To see the other types of publications on this topic, follow the link: Method of "intelligent attack".

Dissertations / Theses on the topic 'Method of "intelligent attack"'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Method of "intelligent attack".'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Ratnayake, Deepthi N. "Probe request attack detection in wireless LANs using intelligent techniques." Thesis, London Metropolitan University, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.590106.

Full text
Abstract:
This work demonstrates a new intelligent approach to recognise probe request attacks in Wireless Local Area Networks (WLAN). In WLANs, management frames facilitate wireless stations (STA) to establish and maintain communications. In infrastructure WLANs, any mobile STA can send a probe request management frame when it needs information from an Access Point CAP). AP replies to any probe request from a STA with a known Medium Access Control (MAC) address, with a probe response management frame with capability information, and supported data rates. The next step is to establish its identity with
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Rongrong. "A Novel Attack Method Against Split Manufactured Circuits." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1573812230926837.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

O, Kit Hong. "Intelligent Web pre-fetching method." Thesis, University of Macau, 1999. http://umaclib3.umac.mo/record=b1636985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Prathapani, Anoosha. "Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1289939348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shaon, Mohammad. "A computationally intelligent approach to the detection of wormhole attacks in wireless sensor networks." World Comp,14th International Conference on Wireless Networks, 2015, 2015. http://hdl.handle.net/1993/31981.

Full text
Abstract:
This thesis proposes an innovative wormhole detection scheme to detect wormhole attacks using computational intelligence and an artificial neural network (ANN). The aim of the proposed research is to develop a detection scheme that can detect wormhole attacks (In-band, out of band, hidden wormhole attack, active wormhole attack) in both uniformly and non-uniformly distributed sensor networks. Furthermore, the proposed research does not require any special hardware and causes no significant network overhead throughout the network. Most importantly, the probable location of the wormhole nodes ca
APA, Harvard, Vancouver, ISO, and other styles
6

Josyula, Sai Prashanth. "On the Applicability of a Cache Side-Channel Attack on ECDSA Signatures : The Flush+Reload attack on the point multiplication in ECDSA signature generation process." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-10820.

Full text
Abstract:
Context. Digital counterparts of handwritten signatures are known as Digital Signatures. The Elliptic Curve Digital Signature Algorithm (ECDSA) is an Elliptic Curve Cryptography (ECC) primitive, which is used for generating and verifying digital signatures. The attacks that target an implementation of a cryptosystem are known as side-channel attacks. The Flush+Reload attack is a cache side-channel attack that relies on cache hits/misses to recover secret information from the target program execution. In elliptic curve cryptosystems, side-channel attacks are particularly targeted towards the po
APA, Harvard, Vancouver, ISO, and other styles
7

Harayama, Tomohiro. "A method of Weil sum in multivariate quadratic cryptosystem." Texas A&M University, 2003. http://hdl.handle.net/1969.1/5938.

Full text
Abstract:
A new cryptanalytic application is proposed for a number theoretic tool Weil sum to the birthday attack against multivariate quadratic trapdoor function. This new customization of the birthday attack is developed by evaluating the explicit Weil sum of the underlying univariate polynomial and the exact number of solutions of the associated bivariate equation. I designed and implemented new algorithms for computing Weil sum values so that I could explicitly identify some class of weak Dembowski- Ostrom polynomials and the equivalent forms in the multivariate quadratic trapdoor function. This cus
APA, Harvard, Vancouver, ISO, and other styles
8

Mella, Luca. "Ict security: Testing methodology for targeted attack defence tools." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6963/.

Full text
Abstract:
La tesi di laurea presentata si inserisce nell’ampio contesto della Sicurezza Informatica, in particolare tratta il problema del testing dei sistemi di sicurezza concepiti per contrapporsi alle odierne minacce: gli attacchi mirati (Targeted Attacks) ed in generale le minacce avanzate persistenti (Advanced Persistent Threats). Il principale obiettivo del lavoro svolto è lo sviluppo e la discussione di una metodologia di test per sistemi di sicurezza focalizzati su questo genere di problemi. Le linee guida proposte hanno lo scopo di aiutare a colmare il divario tra quello che viene testato e qu
APA, Harvard, Vancouver, ISO, and other styles
9

Mondoloni, Stéphane Lucien. "A numerical method for modelling wings with sharp edges maneuvering at high angles of attack." Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/49922.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Chongyang, and 刘重阳. "A distinct region based method for visual object tracking." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46587111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Tam, Kin Seng. "Intelligent power factor controller with new measuring method and fuzzy logic control." Thesis, University of Macau, 1998. http://umaclib3.umac.mo/record=b1447758.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Guo, Ran. "Intelligent method for collecting vital signals in versatile distributed e-home healthcare." Thesis, University of Macau, 2017. http://umaclib3.umac.mo/record=b3691807.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

BUFFAGNI, ALESSIA. "Intelligent clothing for the ageing body : The pursuit of a design method." Doctoral thesis, Università IUAV di Venezia, 2021. http://hdl.handle.net/11578/306340.

Full text
Abstract:
The extension of life that medical science and technology have assured mankind in the last century is an unprecedented achievement, a success of delicate administration for social policies worldwide. Life expectancy is increasing, and so is the demand for long-term health care. Starting from the original principle of bio-extension (temporal, anatomical, qualitative), the research introduces in its first part (also through field observation) an overview of the natural and pathological disorders of ageing and the social strategies to cope with them. Thus, it proceeds to examine the technological
APA, Harvard, Vancouver, ISO, and other styles
14

Li, Yongchang. "An Intelligent, Knowledge-based Multiple Criteria Decision Making Advisor for Systems Design." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/14559.

Full text
Abstract:
Aerospace systems are complex systems with interacting disciplines and technologies. As a result, the Decision Makers (DMs) dealing with such problems are involved in balancing the multiple, potentially conflicting attributes/criteria, transforming a large amount of customer supplied guidelines into a solidly defined set of requirement definitions. A variety of existing decision making methods are available to deal with this type of decision problems. The selection of a most appropriate decision making method is of particular importance since inappropriate decision methods are likely causes of
APA, Harvard, Vancouver, ISO, and other styles
15

Honeker, Kenneth S. "An analysis of using intelligent digital data to reduce the spare and repair parts inventory for the New Attack Submarine (NSSN)." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA341330.

Full text
Abstract:
Thesis (M.S. in Management) Naval Postgraduate School, September 1997.<br>"September 1997." Thesis advisor(s): Kenneth J. Euske, Alan W. McMasters. Includes bibliographical references (p. 139-152). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
16

Bakhsh, Kelarestaghi Kaveh. "A Risk Based Approach to Intelligent Transportation Systems Security." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/91421.

Full text
Abstract:
Security threats to cyber-physical systems are targeting institutions and infrastructure around the world, and the frequency and severity of attacks are on the rise. Healthcare manufacturing, financial services, education, government, and transportation are among the industries that are the most lucrative targets for adversaries. Hacking is not just about companies, organizations, or banks; it also includes critical infrastructure. Wireless Sensors Networks, Vehicle-to-everything communication (V2X), Dynamic Message Signs (DMS), and Traffic Signal Controllers are among major Intelligent Transp
APA, Harvard, Vancouver, ISO, and other styles
17

Purchase, Helen Christine. "The use of an educational computer system embodying a schematic method of knowledge representation." Thesis, University of Cambridge, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Alani, Shayma. "Design of intelligent ensembled classifiers combination methods." Thesis, Brunel University, 2015. http://bura.brunel.ac.uk/handle/2438/12793.

Full text
Abstract:
Classifier ensembling research has been one of the most active areas of machine learning for a long period of time. The main aim of generating combined classifier ensembles is to improve the prediction accuracy in comparison to using an individual classifier. A combined classifiers ensemble can improve the prediction results by compensating for the individual classifier weaknesses in certain areas and benefiting from better accuracy of the other ensembles in the same area. In this thesis, different algorithms are proposed for designing classifier ensemble combiners. The existing methods such a
APA, Harvard, Vancouver, ISO, and other styles
19

Mangan, S. J. "Development of an intelligent road gradient estimation method using vehicle CAN bus data." Thesis, University of Liverpool, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.406640.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

SARDINHA, JOSE ALBERTO RODRIGUES PEREIRA. "MAS-SCHOOL E ASYNC: A METHOD AND A FRAMEWORK FOR BUILDING INTELLIGENT AGENTS." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=6681@1.

Full text
Abstract:
CONSELHO NACIONAL DE DESENVOLVIMENTO CIENTÍFICO E TECNOLÓGICO<br>Agentes de Software é uma tecnologia que permite criar simuladores e sistemas inteligentes que tomam decisões automaticamente. A primeira contribuição dessa tese é o MAS-School, um método para modelar e implementar agentes de software inteligentes desde as primeiras fases de desenvolvimento. Esse método também apresenta várias orientações de como incluir aprendizado na fase de design e implementação. O método apresenta no final uma estratégia incremental de desenvolvimento para permitir a avaliação do desempenho das técn
APA, Harvard, Vancouver, ISO, and other styles
21

El, Hachem Jamal. "A Model Driven Method to Design and Analyze Secure System-of-Systems Architectures : Application to Predict Cascading Attacks in Smart Buildings." Thesis, Pau, 2017. http://www.theses.fr/2017PAUU3026/document.

Full text
Abstract:
Le Système-de-Systèmes (SdS) devient l'un des principaux paradigmes pour l'ingénieriedes solutions de la prochaine génération, telles que les villes intelligentes, les bâtiments intelligents,les systèmes médicaux, les systèmes d'interventions d'urgence et les systèmes de défense. Parconséquent, l'intérêt apporté aux SdS, leur architecture et surtout leur sécurité est en croissancecontinue. Cependant, les caractéristiques de différenciation des SdS, telles que le comportementémergent et l'indépendance managériale et opérationnelle de ses constituants, peuvent introduiredes problèmes spécifiques
APA, Harvard, Vancouver, ISO, and other styles
22

Huss, Joar. "Optimizing the slag system for phosphorus removal in a DRI-based EAF-process using the dictionary attack method." Thesis, KTH, Materialvetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-229743.

Full text
Abstract:
Abstract Carbon emissions pose a serious threat to the continued survival of this planet. All sectors of society must, therefore, lower their emissions, this includes the steel industry. The production of steel is based on iron ore reduction by carbon. In an attempt to relieve the steel industry from its inherent fossil dependence an initiative called HYBRIT has been started. It aims to supplant carbon reduction with hydrogen reduction. Currently, there is no economically viable industrial production of steel that uses fossil-free hydrogen as reduction agent. In order to create economic viabil
APA, Harvard, Vancouver, ISO, and other styles
23

Chong, Samuel Y. C. "DEON : a semiotic method for the design of agent-based e-commerce systems." Thesis, Staffordshire University, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.390946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Cho, Gunhyung. "Hybrid Nested Partition method with intelligent greedy search for solving Weapon Target Assignment problem." [Ames, Iowa : Iowa State University], 2009. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1468072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Davis, Stefan J., William R. Wise, A. D. Covington, J. Petter, and P. Reip. "Development of a Novel Method to Reduce the Impact of Cutaneous chemical attacks - 159." Verein für Gerberei-Chemie und -Technik e. V, 2019. https://slub.qucosa.de/id/qucosa%3A34332.

Full text
Abstract:
Content: Acid attacks are a global problem: from 2011 to 2016 there were 1,464 incidents involving a corrosive substance in London alone. The most common chemicals used in these attacks are sulfuric, nitric and hydrochloric acids. Concentrated solutions of strongly alkaline substances including sodium hydroxide and sodium hypochlorite are also used. Current first-aid advice suggests diluting the exposed area with water and transfer to a hospital for further treatment. An immediate neutralisation treatment is avoided as incorrect identification of the corrosive could worsen the damage. In addi
APA, Harvard, Vancouver, ISO, and other styles
26

Nguyen-Minh, Huong. "Contribution to the Intelligent Transportation System : security of Safety Applications in Vehicle Ad hoc Networks." Thesis, Avignon, 2016. http://www.theses.fr/2016AVIG0212/document.

Full text
Abstract:
Le développement du transport partout dans le monde a fourni un grand nombre d'avantages pour de nombreux aspects de la vie humaine. Les systèmes de transport intelligents (ITS) sont des applications avancées qui visent à rendre les réseaux de transport plus sûrs, plus pratiques et plus intelligents. Selon leurs usages, ils peuvent être classés en deux types d'applications ITS, qui sont des applications de sûreté et des applications non-sûreté. Le réseau de véhicules ad hoc (VANET) est un élément clé des systèmes ITS, car il permet la communication entre les unités de transport. Ces communicat
APA, Harvard, Vancouver, ISO, and other styles
27

Piepmeier, Jenelle Armstrong. "A dynamic quasi-newton method for model independent visual servoing." Diss., Georgia Institute of Technology, 1999. http://hdl.handle.net/1853/18391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Teng, Po-Ching, and 鄧博慶. "Attack analysis of intelligent control system." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/45053143426516874277.

Full text
Abstract:
碩士<br>中國文化大學<br>機械工程學系數位機電碩士班<br>99<br>According to the advances in wireless sensor networks, making between objects and objects connected to each other through the Internet (Internet of Things, IOT). It extensive uses in positioning and environmental monitoring. The purpose of this study is a network using a small number of cameras and sensors combined with wireless monitor and control system (MCS), and supplemented by artificial intelligence technology. It uses fuzzy control systems improve the positioning accuracy. Through the PSoC embedded system, we link and use sensor chip detect the tem
APA, Harvard, Vancouver, ISO, and other styles
29

Chen, Yu-Hung, and 陳昱宏. "Intelligent Hybrid Learning Architecture for Cyber-Phishing Attack." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/6w29rj.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>電機工程系<br>106<br>People have become increasingly dependent on information technology since the emergence of the Internet. Consequently, hackers engage in financial crimes and computer attacks through the Internet. Nowadays, cyber-attacks may involve Trojans, botnets, social engineering, spam, and other means. Phishing websites normally have short lifetime, and involve a more complex form of attack. They have therefore attracted increasing attention in the area of information security. The prevention of phishing has various elements. In recent years, related research has focuse
APA, Harvard, Vancouver, ISO, and other styles
30

Lin, Chung-Yin, and 林崇頤. "Intelligent Attack Graph Generator Adapting to Large Vulnerability Information." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/4n7f8w.

Full text
Abstract:
碩士<br>中原大學<br>資訊工程研究所<br>91<br>Vulnerability analysis is important to ensure the security of a network environment. Critical services in a network environment with vulnerabilities are vulnerable if there are attack paths leading to the services. Many tools based on graph theory have been proposed to discover the possible attack paths through which an attacker may exploit to reach his final goal. Although automated tools to find all possible attack paths are available, they require manual effort and expert knowledge to describe the one-step attack templates before computerized model checking pr
APA, Harvard, Vancouver, ISO, and other styles
31

Shih, Hsiao-Yu, and 施筱瑜. "A Generic Web Application Attack Generation Method." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/kcr3f7.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊科學與工程研究所<br>105<br>With the thriving of The Internet of Everything (IoE) and diversified online services, there is an increasing demand for web applications. However, most web applications have critical bugs affecting their security. The exposure of software vulnerabilities always causes damage to not only the web programmers but also the users. It is not easy for the programmers to figure out the potential vulnerabilities in their applications before release. They often notice the hidden defect by the feedback from users or the risk exposure from third parties. In this paper
APA, Harvard, Vancouver, ISO, and other styles
32

Su, Cheng-Yu, and 蘇正育. "DDoS Attack Detection Method Research on the Splunk." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/57930675069976481509.

Full text
Abstract:
碩士<br>國立臺南大學<br>經營與管理學系科技管理碩士在職專班<br>104<br>The whole society has a great progress with the rapid development of network technology, at mean time, the issues of attendant network security has become increasingly prominent, especially for DDoS attacks. Recently, almost all of the well-known network attacks are related to DDoS attacks, which leads to their great loss. Therefore, how to detect DDoS attacks sustainably becomes the urgent problem in the field of network security. The network would be congested when the amount of user visit exceeds a certain number because of the network bandwidth o
APA, Harvard, Vancouver, ISO, and other styles
33

Huang, hsingwen, and 黃幸雯. "A Study of Method to avoid DoS Attack." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/77081947637667880077.

Full text
Abstract:
碩士<br>正修科技大學<br>經營管理研究所<br>99<br>Along with the population growth of the aged, the Taiwan’s aged education market become prominent gradually. This research draws out 3 aged education institution providers and some consumers as the subject of the exploratory study. With the research and interview data gathered, we then conclude that whether the big Kaohsiung area becomes the fitter area among all area of Taiwan, and the feasibility test will be further applied on the aged education analysis through semi-structured survey conducted by in-depth interview method.
APA, Harvard, Vancouver, ISO, and other styles
34

Yen, Chia-Yung, and 嚴家勇. "A Study of Method to avoid DoS Attack." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/58095931822897192880.

Full text
Abstract:
碩士<br>正修科技大學<br>資訊管理研究所<br>99<br>With computers a commonplace, internet becomes the most important part of human activities. Nowadays trade, commerce and other business activities have to rely on the internet; however, those with evil intentions launch attacks via the internet. Since equipment of information security is quite expensive, and incidents of DDos attacks are frequent, the research study proposes a method to avoid DDos. The proposed method intends to enable defenders to use fewer and more limited resources to defend themselves, and to relieve the burden on network managers or author
APA, Harvard, Vancouver, ISO, and other styles
35

Wang, Yi-Ta, and 王藝達. "The Research on the Development of an Intelligent Vulnerability Attack Prevention Mechanism." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/01663651757623926103.

Full text
Abstract:
碩士<br>中國文化大學<br>資訊管理研究所<br>96<br>Vulnerability attacks have been a major issue on network information security for some time. Hackers invade computers on the network by their active vulnerabilities in order to damage these systems or to steal sensitive information on the systems. The intrusion prevention mechanisms are focused on system security repair, intrusion detection and intrusion prevention today. This research proposes an intelligent vulnerability attack prevention mechanism to improve the defense efficiency of the Information Monitor Center by blocking malicious packets and isolating
APA, Harvard, Vancouver, ISO, and other styles
36

Yu, Sheng-Han, and 余昇瀚. "A Fast Attack Paths Reconstruction Method using SD-FEMM." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/52601665835129245480.

Full text
Abstract:
碩士<br>樹德科技大學<br>資訊工程系碩士班<br>100<br>With the development of computer technology, IT-related devices, such as desktop computers, laptops, and even smart mobile phones etc., are becoming more and more popular with people all over the world. However, for lack of basic computer security knowledge, most people easily get malwares on their computer. Among some common Internet attacks, Distributed Denial of Service (DDoS) attack is still hard to defend. It purposely consumes a large poison of computing and network resources using weaknesses in network protocols or system exploits in order to prevent
APA, Harvard, Vancouver, ISO, and other styles
37

Chen, Kuei-Ming, and 陳癸名. "Timetabling Research Via Artificial Intelligent Method." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/65517017570586464578.

Full text
Abstract:
碩士<br>國立臺北教育大學<br>資訊科學系碩士班<br>101<br>School timetable has been a quite inconvenient issue, with widespread terms to be considered, and the curriculum arrangement results are affected by each and every one of above variables. Curriculum arrangement has been so to say a NP-hard problem of Non-Polynomial. Therefore, no perfect solution presented all along. Finding a better curriculum arrangement strategy , and computer system can be applied to process massive basic data, then curriculum arrangement issue can be improved, are the direction for this thesis to strive for. In this thesis , the pr
APA, Harvard, Vancouver, ISO, and other styles
38

Chen, Xin-chang, and 陳信菖. "Study of Intelligent Routing Method for Advanced Vehicles inSafety Intelligent Transportation System." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/9jpue9.

Full text
Abstract:
碩士<br>國立中央大學<br>通訊工程研究所<br>96<br>Safety and comfort applications have been two popular research topics in ITS recently. In this paper, we propose a vehicle-based intelligent routing method to integrate safety and comfort services in Vehicle Route Guidance Systems (VRGS). By detection, communication and control technologies, it can reach a complete vehicle route in safe and efficient way, and we discuss advanced in hidden conflict path problem that some of centralize routing method might be meet. . A heuristic algorithm for multiple vehicles routing problem called intelligent routing method is
APA, Harvard, Vancouver, ISO, and other styles
39

Huang, Tun-ling, and 黃敦麟. "Design and Implementation of an Intelligent SIP User Agent to Avoid “Invite/Bye” Attack." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/4bvp2q.

Full text
Abstract:
碩士<br>國立中山大學<br>資訊工程學系研究所<br>96<br>As Voice-over-IP (VoIP) technology developed, VoIP services alternate the traditional PSTN gradually with their advantage of low rates. Instead of using the public switched telephone network, VoIP services exchange voice information over Internet. As the result, VoIP services have to suffer from the weaknesses of the IP network infrastructure and VoIP devices are easier to be attacked than traditional phones. In our research, we analyze authentication mechanisms of Session Initiation Protocol, and address the weakness of current authentication mechanisms and
APA, Harvard, Vancouver, ISO, and other styles
40

Lee, Chien-Shyong, and 李劍雄. "An Intelligent Retrieval Method for Software Components." Thesis, 1993. http://ndltd.ncl.edu.tw/handle/73915615996786349088.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Peng, Sheng-Pao, and 彭勝寶. "Extended Attack Tree Analysis Method to Assess the Website Security Risks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/18698861701866533315.

Full text
Abstract:
碩士<br>東吳大學<br>資訊管理學系<br>99<br>According to the fast development of network technology and the popularization of extensive web applications, web information system faces various kinds of attacks, such as Trojan virus threats, DDoS (Distributed Denial-Of-Service) attacks, system and application’s vulnerability attacks, etc. The target of these attacks is for destroying websites or stealing sensitiveness data. Due to the diversification and multiformity of attacks, how to set up a safe web system becomes our common goal. Furthermore, a variety of risk assessments for current systems cannot effect
APA, Harvard, Vancouver, ISO, and other styles
42

Zong-HanYu and 余宗翰. "False Data Injection Attack Using PCA Approximation Method in Smart Grid." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/27281861886127354515.

Full text
Abstract:
碩士<br>國立成功大學<br>工程科學系碩博士班<br>101<br>In smart grid, the security problems become more and more important owing to the vulnerability of two-way communication. Among them, the false data injection attack (FDIA) is the most common issue. Some people try to tackle these problems from protectors’ perspective, while others stand on the opposite side. Recently, advanced FDIA algorithms were proposed without needing the prior knowledge of the power system. But they still have some restrictions. For example, the states of power system need to be non-Gaussian distributed. This restriction limits advance
APA, Harvard, Vancouver, ISO, and other styles
43

Chang, Jr-Ming, and 張志銘. "Applying the Intelligent monitoring method for Aircraft Engine." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/10626844808258553329.

Full text
Abstract:
碩士<br>建國科技大學<br>機電光系統研究所<br>95<br>This research presents the utilization of an Artificial Neural Network (ANN) in stead of the traditional gaspath analysis method to develop a fault diagnosis system for engine. The training data for the Artificial Neural Network is coming from the real engine fault data collected in the field. This paper is using the fault example of three engines, utilizing gradient decent algorithm、momentum term algorithm and Levenberg-Marquardt algorithm to diagnose the 4-input fault and 6-input fault respectively. The result indicates that Levenberg-Marquardt algorithm can
APA, Harvard, Vancouver, ISO, and other styles
44

Su, Chien-Hsing, and 蘇建興. "Performance Improvement for Nonlinear Systems Using Intelligent Method." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/y5wh3p.

Full text
Abstract:
博士<br>國立臺灣科技大學<br>電子工程系<br>94<br>This dissertation centers on the issue of representing nonlinear systems precisely as Takagi-Sugeno (T-S) fuzzy models and making use of intelligent method, so that various control objectives can be achieved. Meanwhile, system stability, exponential convergence property, improvement of transient response, and robustness are all taken into consideration. First, a method is given to systematically represent a nonlinear system exactly as a T-S fuzzy model. By the method, not only few fuzzy rules are enough to represent the nonlinear system precisely. Besides, the
APA, Harvard, Vancouver, ISO, and other styles
45

Ye, Hao-Jie, and 葉皓傑. "A hierarchical reinforcement learning method to intelligent systems." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/38860968209411504214.

Full text
Abstract:
碩士<br>國立成功大學<br>航空太空工程學系碩博士班<br>94<br>Because of the progression of electrical and information engineering, a lot of changes occur in traditional mechanical systems. After the integration of electrical and mechanical systems, mechatronics systems come into existence. Comparing with traditional mechanical systems, mechatronics systems can use more information but the analysis and design of mechatronics systems is more difficult. By these changes, there are more and more challenges to control engineering. Control systems must have the ability of logic judgement and decision-making gradually. Thi
APA, Harvard, Vancouver, ISO, and other styles
46

Chou, Chih-Feng, and 周志峰. "An Intelligent Method for Solving Data Clustering Problems." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/09971856286517914293.

Full text
Abstract:
碩士<br>國立屏東科技大學<br>資訊管理系<br>92<br>The technique of data mining enables users to discover useful information from massive data to perform efficient decision analysis. Data mining usually includes the following functions: classification, estimation, prediction, market basket analysis, description, and clustering. This thesis focuses on technique improvement in data clustering. In data clustering analysis, K-Means algorithm has defect of local search so that it reduces the efficiency of clustering; but genetic algorithm (GA) can find out the best solution through global search after
APA, Harvard, Vancouver, ISO, and other styles
47

Tseng, Yung-Chu, and 曾詠筑. "An Intelligent Context-Aware Chinese Phonetic Input Method." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/49193466189580170762.

Full text
Abstract:
碩士<br>元智大學<br>資訊工程學系<br>98<br>Phonetic input method is the most important Chinese user input methods. Although the zhuyin input method has a long history of development, it often makes mistakes. The word select causes error, because the program selects the word frequency statistics are most likely to lack of words. But words are not related to this article (context-aware) knowledge. This study proposes a new intelligent situational input method.We take advantage of this situation before and after the text-related terms. The construction of our new &apos;&apos; index &apos;&apos;,which is assoc
APA, Harvard, Vancouver, ISO, and other styles
48

Naik, Sobhini. "Comparative study of PID controller Tuning method." Thesis, 2017. http://ethesis.nitrkl.ac.in/8844/1/2017_MT_SNaik.pdf.

Full text
Abstract:
the present work, evaluation of performance of different tuning method of PID controller is being carried out. It has become essential to carry out tuning of various parameters associated with PID controller because of the vast application of controllers in the industrial field. In the present work, various conventional tuning methods such as Cohen-Coon, Ziegler-Nichols and Chien-Hrones-Reswick as well as optimum tuning methods are considered. Feedback control method is utilized to evaluate the performance of mentioned tuning methods which in tune controls the oven system temperature. Here, co
APA, Harvard, Vancouver, ISO, and other styles
49

Chung, Ming-Shen, and 鍾明伸. "An Efficient and Secure RFID Security Method against Denial-of-Service Attack." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/79215184017726368388.

Full text
Abstract:
碩士<br>大同大學<br>通訊工程研究所<br>99<br>Radio Frequency Identification (RFID) is a wireless automatic identification technology supporting ubiquitous communication. In 2008, Yoon et al. revised Osaka et al.’s RFID security method to achieve the following security requirements such as (1) Indistinguishability, (2) Forward Security, (3) Replay Attack, (4) Tag Killing, (5) Ownership Transfer, and (6) Denial of Service (DoS) attack. Unlike their claims, we find that Yoon et al.’s RFID security method still does not achieve the requirement of indistinguishability and is insecure to the Denial of Service (Do
APA, Harvard, Vancouver, ISO, and other styles
50

Ping, Chen-Chieh, and 平震傑. "Adaptive filtering method for DDoS attack based on Reinforcement Learning and Autoencoder." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/8wyg38.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊科學與工程研究所<br>108<br>Distributed denials of service (DDoS) attacks are one of the most serious threats throughout several decades on the Internet. DDoS attack aims to obstruct the availability of a system. A common defense strategy is attack filtering, which is to discard packets and keep the victim server functional. However, the filtering methods currently proposed discard most of the legitimate packets against some DDoS attacks. It, on the contrary, helps the attacker to achieve his goal. Therefore, we propose an anomaly-based attack filtering mechanism, which is able to ada
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!