W. [Gutachter] Moore, and Georg [Gutachter] Carle. "Hybrid Hardware/Software Architectures for Network Packet Processing in Security Applications / Andreas Christoph Kurt Fießler ; Gutachter: Björn Scheuermann, Andrew W. Moore, Georg Carle." Berlin : Humboldt-Universität zu Berlin, 2019. http://d-nb.info/1189213710/34.
Full textPrakash, Abhinav. "Anonymous and Secure Communication in a Wireless Mesh Network." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1352397027.
Full textChen, Suyuan. "Split Manufacturing: Attacks and Defenses." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1554121132885537.
Full textDehkhoda, Dorna. "Combining IRAM2 with Cost-BenefitAnalysis for Risk Management : Creating a hybrid method with traditional and economic aspects." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-67511.
Full textGhairat, Noorullah. "Defense, Development and Diplomacy in Hybrid State-building Interventions : A local perspective on the outcomes of Provincial Reconstruction Teams in Afghanistan." Thesis, Linnéuniversitetet, Institutionen för samhällsstudier (SS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-106889.
Full textSalehi, Pour Mehr Vahid. "Development and Verification of Control and Protection Strategies in Hybrid AC/DC Power Systems for Smart Grid Applications." FIU Digital Commons, 2012. http://digitalcommons.fiu.edu/etd/804.
Full textEskenazi, Sébastien. "On the stability of document analysis algorithms : application to hybrid document hashing technologies." Thesis, La Rochelle, 2016. http://www.theses.fr/2016LAROS019/document.
Full textAn innumerable number of documents is being printed, scanned, faxed, photographed every day. These documents are hybrid : they exist as both hard copies and digital copies. Moreover their digital copies can be viewed and modified simultaneously in many places. With the availability of image modification software, it has become very easy to modify or forge a document. This creates a rising need for an authentication scheme capable of handling these hybrid documents. Current solutions rely on separate authentication schemes for paper and digital documents. Other solutions rely on manual visual verification and offer only partial security or require that sensitive documents be stored outside the company’s premises and a network access at the verification time. In order to overcome all these issues we propose to create a semantic hashing algorithm for document images. This hashing algorithm should provide a compact digest for all the visually significant information contained in the document. This digest will allow current hybrid security systems to secure all the document. This can be achieved thanks to document analysis algorithms. However those need to be brought to an unprecedented level of performance, in particular for their reliability which depends on their stability. After defining the context of this study and what is a stable algorithm, we focused on producing stable algorithms for layout description, document segmentation, character recognition and describing the graphical parts of a document
Bansal, Tarun Kumar. "Designing generic asymmetric key cryptosystem with message paddings." Thesis, Queensland University of Technology, 2018. https://eprints.qut.edu.au/117071/1/Tarun%20Kumar_Bansal_Thesis.pdf.
Full textMegahed, Mohamed Helmy Mostafa. "SurvSec Security Architecture for Reliable Surveillance WSN Recovery from Base Station Failure." Thèse, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31154.
Full textKoffi, Affoué Marie-Noël. "Réflexions pour un renouveau du droit des sûretés personnelles." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSES060.
Full textTraditionally considered as a unilateral contract, a bond requires the guarantor to perform a service. However, in order to protect the guarantor, considered as a weak party when it contracts with a professional creditor, the legislator has, over the years, through various reforms, imposed obligations on the creditor receiving a guarantee. While these new creditor constraints have created an imbalance between the protection of the parties, the resulting ad hoc reforms, without an overall vision, have undermined the readability and harmonisation of the subject matter and constitute an obstacle to legal certainty and the purpose of security. To this must be added the particular nature of the bond, in this case, its accessory nature, which raises enforcement difficulties. These imperfections of the model security have led to the practice of developing new personal securities considered as substitutes for suretyship and using mechanisms of the law of obligations for security purposes. However, the multiplication of personal securities creates a risk of competition between them and hinders the rationalisation of the matter. Therefore, it is necessary to rethink the law of personal securities. This study proposes a new security model (the hybrid personal security) with a legal regime borrowed in part from the guarantee and first-demand guarantee, oriented towards a unitary approach to personal securities guaranteeing payment commitments
Kalibjian, Jeff. "Securing Telemetry Post Processing Applications with Hardware Based Security." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605052.
Full textThe use of hardware security for telemetry in satellites utilized for intelligence and defense applications is well known. Less common is the use of hardware security in ground-based computers hosting applications that post process telemetry data. Analysis reveals vulnerabilities in software only security solutions that can result in the compromise of telemetry data housed on ground-based computer systems. Such systems maybe made less susceptible to compromise with the use of hardware based security.
Cortijo, Aragon Santiago José. "Sécurité pour des infrastructures critiques SCADA fondée sur des modèles graphiques probabilistes." Electronic Thesis or Diss., Sorbonne université, 2018. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2018SORUS502.pdf.
Full textIn this thesis two new Bayesian-Network-based models are proposed: conditional truncated densities Bayesian networks (ctdBN) and conditional densities Bayesian networks (cdBN). They model joint probability distributions of systems combining discrete and continuous random variables. We analyze the complexity of exact inference for the proposed models, concluding that they are in the same order of the one for the classical Bayesian Network model. We also analyze the challenge of learning cdBNs, proposing a score function based in the BD score as well as a whole learning algorithm based on the structural EM algorithm, assuming the existence of discrete latent variables corresponding to each continuous variable. In addition, we proof theoretically that the cdBN and ctdBN models can approximate well any Lipschitz joint probability distribution, which shows the expressiveness of these models. Within the framework of the European project SCISSOR, whose goal is cyber-security, we use the cdBN model to describe the dynamics of a SCADA system and to diagnose anomalies in observations taken in real time, interpreting an anomaly as a potential threat to the integrity of the system
Nilsson, Pierre. "Hybridhotbilden mot Sverige : En kvalitativ försvars- och säkerhetspolitisk innehållsanalys om hybridhot." Thesis, Karlstads universitet, Institutionen för samhälls- och kulturvetenskap (from 2013), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-82726.
Full textSiddiqui, Muhammad Anas. "Cloud Computing : Evaluation, as a platform for Scania Architecture." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-18896.
Full textSein, Chaw Chaw [Verfasser], Ralph [Akademischer Betreuer] Mitlöhner, Joachim [Akademischer Betreuer] Saborowski, and František [Akademischer Betreuer] Hapla. "Growth and Site Conditions of Acacia mangium, Acacia hybrid, Eucalyptus urophylla, Cinnamomum parthenoxylon and Erythropholeum fordii for Livelihood Security of Smallholders in Industrial Tree Planting Programs of Vietnam / Chaw Chaw Sein. Gutachter: Ralph Mitlöhner ; Joachim Saborowski ; František Hapla. Betreuer: Ralph Mitlöhner." Göttingen : Niedersächsische Staats- und Universitätsbibliothek Göttingen, 2012. http://d-nb.info/1042262780/34.
Full text[Verfasser], Chaw Chaw Sein, Ralph [Akademischer Betreuer] Mitlöhner, Joachim [Akademischer Betreuer] Saborowski, and František [Akademischer Betreuer] Hapla. "Growth and Site Conditions of Acacia mangium, Acacia hybrid, Eucalyptus urophylla, Cinnamomum parthenoxylon and Erythropholeum fordii for Livelihood Security of Smallholders in Industrial Tree Planting Programs of Vietnam / Chaw Chaw Sein. Gutachter: Ralph Mitlöhner ; Joachim Saborowski ; František Hapla. Betreuer: Ralph Mitlöhner." Göttingen : Niedersächsische Staats- und Universitätsbibliothek Göttingen, 2012. http://nbn-resolving.de/urn:nbn:de:gbv:7-webdoc-3435-6.
Full textDrira, Wassim. "Secure collection and data management system for WSNs." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00814664.
Full textRebiha, Rachid 1977. "Métodos formais algébricos para geração de invariantes." [s.n.], 2011. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275741.
Full textTese (doutorado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-19T00:11:05Z (GMT). No. of bitstreams: 1 Rebiha_Rachid_D.pdf: 1451665 bytes, checksum: abe6fc4e72cf43113c7c93064ab11ed8 (MD5) Previous issue date: 2011
Resumo: É bem sabido que a automação e a eficácia de métodos de verificação formal de softwares, sistemas embarcados ou sistemas híbridos, depende da facilidade com que invariantes precisas possam ser geradas automaticamente a partir do código fonte. Uma invariante é uma propriedade, especificada sobre um local específico do código fonte, e que sempre se verifica a cada execução de um sistema. Apesar dos progressos enormes ao longo dos anos, o problema da geração de invariantes ainda está em aberto para tanto programas não-lineares discretos, como para sistemas não-lineares híbridos. Nesta tese, primeiramente, apresentamos novos métodos computacionais que podem automatizar a descoberta e o fortalecimento de relações não-lineares entre as variáveis de um programa que contém laços não-lineares, ou seja, programas que exibem relações polinomiais multivariadas e manipulações fracionarias. Além disso, a maioria dos sistemas de segurança críticos, tais como aviões, automóveis, produtos químicos, usinas de energia e sistemas biológicos, operam semanticamente como sistemas híbridos não-lineares. Nesse trabalho, apresentamos poderosos métodos computacionais que são capazes de gerar bases de ideais polinomiais de invariantes não-lineares para sistemas híbridos não-lineares. Em segundo lugar, apresentamos métodos pioneiros de verificação que automaticamente gerem bases de invariantes expressas por séries de potências multi-variáveis e por funções transcendentais. Discutimos, também, a sua convergência em sistemas híbridos que exibem modelos não lineares. Verificamos que as séries de potência geradas para invariantes são, muitas vezes, compostas pela expansão de algumas funções transcendentais bem conhecidas, tais como "log" e "exp". Assim, apresentam uma forma analisável fechada que facilita o uso de invariantes na verificação de propriedades de segurança. Para cada problema de geração de invariantes estabelecemos condições suficientes, muito gerais, que garantem a existência e permitem o cálculo dos ideais polinomiais para situações que não podem ser tratadas pelas abordagens de geração invariantes hoje conhecidas. Finalmente, estendemos o domínio de aplicações, acessíveis através de métodos de geração de invariantes, para a área de segurança. Mais precisamente, fornecemos uma plataforma extensível baseada em invariantes pré-computadas que seriam usadas como assinaturas semânticas para análise de intrusos ("malwares") e deteção dos ataques de intrusões mais virulentos. Seguindo a concepção de tais plataformas, propomos sistemas de detecção de intrusão, usando modelos gerados automaticamente, onde as chamadas de sistema e de funções são vigiados pela avaliação de invariantes, pré-calculadas para denunciar qualquer desvio observado durante a execução da aplicação. De modo abrangente, nesta tese, propomos a redução de problemas de geração de invariantes para problemas algébricos lineares. Ao reduzir os problemas de geração de invariante não-triviais de sistemas híbridos não-lineares para problemas algébricos lineares relacionados, somos capazes de ultrapassar as deficiências dos mais modernos métodos de geração de invariante hoje conhecidos permitindo, assim, a geração automática e eficiente de invariantes para programas e sistemas híbridos não lineares complexos. Tais métodos algébricos lineares apresentam complexidades computacionais significativamente inferiores àquelas exigidas pelos os fundamentos matemáticos das abordagens usadas hoje, tais como a computação de bases de Gröbner, a eliminação de quantificadores e decomposições cilíndricas algébricas
Abstract: It is well-known that the automation and effectiveness of formal software verification of embedded or hybrid systems depends to the ease with which precise invariants can be automatically generated from source specifications. An invariant is a property that holds true at a specific location in the specification code, whenever an execution reaches that location. Despite tremendous progress over the years, the problem of invariant generation remains very challenging for both non-linear discrete programs, as well as for non-linear hybrid systems. In this thesis, we first present new computational methods that can automate the discovery and can strengthen interrelationships among the variables of a program that contains non-linear loops, that is, programs that display multivariate polynomial and fractional manipulations. Moreover, most of safety-critical systems such as aircraft, cars, chemicals, power plants and biological systems operate semantically as non-linear hybrid systems. In this work, we demonstrate powerful computational methods that can generate basis for non-linear invariant ideals of non-linear hybrid systems. Secondly, we present the first verification methods that automatically generate basis for invariants expressed by multivariate formal power series and transcendental functions. We also discuss their convergence over hybrid systems that exhibit non linear models. The formal power series invariants generated are often composed by the expansion of some well-known transcendental functions e.g. log and exp. They also have an analysable closed-form which facilitates the use of the invariants when verifying safety properties. For each invariant generation problem, we establish very general sufficient conditions that guarantee the existence and allow for the computation of invariant ideals for situations that can not be treated in the presently known invariant generation approaches. Finally, we extend the domain of applications for invariant generation methods to encompass security problems. More precisely, we provide an extensible invariant-based platform for malware analysis and show how we can detect the most virulent intrusions attacks using these invariants. We propose to automatically generate invariants directly from the specified malware code in order to use them as semantic aware signatures, i.e. malware invariant, that would remain unchanged by most obfuscated techniques. Folix lowing the design of such platforms, we propose host-based intrusion detection systems, using automatically generated models where system calls are guarded by pre-computed invariants in order to report any deviation observed during the execution of the application. In a broad sense, in this thesis, we propose to reduce the verification problem of invariant generation to algebraic problems. By reducing the problems of non-trivial nonlinear invariant generation for programs and hybrid systems to related linear algebraic problems we are able to address various deficiencies of other state-of-the-art invariant generation methods, including the efficient treatment of complicated non-linear loop programs and non-linear hybrid systems. Such linear algebraic methods have much lower computational complexities than the mathematical foundations of previous approaches know today, which use techniques such as as Gröbner basis computation, quantifier elimination and cylindrical algebraic decomposition
Doutorado
Ciência da Computação
Doutor em Ciência da Computação
Sahli, Nabil. "Contribution au problème de la sécurité sémantique des systèmes : approche basée sur l'ingénierie dirigée par les modèles." Electronic Thesis or Diss., Aix-Marseille, 2019. http://www.theses.fr/2019AIXM0699.
Full textCritical, modern, current, and even future industrial infrastructures will be equipped with several intelligent embedded equipment. They exploit complex, embedded, intelligent and semantic systems for their operations, locally and remotely, in a context of development, smart cities and the web of things. They are using more and more SCADA and DCS control systems to monitor critical industrial platforms in real time. Critical infrastructures will be more and more communicating in the framework of the exchanges of allarmes and the establishment of Euro-Mediterranean markets of the életcricité and also more and more vulnerable, to classic and even semantic attacks, to viruses, to Trojan horses. The cybernetics of critical platforms is growing, day by day, mainly with the use of complex embedded intelligent semantic systems, web services, ontologies, and format files (XML, OWL, RDF, etc.). They are all embedded in intelligent instruments, making up semantic SCADA systems. Intelligent telecommunication networks, wired and wireless, called hybrids, are developing. They represent a great challenge for the security of future communicating systems. In a context of development of the web of things and smart cities, our research aims to strengthen the bases of security and semantic cybernetics, for communicating systems. In our global solution for semantic security, critical infrastructures, we have proposed several sub-solutions, such as metamodels and models, as well as an end-to-end security strategy, with operation on a global cloud network, hybrid and secure
Šťastný, Jan. "Řízení projektů v cloudu." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-193783.
Full textRiberg, Joakim, and Johan Selin. "Det moderna kriget och de hybrida hoten : Ett problem för Sveriges nationella säkerhetsstrategi?" Thesis, Högskolan i Halmstad, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-39726.
Full textIn 2014 Russia, in front of the rest of the world, claimed and performed an annexing of Crimea. The larger parts of the western world were left in shock. Without any acknowledgment Russia moved forward with “little green men” and implied a different tactic. It was not officially war and nor peace, the fighting and the action took place in what was popularly named as the gray zone. This thesis is answering the following questions by using a qualitative document examination. From a strategic security perspective: How can the problem regarding hybrid threats in the gray zone be described and how does the national Swedish strategy respond to these threats? By reading and concluding existing theory about hybrid threats within the gray zone the authors have created their own model of analysis to utilize on the Swedish National Security Strategy. The model of analysis consists of the five main hybrid threats chosen from the theory presented by Treverton: Disinformation, Cyber-attacks, Economic pressure, Irregular armed forces and Regular forces.The thesis concludes that although unclear and found lacking in coherence regarding ends, ways and means; the National Security Strategy addresses and gives guidance on how to counter the effects of the above-mentioned threats. The Security Strategy also shows a consciousness regarding the complexity of the hybrid threats and the gray zone, without trying to define the actual area or methods utilized. When looked at through the model of analysis, it also highlights a possible new threat to be considered; environmental threats. The results of the analysis also indicate that it might be wise to use the term contemporary threats and the utilization of these, instead of arguing about definitions. The authors argue that it is of greater importance to create a larger understanding of the phenomena, in order to counter the actual effects by employing a truly comprehensive approach.