To see the other types of publications on this topic, follow the link: Network forensic framework analysis.

Dissertations / Theses on the topic 'Network forensic framework analysis'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Network forensic framework analysis.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Fairbanks, Kevin D. "Forensic framework for honeypot analysis." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33977.

Full text
Abstract:
The objective of this research is to evaluate and develop new forensic techniques for use in honeynet environments, in an effort to address areas where anti-forensic techniques defeat current forensic methods. The fields of Computer and Network Security have expanded with time to become inclusive of many complex ideas and algorithms. With ease, a student of these fields can fall into the thought pattern of preventive measures as the only major thrust of the topics. It is equally important to be able to determine the cause of a security breach. Thus, the field of Computer Forensics has grown. In this field, there exist toolkits and methods that are used to forensically analyze production and honeypot systems. To counter the toolkits, anti-forensic techniques have been developed. Honeypots and production systems have several intrinsic differences. These differences can be exploited to produce honeypot data sources that are not currently available from production systems. This research seeks to examine possible honeypot data sources and cultivate novel methods to combat anti-forensic techniques. In this document, three parts of a forensic framework are presented which were developed specifically for honeypot and honeynet environments. The first, TimeKeeper, is an inode preservation methodology which utilizes the Ext3 journal. This is followed with an examination of dentry logging which is primarily used to map inode numbers to filenames in Ext3. The final component presented is the initial research behind a toolkit for the examination of the recently deployed Ext4 file system. Each respective chapter includes the necessary background information and an examination of related work as well as the architecture, design, conceptual prototyping, and results from testing each major framework component.
APA, Harvard, Vancouver, ISO, and other styles
2

Pluskal, Jan. "Framework for Captured Network Communication Processing." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-413326.

Full text
Abstract:
Práce pojednává o možnostech získávání dat a jejich analýzy ze zachycené síťové komunikace. Jsou zhodnoceny možnosti aktuálně dostupných řešení jednotlivých nástrojů i celých prostředí pro síťovou forenzní analýzu. Provedením analýzy těchto nástrojů byly zjištěny nedostatky, pro které není možná integrace již hotových řešení pro záměry projektu SEC6NET, a dále byly stanoveny cíle, které navržené řešení musí splňovat. Na základě cílů a znalostí z předchozích prototypů řešení byla provedena dekompozice problému na jednotlivé funkčně související bloky, které byly implementovány jako nezávislé moduly schopny spolupráce. Správná funkcionalita je po každé změně v implementaci testována pomocí sad Unit testů, které pokrývají majoritní část kódu. Před zahájením samotného vývoje bylo nutné zhodnotit aktuální situaci v komerčních i open-source sférách řešení. Srovnání nástrojů používaných pro forenzní síťovou analýzu nám dalo jasnou představu, na kterou část trhu chce naše řešení směřovat a jaká funkčnost je v jednotlivých nástrojích nepříliš povedená. Následně byly stanoveny hlavní požadavky a směr, kterým by se měl vývoj ubírat. Na začátku vývoje rekonstrukčního frameworku stála fáze vytvoření návrhu architektury a dekompozice průběhu zpracování zachycené komunikace do ucelených částí jednotlivých modulů. Využití předchozích znalostí a zkušeností získaných vývojem rekonstrukčního nástroje Reconsuite nám pomohlo při formování fronty zpracování, kterou budou data při zpracování procházet. Následně byly navrženy základní komponenty provádějící práci se zachycenou komunikací v různých formátech PCAP souborů, rozdělení komunikace na konverzace, provedení defragmentace na úrovni IP a v případě komunikace TCP provedení reassemblingu daných toků. V rané části vývoje jsme se zaměřili na komunikaci zapouzdřenou v nízkoúrovňových protokolech Ethernet, IPv4/IPv6, TCP a UDP. Po definici rozhraní komponent bylo nutné provést další výzkum síťových protokolů a vytvoření algoritmů pro jejich zpracování ze zachycené komunikace, která se liší od standardní a není tedy možné ji zpracovávat dobře známými postupy z RFC či jader operačních systémů. Protože proces zpracování zachycených dat se na komunikaci přímo nepodílí, tak v případě, kdy dojde ke ztrátě či poškození při zachycení, nebo je komunikace směřována jinou cestou, atd., není možné data získat pomocí znovu zasílání, ale je nutné využít jiné mechanismy k označení či obnově takto chybějících dat - algoritmus provádějící IP defragmentaci a TCP reassembling. Po implementaci a otestování byl zjištěn problém se separací jednotlivých TCP toků (TCP sessions), který nebylo možné řešit původním návrhem. Po analýze tohoto problému byla změněna architektura procesní pipeline s výsledným zvýšením počtu rekonstruovaných dat v desítkách procent. V závěrečné fázi je popsána metodologie jakou bylo porvedeno testování výkonu implementovaného řešení a srovnání s již existujícími nástroji. Protože rekonstrukce aplikačních dat je příliš specifická záležitost, při srovnání výkonu byla měřena rychlost zpracování a potřebná paměť pouze při provádění separace toků, IPv4 defragmentace a TCP reassemblingu, tedy operace společné pro všechny rekonstrukční nástroje. Srovnání ukázalo, že Netfox.Framework předčí své konkurenty Wireshark i Network monitor v rychlosti zpracování, tak v úspoře paměti. Jako testovací data byl použit jak generovaný provoz, tak i vzorky reálné komunikace zachycené v laboratorním prostředí.
APA, Harvard, Vancouver, ISO, and other styles
3

Senthivel, Saranyan. "Automatic Forensic Analysis of PCCC Network Traffic Log." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2394.

Full text
Abstract:
Most SCADA devices have a few built-in self-defence mechanisms and tend to implicitly trust communications received over the network. Therefore, monitoring and forensic analysis of network traffic is a critical prerequisite for building an effective defense around SCADA units. In this thesis work, We provide a comprehensive forensic analysis of network traffic generated by the PCCC(Programmable Controller Communication Commands) protocol and present a prototype tool capable of extracting both updates to programmable logic and crucial configuration information. The results of our analysis shows that more than 30 files are transferred to/from the PLC when downloading/uplloading a ladder logic program using RSLogix programming software including configuration and data files. Interestingly, when RSLogix compiles a ladder-logic program, it does not create any lo-level representation of a ladder-logic file. However the low-level ladder logic is present and can be extracted from the network traffic log using our prototype tool. the tool extracts SMTP configuration from the network log and parses it to obtain email addresses, username and password. The network log contains password in plain text.
APA, Harvard, Vancouver, ISO, and other styles
4

van, den Berg Jelle, and Filip Lagerholm. "Forensic Analysis of the Nintendo Switch." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42451.

Full text
Abstract:
In this thesis, we did a forensic analysis of a Nintendo Switch gaming console. It is both a portable and a stationary device, which makes it so that it could contain valuable information about the usage of the console at home and elsewhere. Multiple methods of data extraction were used, including using an exploit to obtain storage memory, extracting the contents of the SD card and capturing network traffic. The findings from the analysis of these data sources were compared to the information on the user interface. Any information that could not be found on the user interface was reported. The main findings of memory analysis were a detailed log file of user interactions, JSON files with personal information such as email addresses, and crash logs with information about the state of the console during the crash. The SD card mainly contains screenshots with embedded timestamps, and the network capture does not contain any forensically relevant information. The combination of these different types of information could makethe Nintendo Switch a useful source of evidence during an investigation.
APA, Harvard, Vancouver, ISO, and other styles
5

Rajasekaran, Sathya Dev Squicciarini Anna C. Metzner John J. "Social network risk analysis and privacy framework." [University Park, Pa.] : Pennsylvania State University, 2009. http://etda.libraries.psu.edu/theses/approved/WorldWideIndex/ETD-4812/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Saltaformaggio, Brendan D. "Forensic Carving of Wireless Network Information from the Android Linux Kernel." ScholarWorks@UNO, 2012. http://scholarworks.uno.edu/honors_theses/20.

Full text
Abstract:
Modern smartphones integrate ubiquitous access to voice, data, and email communication and allow users to rapidly handle both personal and corporate business affairs. This is possible because of the smartphone’s constant connectivity with the Internet. Digital forensic investigators have long understood the value of smartphones as forensic evidence, and this thesis seeks to provide new tools to increase the amount of evidence that one can obtain and analyze from an Android smartphone. Specifically, by using proven data carving algorithms we try to uncover information about the phone’s connection to wireless access points in a capture of the device’s volatile memory.
APA, Harvard, Vancouver, ISO, and other styles
7

Akkaya, Deniz, and Fabien Thalgott. "Honeypots in network security." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600.

Full text
Abstract:

Day by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. However, while performingall these things, how many people know about security? Do they know the risk of beingattacked, infecting by malicious software? Even some of the malicious software arespreading over network to create more threats by users. How many users are aware of thattheir computer may be used as zombie computers to target other victim systems? Astechnology is growing rapidly, newer attacks are appearing. Security is a key point to getover all these problems. In this thesis, we will make a real life scenario, using honeypots.Honeypot is a well designed system that attracts hackers into it. By luring the hackerinto the system, it is possible to monitor the processes that are started and running on thesystem by hacker. In other words, honeypot is a trap machine which looks like a realsystem in order to attract the attacker. The aim of the honeypot is analyzing, understanding,watching and tracking hacker’s behaviours in order to create more secure systems.Honeypot is great way to improve network security administrators’ knowledge and learnhow to get information from a victim system using forensic tools. Honeypot is also veryuseful for future threats to keep track of new technology attacks.

APA, Harvard, Vancouver, ISO, and other styles
8

Moe, Lwin P. "Cyber security risk analysis framework : network traffic anomaly detection." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118536.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2018.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 84-86).
Cybersecurity is a growing research area with direct commercial impact to organizations and companies in every industry. With all other technological advancements in the Internet of Things (IoT), mobile devices, cloud computing, 5G network, and artificial intelligence, the need for cybersecurity is more critical than ever before. These technologies drive the need for tighter cybersecurity implementations, while at the same time act as enablers to provide more advanced security solutions. This paper will discuss a framework that can predict cybersecurity risk by identifying normal network behavior and detect network traffic anomalies. Our research focuses on the analysis of the historical network traffic data to identify network usage trends and security vulnerabilities. Specifically, this thesis will focus on multiple components of the data analytics platform. It explores the big data platform architecture, and data ingestion, analysis, and engineering processes. The experiments were conducted utilizing various time series algorithms (Seasonal ETS, Seasonal ARIMA, TBATS, Double-Seasonal Holt-Winters, and Ensemble methods) and Long Short-Term Memory Recurrent Neural Network algorithm. Upon creating the baselines and forecasting network traffic trends, the anomaly detection algorithm was implemented using specific thresholds to detect network traffic trends that show significant variation from the baseline. Lastly, the network traffic data was analyzed and forecasted in various dimensions: total volume, source vs. destination volume, protocol, port, machine, geography, and network structure and pattern. The experiments were conducted with multiple approaches to get more insights into the network patterns and traffic trends to detect anomalies.
by Lwin P. Moe.
S.M. in Engineering and Management
APA, Harvard, Vancouver, ISO, and other styles
9

Mallek, Sabrine. "Social Network Analysis : Link prediction under the Belief Function Framework." Thesis, Artois, 2018. http://www.theses.fr/2018ARTO0204/document.

Full text
Abstract:
Les réseaux sociaux sont de très grands systèmes permettant de représenter les interactions sociales entre les individus. L'analyse des réseaux sociaux est une collection de méthodes spécialement conçues pour examiner les aspects relationnels des structures sociales. L'un des défis les plus importants dans l'analyse de réseaux sociaux est le problème de prédiction de liens. La prédiction de liens étudie l'existence potentielle de nouvelles associations parmi des entités sociales non connectées. La plupart des approches de prédiction de liens se concentrent sur une seule source d'information, c'est-à-dire sur les aspects topologiques du réseau (par exemple le voisinage des nœuds) en supposant que les données sociales sont entièrement fiables. Pourtant, ces données sont généralement bruitées, manquantes et sujettes à des erreurs d'observation causant des distorsions et des résultats probablement erronés. Ainsi, cette thèse propose de gérer le problème de prédiction de liens sous incertitude. D'abord, deux nouveaux modèles de graphes de réseaux sociaux uniplexes et multiplexes sont introduits pour traiter l'incertitude dans les données sociales. L'incertitude traitée apparaît au niveau des liens et est représentée et gérée à travers le cadre de la théorie des fonctions de croyance. Ensuite, nous présentons huit méthodes de prédiction de liens utilisant les fonctions de croyance fondées sur différentes sources d'information dans les réseaux sociaux uniplexes et multiplexes. Nos contributions s'appuient sur les informations disponibles sur le réseau social. Nous combinons des informations structurelles aux informations des cercles sociaux et aux attributs des nœuds, ainsi que l'apprentissage supervisé pour prédire les nouveaux liens. Des tests sont effectués pour valider la faisabilité et l'intérêt de nos approches à celles de la littérature. Les résultats obtenus sur les données du monde réel démontrent que nos propositions sont pertinentes et valables dans le contexte de prédiction de liens
Social networks are large structures that depict social linkage between millions of actors. Social network analysis came out as a tool to study and monitor the patterning of such structures. One of the most important challenges in social network analysis is the link prediction problem. Link prediction investigates the potential existence of new associations among unlinked social entities. Most link prediction approaches focus on a single source of information, i.e. network topology (e.g. node neighborhood) assuming social data to be fully trustworthy. Yet, such data are usually noisy, missing and prone to observation errors causing distortions and likely inaccurate results. Thus, this thesis proposes to handle the link prediction problem under uncertainty. First, two new graph-based models for uniplex and multiplex social networks are introduced to address uncertainty in social data. The handled uncertainty appears at the links level and is represented and managed through the belief function theory framework. Next, we present eight link prediction methods using belief functions based on different sources of information in uniplex and multiplex social networks. Our proposals build upon the available information in data about the social network. We combine structural information to social circles information and node attributes along with supervised learning to predict new links. Tests are performed to validate the feasibility and the interest of our link prediction approaches compared to the ones from literature. Obtained results on social data from real-world demonstrate that our proposals are relevant and valid in the link prediction context
APA, Harvard, Vancouver, ISO, and other styles
10

Padbidri, Jagan Mohan. "A network-cell based framework for multiscale analysis of granular materials." Pullman, Wash. : Washington State University, 2010. http://www.dissertations.wsu.edu/Dissertations/Spring2010/j_padbidri_041510.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Xu, Fang Yuan. "Smart grid framework analysis and artificial neutral network in load forecast." Thesis, City, University of London, 2011. http://openaccess.city.ac.uk/19752/.

Full text
Abstract:
Power system is the one of the most critical parts of the whole energy utilization around the world. Recently people pay more attention to the energy utilization, new types of generations, storages and power utilization need to increase energy efficiency and reduce carbon emission. Due to the power grid currently is still mainly under the old-designed approach, it is increasingly exposed limitation on efficiency enhancement, security and reliability improvement, new technologies compatibility and meeting larger power capacity requirements. Thus, Smart Grid is 'born' to improve power grid for these requirements. It is an overlapping area between power system and digital technology, intelligent technology, communication technology and so on. Smart Grid can provide updates for nearly all sections of traditional power grid. It is a systematic framework that new technologies integration, system development strategy and planning, customers' awareness improvements and supports from all relevant areas. The areas must be operated in coordination and parallel. Firstly, this thesis introduces Smart Grid and Smart Metering on its definition, characteristics and deployment. Secondly, this thesis describes a load forecasting system for macro-grid. Artificial Neural Network (ANN) was introduced to achieve this work for its excellent mapping approximation ability. In the third section, thesis focuses on load forecasting for micro-grid. BackPropagation method is used to train the Multi-layer Perceptron (MLP) ANN and its results were compared to that from Radial Basis Function (RBF) ANN. Analysis was focused not only on the two networks but also ANN generalization problems and differences between micro-grid load and macro-grid load prediction.
APA, Harvard, Vancouver, ISO, and other styles
12

El-Shehaly, Mai Hassan. "A Visualization Framework for SiLK Data exploration and Scan Detection." Thesis, Virginia Tech, 2009. http://hdl.handle.net/10919/34606.

Full text
Abstract:
Network packet traces, despite having a lot of noise, contain priceless information, especially for investigating security incidents or troubleshooting performance problems. However, given the gigabytes of flow crossing a typical medium sized enterprise network every day, spotting malicious activity and analyzing trends in network behavior becomes a tedious task. Further, computational mechanisms for analyzing such data usually take substantial time to reach interesting patterns and often mislead the analyst into reaching false positives, benign traffic being identified as malicious, or false negatives, where malicious activity goes undetected. Therefore, the appropriate representation of network traffic data to the human user has been an issue of concern recently. Much of the focus, however, has been on visualizing TCP traffic alone while adapting visualization techniques for the data fields that are relevant to this protocol's traffic, rather than on the multivariate nature of network security data in general, and the fact that forensic analysis, in order to be fast and effective, has to take into consideration different parameters for each protocol. In this thesis, we bring together two powerful tools from different areas of application: SiLK (System for Internet-Level Knowledge), for command-based network trace analysis; and ComVis, a generic information visualization tool. We integrate the power of both tools by aiding simplified interaction between them, using a simple GUI, for the purpose of visualizing network traces, characterizing interesting patterns, and fingerprinting related activity. To obtain realistic results, we applied the visualizations on anonymized packet traces from Lawrence Berkley National Laboratory, captured on selected hours across three months. We used a sliding window approach in visually examining traces for two transport-layer protocols: ICMP and UDP. The main contribution of this research is a protocol-specific framework of visualization for ICMP and UDP data. We explored relevant header fields and the visualizations that worked best for each of the two protocols separately. The resulting views led us to a number of guidelines that can be vital in the creation of "smart books" describing best practices in using visualization and interaction techniques to maintain network security; while creating visual fingerprints which were found unique for individual types of scanning activity. Our visualizations use a multiple-views approach that incorporates the power of two-dimensional scatter plots, histograms, parallel coordinates, and dynamic queries.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
13

Lee, Christopher Patrick. "Framework for botnet emulation and analysis." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28191.

Full text
Abstract:
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009.
Committee Chair: Copeland, John; Committee Member: Durgin, Gregory; Committee Member: Goodman, Seymour; Committee Member: Owen, Henry; Committee Member: Riley, George.
APA, Harvard, Vancouver, ISO, and other styles
14

Gorbett, Gregory Edward. "Development and Assessment of a Decision Support Framework for Enhancing the Forensic Analysis and Interpretation of Fire Patterns." Digital WPI, 2015. https://digitalcommons.wpi.edu/etd-dissertations/462.

Full text
Abstract:
"Fire investigators have historically relied upon fire damage as a means to conclude where a fire originated despite the lack of formal processes. The historical and current literature on the topic was evaluated with a specific emphasis toward the research conducted over the past eighty years related to fire patterns and their creation in the context of the fire environment. A seven step reasoning process for evaluating damage for determining the area of origin, along with a new definition for the term fire pattern, was developed. The aim was to develop and implement into practice a decision support framework that assists forensic fire investigators in assessing the efficacy of fire burn patterns as reliable indicators of the area of fire origin. This was facilitated by the development of a prototype method for determining the area of origin based on fire patterns analysis, named the Process for Origin Determination (POD). This dissertation describes the application of the POD with test subjects and presents an analysis of the outcomes showing its benefits. It has been shown through the use of reliability and validity tests that the POD assisted novices in more consistently and more accurately determining the area of origin over a variety of scenarios."
APA, Harvard, Vancouver, ISO, and other styles
15

Isaacs, Andrew C. "Siting and sizing of embedded generators : a Jamaican network analysis." Thesis, University of Bath, 2011. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.557791.

Full text
Abstract:
Increasing costs associated with fossil fuel generation and a recognition and acceptance of the finite nature of this resource, have partially contributed to the growing popularity of alternative energy generation technology. International environmental treaties have also forced many states, primarily developing states, to deliberately review their fuels use. Jamaica having such a challenge requires accurate information regarding the impact of integrating generation from such technologies into its existing network. However, given a lack of resources, little work has been done to gather the relevant data that is required to evaluate the impact of embedded generation. Instead the findings from networks in other jurisdictions that have different operational and technical characteristics have been utilized. Anecdotal information regarding the availability of satisfactory renewable resources and the minimal impact that certain levels of integration will have on the existing network abounds among the engineering community on Jamaica. This research reviews the electricity and energy sectors of Jamaica. It further considers the efforts made by policy makers to fulfil the energy needs through a possible mix of fossil and renewable sources. Focus is then shifted to the analysis of available wind resource data which is then modelled to represent usable wind data for electricity generation. Actual system data is then used to produce an acceptable model of the current transmission network. The operation of the network is then considered on varying generation and loading conditions both with and without the inclusion of renewable sources. A final assessment of the impact of such sources is then made based on the magnitude and location in the network. The study concludes by highlighting the benefits to be derived from this work and reviews the challenges faced while conducting the study. It also recommends ways in which improvements to the system can be realized.
APA, Harvard, Vancouver, ISO, and other styles
16

Smith, Eugene Herbie. "An analytical framework for monitoring and optimizing bank branch network efficiency / E.H. Smith." Thesis, North-West University, 2009. http://hdl.handle.net/10394/5029.

Full text
Abstract:
Financial institutions make use of a variety of delivery channels for servicing their customers. The primary channel utilised as a means of acquiring new customers and increasing market share is through the retail branch network. The 1990s saw the Internet explosion and with it a threat to branches. The relatively low cost associated with virtual delivery channels made it inevitable for financial institutions to direct their focus towards such new and more cost efficient technologies. By the beginning of the 21st century -and with increasing limitations identified in alternative virtual delivery channels, the financial industry returned to a more balanced view which may be seen as the revival of branch networks. The main purpose of this study is to provide a roadmap for financial institutions in managing their branch network. A three step methodology, representative of data mining and management science techniques, will be used to explain relative branch efficiency. The methodology consists of clustering analysis (CA), data envelopment analysis (DEA) and decision tree induction (DTI). CA is applied to data internal to the financial institution for increasing' the discriminatory power of DEA. DEA is used to calculate the relevant operating efficiencies of branches deemed homogeneous during CA. Finally, DTI is used to interpret the DEA results and additional data describing the market environment the branch operates in, as well as inquiring into the nature of the relative efficiency of the branch.
Thesis (M.Com. (Computer Science))--North-West University, Potchefstroom Campus, 2010.
APA, Harvard, Vancouver, ISO, and other styles
17

SANTANA, Alixandre Thiago Ferreira de. "Enterprise architecture analysis based on network paradigm: a framework proposal and empirical evaluation." Universidade Federal de Pernambuco, 2017. https://repositorio.ufpe.br/handle/123456789/25224.

Full text
Abstract:
Submitted by Pedro Barros (pedro.silvabarros@ufpe.br) on 2018-07-25T20:09:25Z No. of bitstreams: 2 license_rdf: 811 bytes, checksum: e39d27027a6cc9cb039ad269a5db8e34 (MD5) TESE Alixandre Thiago Ferreira de Santana.pdf: 11775779 bytes, checksum: c96584c019fac4d26f44797654fcb6e3 (MD5)
Approved for entry into archive by Alice Araujo (alice.caraujo@ufpe.br) on 2018-07-26T21:34:30Z (GMT) No. of bitstreams: 2 license_rdf: 811 bytes, checksum: e39d27027a6cc9cb039ad269a5db8e34 (MD5) TESE Alixandre Thiago Ferreira de Santana.pdf: 11775779 bytes, checksum: c96584c019fac4d26f44797654fcb6e3 (MD5)
Made available in DSpace on 2018-07-26T21:34:30Z (GMT). No. of bitstreams: 2 license_rdf: 811 bytes, checksum: e39d27027a6cc9cb039ad269a5db8e34 (MD5) TESE Alixandre Thiago Ferreira de Santana.pdf: 11775779 bytes, checksum: c96584c019fac4d26f44797654fcb6e3 (MD5) Previous issue date: 2017-02-15
CAPES
While the literature on Enterprise Architecture (EA) models, frameworks, and methodologies for EA implementation has many exemplars, the field is still missing mechanisms of EA analysis. EA analysis is the process which uses any technique or method to extract information from EA models about a particular concern, in order to support EA management by the experts or inform stakeholders. In this thesis, we model the EA as a complex network, a concept discussed in network science, to analyze EA structural aspects. During our exploratory study about EA network analysis (EANA), it was clear that the field was still lacking foundational aspects. First, no common language was shared by researchers. Secondly, there was no clarity about what concerns could be analyzed with network analysis initiatives and thirdly, the techniques and methods´ implementation were not clear in the papers. We solve those gaps in order to describe how to perform analysis of EA components and their relationships supported by network measures. The research approach comprehends qualitative methods such as systematic literature review, thematic analysis and design science research method. The research is conducted in three complementary and interrelated phases, aiming at first, to collect and synthesize the available knowledge about the analysis approaches existent in the literature. Next, we aim to trace a comprehensive understanding of the main concepts involved in EANA such as their analysis concerns, modeling decisions, inputs required and steps necessary to perform it. Altogether, this resulted in a set of six proposed artifacts: EANA meta-model, EANA library, EANA process, EANA data derivation strategy. Finally, we investigate the use of those artifacts, evaluating them empirically through their instantiations and/ or with the help of EA experts of three German multinational companies. The evaluation results were positive regarding, among other criteria, the efficacy and utility of the proposed artifacts in their respective contexts. As contributions, we claim the definition of the conceptual foundations of the EANA research field. Complementary, the study is not limited to the theoretical findings since it advances the understanding of empirical network analysis, whereas it offers a library of analysis initiatives, methods to derive EA data and guidelines to help experts through the analysis process (EANA process). Finally, we also add to the EANA knowledge base two new EANA methods which were also empirically evaluated. We expect that results can enhance the awareness researchers and practitioners about the EA network-based analysis´ efficacy and utility, a step necessary to develop more rationally grounded methods and tools to support the EA management considering structural aspects.
técnicas ou métodos para extrair informações arquiteturais sobre um aspecto de interesse sobre a AE, a partir de modelos, e com o objetivo de dar suporte aos especialistas no gerenciamento da AE ou ainda pra informar seus stakeholders. Nesta tese, a AE é modelada como uma rede complexa, um conceito originário da teoria de redes, com o objetivo de analisar aspectos estruturais de AE. Durante o estudo exploratório sobre a análise de redes aplicada ao contexto de AE, constatamos a ausência de fundamentos conceituais básicos como, por exemplo, um nivelamento conceitual entre os autores dos trabalhos; desconhecimento sobre a abrangência dos estudos de análise estrutural no contexto de AE e finalmente, carência de informação acerca do processo de análise estrutural realizado nos trabalhos. Nosso objetivo principal na tese é investigar como as métricas e métodos de análise de redes podem sem aplicados no contexto de análise de AE. Métodos qualitativos de pesquisa como revisão sistemática de literatura, análise temática e design science research foram utilizados em três fases complementares e inter-relacionadas. Primeiramente, para coletar e consolidar o conhecimento sobre abordagens de análise de AE existentes na literatura. Numa segunda etapa, o objetivo foi traçar um entendimento abrangente sobre os principais conceitos envolvidos na análise estrutural de AE, mapeando seus métodos e técnicas utilizados, culminando com o design de quatro artefatos propostos: um meta-modelo para análise de redes no contexto de AE; uma biblioteca reunindo as iniciativas de análise extraídas dos artigos; um processo de análise de redes para AE e uma estratégia para derivação de dados. Na terceira e última etapa, investigou-se o uso dos artefatos avaliando-os empiricamente por meio de suas instanciações e da opinião de especialistas em AE de três organizações multinacionais alemãs. Os resultados foram positivos considerando, dentre outros critérios, a eficácia e utilidade dos artefatos propostos nos seus respectivos contextos. Como contribuições, esta pesquisa define os conceitos fundamentais para análise de redes em AE, além de avançar no entendimento acerca da análise empírica de redes naquele contexto, uma vez que apresenta um catálogo de métricas e métodos para derivação de dados, além de um processo para auxiliar os especialistas ao longo da execução da análise. Finalmente, a pesquisa também contribui para a base de conhecimento com dois métodos de análise validados também empiricamente. Com base nos resultados, espera-se corroborar o potencial da análise de AE baseada em redes, sua eficácia e utilidade para pesquisadores e práticos, além de estimular a adoção e desenvolvimento de ferramental para suportar o gerenciamento de AE, considerando seus aspectos estruturais.
APA, Harvard, Vancouver, ISO, and other styles
18

Ahmed, Karim H. H. "A decision support framework for sustainable supply chain management." Thesis, Loughborough University, 2017. https://dspace.lboro.ac.uk/2134/27611.

Full text
Abstract:
Sustainable Supply Chain Management has become a topic of increased importance within the research domain. There is a greater need than ever before for companies to be able to assess and make informed decisions about their sustainability in the Supply Chains. There is a proliferation of research about its understanding and how to implement it in practice. This is mainly since sustainability has been assessed from various disciplines, organizational industries and organizational functional silos . There is a lack of comprehension, unified definition and appropriate implementation of Sustainable Supply Chain Management (SSCM), leading to failure in decision making for sustainability implementation within supply chains. The proposed research identifies the research gaps through the novel application of Systematic Literature Network Analysis (SLNA) to SSCM literature. In doing so, methods including Systematic Literature Review (SLR), Citation Network Analysis (CNA) and Citation Network Mapping of literature have been used to identify definitions, KPIs, barriers and drivers of SSCM from the literature. Furthermore, a combination of methods from Text Mining and Content Analysis has been used to identify KPIs, barriers and drivers from sustainability reports of top global manufacturing companies, to better understand the practices of organizations for SSCM. The consolidation of the findings from literature and practice led to the development of an SSCM Performance Evaluation Framework built on multiple methods. A 4-level hierarchical model has been developed by classifying the identified KPIs into Economic, Environment and Social as well as considering the key decision areas including tactical, strategic and operational. Furthermore, a rigorous data collection process was conducted among supply chain and sustainability managers from top global manufacturing firms and leading academicians in the field, assessing the identified SSCM KPIs. The collected data were analyzed through novel application of hybrid Multi-Criteria Decision Analysis (MCDA) methods, which includes Values Focused Thinking (VFT), Fuzzy Analytical Hierarchical Process (FAHP), Fuzzy Technique of Order Preference by Similarity to Ideal Solution (FTOPSIS) and Total Interpretive Structural Modelling (TISM), for prioritizing and modelling of interdependencies, interactions and weightages among SSCM KPIs. The results obtained were subsequently used to develop a Decision Support System (DSS) that allows managers to evaluate their sustainability by identifying problem areas and yielding guidance on the KPIS and most important areas to focus on for SSCM implementation. The application of DSS has been demonstrated in the context of a case company. From a theoretical development point of view, a Tree perspective framework contributing to the ecological Theory of Sustainability has been proposed through the identification of the most influential organizational theories, and how they interrelate with each other. Overall, the proposed research provides a holistic perspective of SSCM that incorporates the various aspects of organizations, relevant organizational theories and perspectives of academics and practitioners together. The proposed DSS may act as a guiding tool for managers and practitioners for SSCM implementation in companies.
APA, Harvard, Vancouver, ISO, and other styles
19

Nagi, Mohamad. "Integrating Network Analysis and Data Mining Techniques into Effective Framework for Web Mining and Recommendation. A Framework for Web Mining and Recommendation." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/14200.

Full text
Abstract:
The main motivation for the study described in this dissertation is to benefit from the development in technology and the huge amount of available data which can be easily captured, stored and maintained electronically. We concentrate on Web usage (i.e., log) mining and Web structure mining. Analysing Web log data will reveal valuable feedback reflecting how effective the current structure of a web site is and to help the owner of a web site in understanding the behaviour of the web site visitors. We developed a framework that integrates statistical analysis, frequent pattern mining, clustering, classification and network construction and analysis. We concentrated on the statistical data related to the visitors and how they surf and pass through the various pages of a given web site to land at some target pages. Further, the frequent pattern mining technique was used to study the relationship between the various pages constituting a given web site. Clustering is used to study the similarity of users and pages. Classification suggests a target class for a given new entity by comparing the characteristics of the new entity to those of the known classes. Network construction and analysis is also employed to identify and investigate the links between the various pages constituting a Web site by constructing a network based on the frequency of access to the Web pages such that pages get linked in the network if they are identified in the result of the frequent pattern mining process as frequently accessed together. The knowledge discovered by analysing a web site and its related data should be considered valuable for online shoppers and commercial web site owners. Benefitting from the outcome of the study, a recommendation system was developed to suggest pages to visitors based on their profiles as compared to similar profiles of other visitors. The conducted experiments using popular datasets demonstrate the applicability and effectiveness of the proposed framework for Web mining and recommendation. As a by product of the proposed method, we demonstrate how it is effective in another domain for feature reduction by concentrating on gene expression data analysis as an application with some interesting results reported in Chapter 5.
APA, Harvard, Vancouver, ISO, and other styles
20

Akbar, Ghanadian Sara. "A Framework Based on Social Network Analysis (SNA) to Evaluate Facilities and Alternative Network Designs for Closed Loop Supply Chains." Ohio University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1596583638602018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Botero, Oscar. "Heterogeneous RFID framework design, analysis and evaluation." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00714120.

Full text
Abstract:
The Internet of Things paradigm establishes interaction and communication with a huge amount of actors. The concept is not a new-from-scratch one; actually, it combines a vast number of technologies and protocols and surely adaptations of pre-existing elements to offer new services and applications. One of the key technologies of the Internet of Things is the Radio Frequency Identification just abbreviated RFID. This technology proposes a set of solutions that allow tracking and tracing persons, animals and practically any item wirelessly. Considering the Internet of Things concept, multiple technologies need to be linked in order to provide interactions that lead to the implementation of services and applications. The challenge is that these technologies are not necessarily compatible and designed to work with other technologies. Within this context, the main objective of this thesis is to design a heterogeneous framework that will permit the interaction of diverse devices such as RFID, sensors and actuators in order to provide new applications and services. For this purpose in this work, our first contribution is the design and analysis of an integration architecture for heterogeneous devices. In the second contribution, we propose an evaluation model for RFID topologies and an optimization tool that assists in the RFID network planning process. Finally, in our last contribution, we implemented a simplified version of the framework by using embedded hardware and performance metrics are provided as well as the detailed configuration of the test platform
APA, Harvard, Vancouver, ISO, and other styles
22

Madduri, Kamesh. "A high-performance framework for analyzing massive complex networks." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24712.

Full text
Abstract:
Thesis (Ph.D.)--Computing, Georgia Institute of Technology, 2009.
Committee Chair: Bader, David; Committee Member: Berry, Jonathan; Committee Member: Fujimoto, Richard; Committee Member: Saini, Subhash; Committee Member: Vuduc, Richard
APA, Harvard, Vancouver, ISO, and other styles
23

Eryol, Erkin. "Probabilistic Latent Semantic Analysis Based Framework For Hybrid Social Recommender Systems." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/2/12611921/index.pdf.

Full text
Abstract:
Today, there are user annotated internet sites, user interaction logs, online user communities which are valuable sources of information concerning the personalized recommendation problem. In the literature, hybrid social recommender systems have been proposed to reduce the sparsity of the usage data by integrating the user related information sources together. In this thesis, a method based on probabilistic latent semantic analysis is used as a framework for a hybrid social recommendation system. Different data hybridization approaches on probabilistic latent semantic analysis are experimented. Based on this flexible probabilistic model, network regularization and model blending approaches are applied on probabilistic latent semantic analysis model as a solution for social trust network usage throughout the collaborative filtering process. The proposed model has outperformed the baseline methods in our experiments. As a result of the research, it is shown that the proposed methods successfully model the rating and social trust data together in a theoretically principled way.
APA, Harvard, Vancouver, ISO, and other styles
24

Graversen, Therese. "Statistical and computational methodology for the analysis of forensic DNA mixtures with artefacts." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:4c3bfc88-25e7-4c5b-968f-10a35f5b82b0.

Full text
Abstract:
This thesis proposes and discusses a statistical model for interpreting forensic DNA mixtures. We develop methods for estimation of model parameters and assessing the uncertainty of the estimated quantities. Further, we discuss how to interpret the mixture in terms of predicting the set of contributors. We emphasise the importance of challenging any interpretation of a particular mixture, and for this purpose we develop a set of diagnostic tools that can be used in assessing the adequacy of the model to the data at hand as well as in a systematic validation of the model on experimental data. An important feature of this work is that all methodology is developed entirely within the framework of the adopted model, ensuring a transparent and consistent analysis. To overcome the challenge that lies in handling the large state space for DNA profiles, we propose a representation of a genotype that exhibits a Markov structure. Further, we develop methods for efficient and exact computation in a Bayesian network. An implementation of the model and methodology is available through the R package DNAmixtures.
APA, Harvard, Vancouver, ISO, and other styles
25

Wu, Sichao. "Computational Framework for Uncertainty Quantification, Sensitivity Analysis and Experimental Design of Network-based Computer Simulation Models." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/78764.

Full text
Abstract:
When capturing a real-world, networked system using a simulation model, features are usually omitted or represented by probability distributions. Verification and validation (V and V) of such models is an inherent and fundamental challenge. Central to V and V, but also to model analysis and prediction, are uncertainty quantification (UQ), sensitivity analysis (SA) and design of experiments (DOE). In addition, network-based computer simulation models, as compared with models based on ordinary and partial differential equations (ODE and PDE), typically involve a significantly larger volume of more complex data. Efficient use of such models is challenging since it requires a broad set of skills ranging from domain expertise to in-depth knowledge including modeling, programming, algorithmics, high- performance computing, statistical analysis, and optimization. On top of this, the need to support reproducible experiments necessitates complete data tracking and management. Finally, the lack of standardization of simulation model configuration formats presents an extra challenge when developing technology intended to work across models. While there are tools and frameworks that address parts of the challenges above, to the best of our knowledge, none of them accomplishes all this in a model-independent and scientifically reproducible manner. In this dissertation, we present a computational framework called GENEUS that addresses these challenges. Specifically, it incorporates (i) a standardized model configuration format, (ii) a data flow management system with digital library functions helping to ensure scientific reproducibility, and (iii) a model-independent, expandable plugin-type library for efficiently conducting UQ/SA/DOE for network-based simulation models. This framework has been applied to systems ranging from fundamental graph dynamical systems (GDSs) to large-scale socio-technical simulation models with a broad range of analyses such as UQ and parameter studies for various scenarios. Graph dynamical systems provide a theoretical framework for network-based simulation models and have been studied theoretically in this dissertation. This includes a broad range of stability and sensitivity analyses offering insights into how GDSs respond to perturbations of their key components. This stability-focused, structure-to-function theory was a motivator for the design and implementation of GENEUS. GENEUS, rooted in the framework of GDS, provides modelers, experimentalists, and research groups access to a variety of UQ/SA/DOE methods with robust and tested implementations without requiring them to necessarily have the detailed expertise in statistics, data management and computing. Even for research teams having all the skills, GENEUS can significantly increase research productivity.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
26

Perez, Fridrich Shane. "A Framework for the Performance Analysis and Tuning of Virtual Private Networks." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6867.

Full text
Abstract:
With the rising trend of personal devices like laptops and smartphones being used in businesses and significant enterprises, the concern for preserving security arises. In addition to preserving security measures in outside devices, the network speed and performance capable by these devices need to be balanced with the security aspect to avoid slowing down virtual private network (VPN) activity. Performance tests have been done in the past to evaluate available software, hardware, and network security protocol options that will best benefit an entity according to its specific needs. With a variety of comparable frameworks available currently, it is a matter of pick and choose. This study is dedicated to developing a unique process-testing framework for personal devices by comparing the default security encryptions of different VPN architectures to the Federal Information Processing Standards (FIPS) set of complying encryptions. VPN architectures include a vendor-supplied VPN, Palo Alto Networks, open-sourced OpenVPN application, and a Windows PPTP server to test security protocols and measure network speed through different operating platforms. The results achieved in this research reveal the differences between the default security configurations and the encryption settings enforced by FIPS, shown through the collected averaged bandwidth between multiple network tests under those settings. The results have been given additional analysis and confidence through t-tests and standard deviation. The configurations, including difficulty in establishing, between different VPNs also contribute to discovering OpenVPN under FIPS settings to be favorable over a Palo Alto firewall using FIPS-CC mode due to higher bandwidth rate despite following the same encryption standards.
APA, Harvard, Vancouver, ISO, and other styles
27

Müller-Prothmann, Tobias. "Leveraging knowledge communication for innovation framework, methods and applications of social network analysis in research and development /." [S.l.] : [s.n.], 2006. http://www.diss.fu-berlin.de/2006/596/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Ciszek, Thomas. "A Framework for the Development of Social Linking Theory." Thesis, School of Information and Library Science, 2005. http://hdl.handle.net/1901/237.

Full text
Abstract:
This paper characterizes the need for a theory that links context to information through the behaviors rooted in cultural identity and social awareness. Based on hypermedia objects and four methods of social communication, I develop a framework for a theory of social linking. This theory assumes that social interaction is the plinth from which we communicate and argues that studies in human computer interaction and information retrieval require ongoing exploration of social communication.
APA, Harvard, Vancouver, ISO, and other styles
29

Jiang, Shan. "Statistical Modeling of Multi-Dimensional Knowledge Diffusion Networks: An ERGM-Based Framework." Diss., The University of Arizona, 2015. http://hdl.handle.net/10150/555946.

Full text
Abstract:
Knowledge diffusion networks consist of individuals who exchange knowledge and knowledge flows connecting the individuals. By studying knowledge diffusion in a network perspective, it helps us understand how the connections between individuals affect the knowledge diffusion processes. Existing research on knowledge diffusion networks mostly adopts a uni-dimensional perspective, where all the individuals in the networks are assumed to be of the same type. It also assumes that there is only one type of knowledge flow in the network. This dissertation proposes a multi-dimensional perspective of knowledge diffusion networks and examines the patterns of knowledge diffusion with Exponential Random Graph Model (ERGM) based approaches. The objective of this dissertation is to propose a framework that effectively addresses the multi-dimensionality of knowledge diffusion networks, to enable researchers and practitioners to conceptualize the multi-dimensional knowledge diffusion networks in various domains, and to provide implications on how to stimulate and control the knowledge diffusion process. The dissertation consists of three essays, all of which examine the multi-dimensional knowledge diffusion networks in a specific context, but each focuses on a different aspect of knowledge diffusion. Chapter 2 focuses on how structural properties of networks affect various types of knowledge diffusion processes in the domain of commercial technology. The study uses ERGM to simultaneously model multiple types of knowledge flows and examine their interactions. The objective is to understand the impacts of network structures on knowledge diffusion processes. Chapter 3 focuses on examining the impact of individual attributes and the attributes of knowledge on knowledge diffusion in the context of scientific innovation. Based on social capital theory, the study also utilizes ERGM to examine how knowledge transfer and knowledge co-creation can be affected by the attributes of individual researchers and the attributes of scientific knowledge. Chapter 4 considers the dynamic aspect of knowledge diffusion and proposes a novel network model extending ERGM to identify dynamic patterns of knowledge diffusion in social media. In the proposed model, dynamic patterns in social media networks are modeled based on the nodal attributes of individuals and the temporal information of network ties.
APA, Harvard, Vancouver, ISO, and other styles
30

Kausar, Rukhsana [Verfasser], and Stephan [Akademischer Betreuer] Trenn. "Analysis and modeling of water distribution network in the framework of switched DAEs / Rukhsana Kausar ; Betreuer: Stephan Trenn." Kaiserslautern : Technische Universität Kaiserslautern, 2019. http://d-nb.info/1193491517/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Wang, Hantao. "Analyzing YouTube Content Demand Patternsand Cacheabilityin a Swedish Municipal Network." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119775.

Full text
Abstract:
User Generated Content (UGC) has boosted a high popularity since the birth of a wide range of web services allowing the distribution of such user-produced media content, whose patterns vary from textual information, photo galleries to videos on site. The boom of Internet of Things and the newly released HTML5 accelerate the development of multimedia patterns as well as the technology of distributing it. YouTube, as one of the most popular video sharing site, enjoys the top most numbers of video views and video uploads per day in the world. With the rapid growing of multimedia patterns as well as huge bandwidth demand from subscribers, the sheer volume of the traffic is going to severely strain the network resources.</p><p>Therefore, analyzing media streaming traffic patterns and cacheability in live IP-access networks today leads a hot issue among network operators and content providers. One possible solution could be caching popular contents with a high replay rate in a proxy server on LAN border or in users' terminals.</p><p>Based on the solution, this thesis project focuses on developing a measurement framework to associate network cacheability with video category and video duration under a typical Swedish municipal network. Experiments of focused parameters are performed to investigate potential user behavior rules. From the analysis of the results, Music traffic gets a rather ideal network gain as well as a remarkable terminal gain, indicating that it is more efficient to be stored close to end user. Film&amp;Animation traffic, however, is preferable to be cached in the network due to its high net gain. Besides, it is optimal to cache the video clips with a length between 3 and 5 minutes, especially the Music and Film&amp;Animation traffic. In addition, more than half of the replays occur during 16.00-24.00 and peak hours appear on average from 18.00 to 22.00. Lastly, only around 16% of the videos are global popular and very few heavy users tend to be local popular video viewers, depicting local limits and independent user interests
APA, Harvard, Vancouver, ISO, and other styles
32

Jurinek, Róbert. "Forenzní analýza síťového připojení v OS Linux." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2014. http://www.nusl.cz/ntk/nusl-232875.

Full text
Abstract:
This thesis focuses on forensic analysis of network connection in operating systems based on Linux kernel. The paper is divided into chapters that describe principles of digital forensics, packet processing inside Linux kernel and compare forensic software tools. This knowledge is then applied in design of application for network connection forensics in Linux. Designed application is implemented and used in practical process of digital forensic analysis. In conclusion possible extensions are proposed.
APA, Harvard, Vancouver, ISO, and other styles
33

Zhang, Jianzhe. "Development of an Apache Spark-Based Framework for Processing and Analyzing Neuroscience Big Data: Application in Epilepsy Using EEG Signal Data." Case Western Reserve University School of Graduate Studies / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=case1597089028333942.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Leichtnam, Laetitia. "Detecting and visualizing anomalies in heterogeneous network events : Modeling events as graph structures and detecting communities and novelties with machine learning." Thesis, CentraleSupélec, 2020. http://www.theses.fr/2020CSUP0011.

Full text
Abstract:
L'objectif général de cette thèse est d'évaluer l'intérêt des graphes dans le domaine de l'analyse des données de sécurité.Nous proposons une approche de bout en bout composé d'un modèle unifié de données réseau sous forme de graphes, d'un système de découverte de communauté, d'un système de détection d'anomalies non supervisé et d'une visualisation des données sous forme de graphes. Le modèle unifié est obtenue en utilisant des graphes de connaissance pour représenter des journaux d'évènements hétérogènes ainsi que du trafic réseau. La détection de communautés permet de sélectionner des sous-graphes représentant des événements fortement liés à une alerte ou à un IoC et qui sont donc pertinents pour l'analyse forensique. Notre système de détection d'intrusion basé sur les anomalies repose sur la détection de nouveauté par un autoencodeur et donne de très bons résultats sur les jeux de données CICIDS 2017 et 2018. Enfin, la visualisation immersive des données de sécurité permet de mettre en évidence les relations entre les éléments de sécurité et les événements malveillants ou les IoCs. Cela donne à l'analyste de sécurité un bon point de départ pour explorer les données et reconstruire des scénarii d'attaques globales
The general objective of this thesis is to evaluate the interest of graph structures in the field of security data analysis.We propose an end-to-end approach consisting in a unified view of the network data in the form of graphs, a community discovery system, an unsupervised anomaly detection system, and a visualization of the data in the form of graphs. The unified view is obtained using knowledge graphs to represent heterogeneous log files and network traffics. Community detection allows us to select sub-graphs representing events that are strongly related to an alert or an IoC and that are thus relevant for forensic analysis. Our anomaly-based intrusion detection system relies on novelty detection by an autoencoder and exhibits very good results on CICIDS 2017 and 2018 datasets. Finally, an immersive visualization of security data allows highlighting the relations between security elements and malicious events or IOCs. This gives the security analyst a good starting point to explore the data and reconstruct global attack scenarii
APA, Harvard, Vancouver, ISO, and other styles
35

Abramic, Andrej. "ANALYSIS OF MONITORING NETWORK SPATIAL AND TEMPORAL REDUCTION AND THEIR CONSEQUENCES ON THE ECOLOGICAL CLASSIFICATION IN THE SCOPE OF WATER FRAME DIRECTIVE." Doctoral thesis, Universitat Politècnica de València, 2013. http://hdl.handle.net/10251/28851.

Full text
Abstract:
La Directiva Marco Europea del Agua es la norma legislativa más importante que ha establecido la Comisión Europea, en materia de aguas, y constituye un importante avance para lograr una gestión sostenible del agua. Esta norma exige que todas las aguas, alcancen en el 2015 un status bueno e indica los pasos a seguir para conseguirlo, mediante el establecimiento de objetivos ecológicos y medioambientales en las mismas. Para concretar estos objetivos, la DMA ha establecido un sistema de indicadores biológicos, hidro-morfológicos y fisicoquímicos que determinan la calidad ecológica de las diferentes masas de agua. Para proporcionar una clasificación ecológica de las masas de agua costeras en la Comunidad Valencia existe una red de monitoreo costera que analiza la biomasa de fitoplancton, de forma indirecta a partir de la clorofila a. En las mismas, se establece la calidad de las aguas costeras en base al valor del percentil 90 del total de mediciones de clorofila a recogidas en sucesivas campañas mensuales durante un período de 5 años. Se ha considerado la posibilidad de reducir el número de campañas realizadas a lo largo del año y la posibilidad de reducir el número de estaciones revisadas en cada campaña y que consecuencias lleva esta reducción por estado ecológico. Los resultados del estudio exploratorio para la reducción temporal, muestran que una reducción no controlada en el número de campañas realizadas a lo largo del año en las aguas costeras valencianas, puede producir alteraciones impredecibles en su clasificación ecológica. Un estudio conjunto de las series pluviométricas, de oleaje, salinidad y clorofila a, para los tres climas marítimos presentes en las aguas costeras valencianas, ha permitido observar que el equilibrio trófico de los ecosistemas, en esta zona, depende tanto de la influencia antropogénica como de factores medioambientales determinados por la estacionalidad e irregularidad del clima. En base a ello, se han definido tres tipos de ecosistema
Abramic, A. (2011). ANALYSIS OF MONITORING NETWORK SPATIAL AND TEMPORAL REDUCTION AND THEIR CONSEQUENCES ON THE ECOLOGICAL CLASSIFICATION IN THE SCOPE OF WATER FRAME DIRECTIVE [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/28851
Palancia
APA, Harvard, Vancouver, ISO, and other styles
36

Munir, Rashid. "A Quantitative Security Assessment of Modern Cyber Attacks. A Framework for Quantifying Enterprise Security Risk Level Through System's Vulnerability Analysis by Detecting Known and Unknown Threats." Thesis, University of Bradford, 2014. http://hdl.handle.net/10454/14251.

Full text
Abstract:
Cisco 2014 Annual Security Report clearly outlines the evolution of the threat landscape and the increase of the number of attacks. The UK government in 2012 recognised the cyber threat as Tier-1 threat since about 50 government departments have been either subjected to an attack or a direct threat from an attack. The cyberspace has become the platform of choice for businesses, schools, universities, colleges, hospitals and other sectors for business activities. One of the major problems identified by the Department of Homeland Security is the lack of clear security metrics. The recent cyber security breach of the US retail giant TARGET is a typical example that demonstrates the weaknesses of qualitative security, also considered by some security experts as fuzzy security. High, medium or low as measures of security levels do not give a quantitative representation of the network security level of a company. In this thesis, a method is developed to quantify the security risk level of known and unknown attacks in an enterprise network in an effort to solve this problem. The identified vulnerabilities in a case study of a UK based company are classified according to their severity risk levels using common vulnerability scoring system (CVSS) and open web application security project (OWASP). Probability theory is applied against known attacks to create the security metrics and, detection and prevention method is suggested for company network against unknown attacks. Our security metrics are clear and repeatable that can be verified scientifically.
APA, Harvard, Vancouver, ISO, and other styles
37

Frost, Per. "Utvärdering av den upplevda användbarheten hos CySeMoL och EAAT med hjälp av ramverk för ändamålet och ISO/IEC 25010:2011." Thesis, KTH, Industriella informations- och styrsystem, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-138576.

Full text
Abstract:
This report describes a study aimed at uncovering flaws and finding potential improvements from when the modelling tool EAAT is used in conjunction with the modelling language CySeMoL. The study was performed by developing a framework and applying it on CySeMoL and EAAT in real life context networks. The framework was developed in order to increase the number of flaws uncovered as well as gather potential improvements to both EAAT and CySeMoL. The basis of the framework is a modified version of the Quality in use model from ISO/IEC 25010:2011 standard. Upon the characteristics and sub characteristics of this modified model different values for measuring usability where attached. The purpose of these values is to measure usability from the perspectives of both creating and interpreting models. Furthermore these values are based on several different sources on how to measure usability. The complete contents of the framework and the underlying ideas, upon which the framework is based, are presented in this report. The framework in this study was designed in order to enable it to be used universally with any modelling language in conjunction with a modelling tool. Its design is also not limited to the field of computer security and computer networks, although that is the intended context of CySeMoL as well as the context described in this report. However, utilization outside the intended area of usage will most likely require some modifications, in order to work in a fully satisfying. Several flaws where uncovered regarding the usability of CySeMoL and EAAT, but this is also accompanied by several recommendations on how to improve both CySeMoL and EAAT. Because of the outline of the framework, the most severe flaws have been identified and recommendations on how to rectify these shortcomings have been suggested.
APA, Harvard, Vancouver, ISO, and other styles
38

Warshawsky, David. "A system of systems flexibility framework: A method for evaluating designs that are subjected to disruptions." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/54277.

Full text
Abstract:
As systems become more interconnected, the focus of engineering design must shift to include consideration for systems of systems (SoS) e ects. As the focus shifts from singular systems to systems of systems, so too must the focus shift from performance based analysis to an evaluation method that accounts for the tendency of such large scale systems to far outlive their original operational environments and continually evolve in order to adapt to the changes. It is nearly impossible to predict the nature of these changes, therefore the rst focus of this thesis is the measurement of the exibility of the SoS and its ability to evolve and adapt. Flexibility is measured using a combination of network theory and a discrete event simulation, therefore, the second focus is the development of a simulation environment that can also measure the system's performance for baseline comparisons. The results indicate that simulated exibility is related to the performance and cost of the SoS and is worth measuring during the design process. The third focus of this thesis is to reduce the computational costs of SoS design evaluation by developing heuristics for exibility. This was done by developing a network model to correspond with the discrete event simulation and evaluating network properties using graph theory. It was shown that the network properties can correlate with simulated exibility. In such cases it was shown that the heuristics could be used in connection with an evolutionary algorithm to rapidly search the design space for good solutions. The entire methodology was demonstrated on a multi-platform maintenance planning problem in connection with the Navy Hardware Open System Technologies initiative.
APA, Harvard, Vancouver, ISO, and other styles
39

Jung, Kyujin. "Sources of Organizational Resilience During the 2012 Korean Typhoons: an Institutional Collective Action Framework." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc801952/.

Full text
Abstract:
The objective of this proposed research is to test whether interorganizational collaboration contributes to the ability of an organization to bounce back swiftly from disasters. The research questions are examined from the Institutional Collective Action (ICA) perspective. The general argument of this dissertation is that organizational resilience can be explained by interorganizational collaboration. The ICA framework, specifically, identifies two general network structures to explain strategies that can be adopted to minimize collaboration risks: bonding and bridging structures. This dissertation focuses on how governmental and nongovernmental organizations in South Korea collaborated. The data was collected from the southeastern tip of the Korean Peninsula in August of 2012, and January of 2013. The 2012 Typhoons devastated the area after the first data set was collected in August 2012, causing the loss of estimated US$ 730 million and 29 fatalities. Afterward, the second survey was administrated in January of 2013 to gauge respondents’ views on how organizations responded to the disasters. This dissertation consists of three essays. The first essay presents a brief overview and assessment of the current research on resilience. The second essay empirically tests the sources of organization resilience. The third essay examines the dynamic nature of interorganizational ties by employing stochastic actor-based models. The findings show how organizations prefer to not coordinate with other organizations even though this could reduce their strains during a disaster. The findings also suggest that organizations that operate in higher risk areas or participate in joint full-scale exercises before a disaster form interorganizational ties afterward.
APA, Harvard, Vancouver, ISO, and other styles
40

Nicoll, J. Ross. "A web-oriented framework for the development and deployment of academic facing administrative tools and services." Thesis, University of St Andrews, 2015. http://hdl.handle.net/10023/6857.

Full text
Abstract:
The demand for higher education has increased dramatically in the last decade. At the same time, institutions have faced continual pressure to reduce costs and increase quality of education, while delivering that education to greater numbers of students. The introduction of software systems such as virtual learning environments, online learning resources and centralised student record systems has become routine in attempts to address these demands. However, these approaches suffer from a variety of limitations: They do not take all stakeholders' needs into account. They do not seek to reduce administrative overheads in academic processes. They do not reflect institution-specific academic policies. They do not integrate readily with other information systems. They are not capable of adequately modelling the complex authorisation roles and organisational structure of a real institution. They are not well suited to rapidly changing policies and requirements. Their implementation is not informed by sound software engineering practises or data architecture design. Crucially, as a consequence of these drawbacks such systems can increase administrative workload for academic staff. This thesis describes the research, development and deployment of a system which seeks to address these limitations, the Module Management System (MMS). MMS is a collaborative web application targeted at streamlining and minimising administrative tasks. MMS encapsulates a number of user-facing tools for tasks including coursework submission and marking, tutorial attendance tracking, exam mark recording and final grade calculation. These tools are supported by a framework which acts as a form of “university operating system”. This framework provides a number of different services including an institution abstraction layer, role-based views and privileges, security policy support integration with external systems.
APA, Harvard, Vancouver, ISO, and other styles
41

Sanchis, Cano Ángel. "Economic analysis of wireless sensor-based services in the framework of the Internet of Things. A game-theoretical approach." Doctoral thesis, Universitat Politècnica de València, 2018. http://hdl.handle.net/10251/102642.

Full text
Abstract:
El mundo de las telecomunicaciones está cambiando de un escenario donde únicamente las personas estaban conectadas a un modelo donde prácticamente todos los dispositivos y sensores se encuentran conectados, también conocido como Internet de las cosas (IoT), donde miles de millones de dispositivos se conectarán a Internet a través de conexiones móviles y redes fijas. En este contexto, hay muchos retos que superar, desde el desarrollo de nuevos estándares de comunicación al estudio de la viabilidad económica de los posibles escenarios futuros. En esta tesis nos hemos centrado en el estudio de la viabilidad económica de diferentes escenarios mediante el uso de conceptos de microeconomía, teoría de juegos, optimización no lineal, economía de redes y redes inalámbricas. La tesis analiza la transición desde redes centradas en el servicio de tráfico HTC a redes centradas en tráfico MTC desde un punto de vista económico. El primer escenario ha sido diseñado para centrarse en las primeras etapas de la transición, en la que ambos tipos de tráfico son servidos bajo la misma infraestructura de red. En el segundo escenario analizamos la siguiente etapa, en la que el servicio a los usuarios MTC se realiza mediante una infraestructura dedicada. Finalmente, el tercer escenario analiza la provisión de servicios basados en MTC a usuarios finales, mediante la infraestructura analizada en el escenario anterior. Gracias al análisis de todos los escenarios, hemos observado que la transición de redes centradas en usuarios HTC a redes MTC es posible y que la provisión de servicios en tales escenarios es viable. Además, hemos observado que el comportamiento de los usuarios es esencial para determinar la viabilidad de los diferentes modelos de negocio, y por tanto, es necesario estudiar el comportamiento y las preferencias de los usuarios en profundidad en estudios futuros. Específicamente, los factores más relevantes son la sensibilidad de los usuarios al retardo en los datos recopilados por los sensores y la cantidad de los mismos. También hemos observado que la diferenciación del tráfico en categorías mejora el uso de las redes y permite crear nuevos servicios empleando datos que, de otro modo, no se aprovecharían, lo cual nos permite mejorar la monetización de la infraestructura. También hemos demostrado que la provisión de capacidad es un mecanismo válido, alternativo a la fijación de precios, para la optimización de los beneficios de los proveedores de servicio. Finalmente, se ha demostrado que es posible crear roles específicos para ofrecer servicios IoT en el mercado de las telecomunicaciones, específicamente, los IoT-SPs, que proporcionan servicios basados en sensores inalámbricos utilizando infraestructuras de acceso de terceros y sus propias redes de sensores. En resumen, en esta tesis hemos intentado demostrar la viabilidad económica de modelos de negocio basados en redes futuras IoT, así como la aparición de nuevas oportunidades y roles de negocio, lo cual nos permite justificar económicamente el desarrollo y la implementación de las tecnologías necesarias para ofrecer servicios de acceso inalámbrico masivo a dispositivos MTC.
The communications world is moving from a standalone devices scenario to a all-connected scenario known as Internet of Things (IoT), where billions of devices will be connected to the Internet through mobile and fixed networks. In this context, there are several challenges to face, from the development of new standards to the study of the economical viability of the different future scenarios. In this dissertation we have focused on the study of the economic viability of different scenarios using concepts of microeconomics, game theory, non-linear optimization, network economics and wireless networks. The dissertation analyzes the transition from a Human Type Communications (HTC) to a Machine Type Communications (MTC) centered network from an economic point of view. The first scenario is designed to focus on the first stages of the transition, where HTC and MTC traffic are served on a common network infrastructure. The second scenario analyzes the provision of connectivity service to MTC users using a dedicated network infrastructure, while the third stage is centered in the analysis of the provision of services based on the MTC data over the infrastructure studied in the previous scenario. Thanks to the analysis of all the scenarios we have observed that the transition from HTC users-centered networks to MTC networks is possible and that the provision of services in such scenarios is viable. In addition, we have observed that the behavior of the users is essential in order to determine the viability of a business model, and therefore, it is needed to study their behavior and preferences in depth in future studios. Specifically, the most relevant factors are the sensitivity of the users to the delay and to the amount of data gathered by the sensors. We also have observed that the differentiation of the traffic in categories improves the usage of the networks and allows to create new services thanks to the data that otherwise would not be used, improving the monetization of the infrastructure and the data. In addition, we have shown that the capacity provision is a valid mechanism for providers' profit optimization, as an alternative to the pricing mechanisms. Finally, it has been demonstrated that it is possible to create dedicated roles to offer IoT services in the telecommunications market, specifically, the IoT-SPs, which provide wireless-sensor-based services to the final users using a third party infrastructure. Summarizing, this dissertation tries to demonstrate the economic viability of the future IoT networks business models as well as the emergence of new business opportunities and roles in order to justify economically the development and implementation of the new technologies required to offer massive wireless access to machine devices.
El món de les telecomunicacions està canviant d'un escenari on únicament les persones estaven connectades a un model on pràcticament tots els dispositius i sensors es troben connectats, també conegut com a Internet de les Coses (IoT) , on milers de milions de dispositius es connectaran a Internet a través de connexions mòbils i xarxes fixes. En aquest context, hi ha molts reptes que superar, des del desenrotllament de nous estàndards de comunicació a l'estudi de la viabilitat econòmica dels possibles escenaris futurs. En aquesta tesi ens hem centrat en l'estudi de la viabilitat econòmica de diferents escenaris per mitjà de l'ús de conceptes de microeconomia, teoria de jocs, optimització no lineal, economia de xarxes i xarxes inalàmbriques. La tesi analitza la transició des de xarxes centrades en el servici de tràfic HTC a xarxes centrades en tràfic MTC des d'un punt de vista econòmic. El primer escenari ha sigut dissenyat per a centrar-se en les primeres etapes de la transició, en la que ambdós tipus de tràfic són servits davall la mateixa infraestructura de xarxa. En el segon escenari analitzem la següent etapa, en la que el servici als usuaris MTC es realitza per mitjà d'una infraestructura dedicada. Finalment, el tercer escenari analitza la provisió de servicis basats en MTC a usuaris finals, per mitjà de la infraestructura analitzada en l'escenari anterior. Als paràgrafs següents es descriu amb més detall cada escenari. Gràcies a l'anàlisi de tots els escenaris, hem observat que la transició de xarxes centrades en usuaris HTC a xarxes MTC és possible i que la provisió de servicis en tals escenaris és viable. A més a més, hem observat que el comportament dels usuaris és essencial per a determinar la viabilitat dels diferents models de negoci, i per tant, és necessari estudiar el comportament i les preferències dels usuaris en profunditat en estudis futurs. Específicament, els factors més rellevants són la sensibilitat dels usuaris al retard en les dades recopilats pels sensors i la quantitat dels mateixos. També hem observat que la diferenciació del tràfic en categories millora l'ús de les xarxes i permet crear nous servicis emprant dades que, d'una altra manera, no s'aprofitarien, la qual cosa ens permet millorar la monetització de la infraestructura. També hem demostrat que la provisió de capacitat és un mecanisme vàlid, alternatiu a la fixació de preus, per a l'optimització dels beneficis dels proveïdors de servici. Finalment, s'ha demostrat que és possible crear rols específics per a oferir servicis IoT en el mercat de les telecomunicacions, específicament, els IoT-SPs, que proporcionen servicis basats en sensors inalàmbrics utilitzant infraestructures d'accés de tercers i les seues pròpies xarxes de sensors. En resum, en aquesta tesi hem intentat demostrar la viabilitat econòmica de models de negoci basats en xarxes futures IoT, així com l'aparició de noves oportunitats i rols de negoci, la qual cosa ens permet justificar econòmicament el desenrotllament i la implementació de les tecnologies necessàries per a oferir servicis d'accés inalàmbric massiu a dispositius MTC.
Sanchis Cano, Á. (2018). Economic analysis of wireless sensor-based services in the framework of the Internet of Things. A game-theoretical approach [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/102642
TESIS
APA, Harvard, Vancouver, ISO, and other styles
42

MORANDO, VERDIANA. "Evaluating the performance of policy networks: connecting theories to organizational praxis. A case study analysis in Lombardy Region to evaluate the performance of the integrated care network managing the patway of persons with Spinal Cord Injury." Doctoral thesis, Università Cattolica del Sacro Cuore, 2012. http://hdl.handle.net/10280/1512.

Full text
Abstract:
Ricerca sperimentale sulla valutazione della performance nei servizi pubblici. Il lavoro è articolato in due parti: nella prima, dopo una ricognizione internazionale della letteratura e delle principali esperienze della misurazione, gestione e valutazione della performance, viene costruito e argomentato un framework sperimentale per la valutazione della performance dei network pubblici. La seconda sezione presenta uno studio di caso sperimentale per validare il framework. Lo studio di caso ha in oggetto il policy network per la gestione del PTDAR dei pazienti con lesione midollare. Viene considerato come network il territorio regionale e unità di analisi è collocata a livello micro in un unità dipartimentale: Unità Spinale Unipolare. Il framework risulta consistente e promettente per la valutazione dei policy network per le cure integrate.
Experimental case study design for the performance evaluation of health care public services. The thesis is broken down into two main parts: the first part deals with the performance framework construction wherein the international theoretical literature and experiences realized are retrieved and discussed. The second part deliveries an experimental case study design to validate the framework proposed. The case studies focuses on the integrated care pathway for persons whit spinal cord injury/dysfunction. The policy network sets out the Regional policy making and the unity of analysis is a Spinal Unit specialized centre. The framework proved to be consistent and adapted for evaluating policy network for integrated care.
APA, Harvard, Vancouver, ISO, and other styles
43

Martinka, Jan. "Digitální forenzní věda a její aplikace při forenzním auditu účetnictví." Master's thesis, Vysoká škola ekonomická v Praze, 2015. http://www.nusl.cz/ntk/nusl-193055.

Full text
Abstract:
This thesis aims to describe a process framework suitable for conducting digital forensics investigation projects as support for forensic audit. Selection of existing digital forensics investigation framework was a subject of criterial comparison. Described new framework is a result of combination and enhancement of those frameworks, which were suitable for the characteristics of forensic audit. Thesis also discusses digital forensics methods for fraud examination and risk assessment as a part of external audit.
APA, Harvard, Vancouver, ISO, and other styles
44

Wang, Zhonglin [Verfasser], Stefan W. [Akademischer Betreuer] Pickl, Stefan W. [Gutachter] Pickl, and Oliver [Gutachter] Rose. "Aggregation-based Decision Support Framework for Resilience Analysis of a Transportation Network / Zhonglin Wang ; Gutachter: Stefan W. Pickl, Oliver Rose ; Akademischer Betreuer: Stefan W. Pickl ; Universität der Bundeswehr München, Fakultät für Informatik." Neubiberg : Universitätsbibliothek der Universität der Bundeswehr München, 2021. http://d-nb.info/1237325641/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Greenidge, Nicole. "An integrated national disaster risk reduction and climate change adaptation development investment framework for Barbados, a Small Island Developing State (SIDS)." Thesis, University of Manchester, 2018. https://www.research.manchester.ac.uk/portal/en/theses/an-integrated-national-disaster-risk-reduction-and-climate-change-adaptation-development-investment-framework-for-barbados-a-small-island-developing-state-sids(d6142c04-dff5-42a6-af91-b9e5b88f241d).html.

Full text
Abstract:
Disasters and climate change threaten the very existence of a special group of developing states- Small Island Developing States (SIDS). This research tackles the problem of limited uptake of integrated approaches to address risk in practice- in particular through disaster risk reduction (DRR) and climate change adaptation (CCA). The benefits of these approaches are so significant that they can be considered to be investments in development. Focusing on Barbados, a SIDS, this research therefore seeks to identify the prospects for establishing an integrated disaster risk reduction and climate change adaptation (DRR-CCA) development decision-making framework. It also seeks to understand the policy implications for other SIDS. In addressing the research problem, a risk governance framework and mixed methods approach is proposed for identifying the prospects for DRR-CCA. This allows for the challenges and the potential in actor networks, institutions, and the various dimensions of risk decision-making to be identified. The specific SIDS DRR-CCA risk governance framework utilised to generate the prospects is identified from literature. Data from documents, surveys and in-depth semi-structured interviews with 30 representatives from 20 organisations operating at different levels were gathered on DRR and CCA risk governance in Barbados from November, 2014 to May 2015. Analysis was carried out using document analysis, thematic analysis; social network analysis, and descriptive statistics. The research identifies that SIDS require an enhanced risk governance framework for DRR-CCA. This framework has a systemic approach at the core, as well as an explicit development approach supported by a joined-up governance approach. Furthermore, risk assessments should include assessments of adaptive capacity. Existing potential for DRR-CCA risk governance was identified in highly dense networks, established disaster management networks, and a unique polycentric network that engages intraregional partners in national governance. Notwithstanding, challenges related to cohesion within and across institutions and sectors; missing community and socio-economic participation; as well as issues connected to unadjusted mind-sets to address the DRR paradigm shift in practice, and limited development-socio-ecological systems approaches, meant that the prospects identified mainly addressed these shortcomings. A spatial methodology for DRR-CCA seemed feasible. This research contributes a framework for conceptualising DRR-CCA risk governance in SIDS which could be applicable to others. It offers a Caribbean SIDS perspective and practical suggestions for DRR-CCA that are relevant to SIDS practitioners and donors. Further research should focus on testing the prospects across the varying governance contexts of SIDS.
APA, Harvard, Vancouver, ISO, and other styles
46

Wannack, Volker Verfasser], Gert [Akademischer Betreuer] [Brunekreeft, Stefan [Akademischer Betreuer] Kettemann, Dennis A. V. [Akademischer Betreuer] Dittrich, and Jörg [Akademischer Betreuer] Borrmann. "Quality Regulation for Monopolistic Electricity Distribution Network Companies: A Theoretical and Experimental Analysis within a Principal-Agent Framework / Volker Wannack. Betreuer: Gert Brunekreeft. Gutachter: Gert Brunekreeft ; Stefan Kettemann ; Dennis A. V. Dittrich ; Jörg Borrmann." Bremen : IRC-Library, Information Resource Center der Jacobs University Bremen, 2015. http://d-nb.info/1081255870/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Mora, Núñez Néstor. "A multi-fold assessment framework for virtualized collaborative and social learning scenarios." Doctoral thesis, Universitat Oberta de Catalunya, 2016. http://hdl.handle.net/10803/404535.

Full text
Abstract:
Proposem un procés de virtualització de sessions col·laboratives en directe a partir de fòrums de discussió i xats web amb l'objectiu de produir recursos d'aprenentatge en línia interactius per a ser utilitzats pels alumnes i generar un efecte positiu en la participació de l'alumne. Per tal de millorar encara més la implicació de l'aprenentatge, vam dotar al nostre procés de virtualització d'un marc d'avaluació múltiple que proporciona la consciència efectiva i la retroalimentació constructiva als alumnes de la col·laboració original amb interaccions entre els membres del grup. La investigació presentada es centra en l'avaluació electrònica d'aprenentatge col·laboratiu i social i s'estén amb analítiques d'aprenentatge i tècniques d'anàlisi de xarxa social que són capaces d'analitzar i representar les interaccions cognitives i socials amb sessions de col·laboració en viu subjacents.
Proponemos un proceso de virtualización de sesiones colaborativas en directo a partir de foros de discusión y chats web con el objetivo de producir recursos de aprendizaje en línea interactivos para ser utilizados por los alumnos y generar un efecto positivo en la participación del alumno. Con el fin de mejorar aún más la implicación del aprendizaje, dotamos a nuestro proceso de virtualización de un marco de evaluación múltiple que proporciona la conciencia efectiva y la retroalimentación constructiva a los alumnos de la colaboración original con interacciones entre los miembros del grupo. La investigación presentada se centra en la evaluación electrónica de aprendizaje colaborativo y social y se extiende con analíticas de aprendizaje y técnicas de análisis de red social que son capaces de analizar y representar las interacciones cognitivas y sociales con sesiones de colaboración en vivo subyacentes.
We propose a virtualization process of live collaborative sessions from Web discussion forums and chats with the aim to produce interactive and attractive online learning resources to be used by learners, thus having a positive effect in learner engagement. In order to enhance further learning engagement, we endow our virtualization process with a multifold assessment framework that provides effective awareness and constructive feedback to learners from the original collaborative interactions among group members. The research presented focuses on e-assessment of collaborative and social learning and extends it with Learning Analytics and Social Network Analysis techniques that are able to analyse and represent cognitive and social interactions underlying live collaborative sessions.
APA, Harvard, Vancouver, ISO, and other styles
48

Miles, Austin. "Changes in Social Networks and Narratives associated with Lake Erie Water Quality Management after the 2014 Toledo Water Crisis." The Ohio State University, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1593600584732076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Onojeharho, Ejovwoke. "Knowledge technologies process and cultures : improving information and knowledge sharing at the Amateur Swimming Association (ASA)." Thesis, Loughborough University, 2015. https://dspace.lboro.ac.uk/2134/19707.

Full text
Abstract:
Over the last few years the ASA determined KM as a priority to assist with reducing knowledge loss, realising information assets and reducing work duplication by attempting to implement IKM tools and strategies. This research employed a pragmatic viewpoint, using a mix of both quantitative and qualitative methods to check reliability, to ensure validity while undertaking the task of implementing the IKM tools. Using a case study strategy and action research was justified, as to be pragmatic the researcher needed to understand the extent of the problem within a specified context. The research discussed in this thesis, provides a new framework for implementing KM tools; focusing on the NSO category, which the case study organisation falls into. The literature agrees enlisting influential members onto the project is vital for success; however, the findings suggested that success was not only tied to this buy-in alone, but also to the organisation s ability to retain these members for the duration of the project. The research proposed the use of a newly developed tool within the new framework, as an approach to reduce the time it takes to undertake traditional social network analysis of the organisation, as it became clear that there was a need for a method of producing updated results of the SNA, which would span the length of long projects within organisations with significantly high staff turn-over rates. Privacy was given as a factor to consider the in literature; however, the findings from this study indicated that a majority of the participants were comfortable with the system. Email knowledge extraction, and email social network systems are not new concepts, however this research presents EKESNA; a novel tool that combines both concepts in a way that allows for the continuous discovery, visualisation, and analysis of knowledge networks around specified topics of interest within an organisation; linking conversations to specific expert knowledge. EKESNA s continuous discovery of the organisation s knowledge network affords members up-to-date data to inform business process reengineering. This is a potentially ground breaking new tool that has the possibility of transforming the KM landscape in NSOs as well as a whole range of other kinds of enterprises.
APA, Harvard, Vancouver, ISO, and other styles
50

Andersson, Julia, and Kristoffer Sandberg. "Potential Pitfalls in the Implementation Process of an Information System : A Framework for Identifying Pitfalls for Companies in the Startup Phase Aiming to Implement an Information System." Thesis, Linköpings universitet, Interaktiva och kognitiva system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176359.

Full text
Abstract:
Although many information system (IS) implementations are considered to have the resources necessary to be successful, they often fail. This is especially challenging for small IS providers who lack a proven process for gaining willingness to use and onboard a new customer. Hence, there is a need to develop a framework to identify potential pitfalls in such implementation matters, from designing the system until successfully onboarded customers. This paper aims to target this issue and proposes a framework for identifying common pitfalls during the implementation process of an IT system. Moreover, this paper applies the framework to an IS provider in the start-up phase by focusing on the system user. With the support of the framework and based on the company's context, this paper presents identified pitfalls and suggestions for actions that the IS provider can take to avoid them. IS models are selected and applied considering the company's needs and previous literature. The IS models considered are Value Network Analysis (VNA), Extended Technology Acceptance Model (TAM2), and Theory of Planned Behavior (TPB). As a result, seven pitfalls are identified considering organizational culture and leading change, user resistance, complexity, mandatory reliance, value demonstration, experience and control, and weak links.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography