Dissertations / Theses on the topic 'Network forensic framework analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Network forensic framework analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Fairbanks, Kevin D. "Forensic framework for honeypot analysis." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33977.
Full textPluskal, Jan. "Framework for Captured Network Communication Processing." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-413326.
Full textSenthivel, Saranyan. "Automatic Forensic Analysis of PCCC Network Traffic Log." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2394.
Full textvan, den Berg Jelle, and Filip Lagerholm. "Forensic Analysis of the Nintendo Switch." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42451.
Full textRajasekaran, Sathya Dev Squicciarini Anna C. Metzner John J. "Social network risk analysis and privacy framework." [University Park, Pa.] : Pennsylvania State University, 2009. http://etda.libraries.psu.edu/theses/approved/WorldWideIndex/ETD-4812/index.html.
Full textSaltaformaggio, Brendan D. "Forensic Carving of Wireless Network Information from the Android Linux Kernel." ScholarWorks@UNO, 2012. http://scholarworks.uno.edu/honors_theses/20.
Full textAkkaya, Deniz, and Fabien Thalgott. "Honeypots in network security." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600.
Full textDay by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. However, while performingall these things, how many people know about security? Do they know the risk of beingattacked, infecting by malicious software? Even some of the malicious software arespreading over network to create more threats by users. How many users are aware of thattheir computer may be used as zombie computers to target other victim systems? Astechnology is growing rapidly, newer attacks are appearing. Security is a key point to getover all these problems. In this thesis, we will make a real life scenario, using honeypots.Honeypot is a well designed system that attracts hackers into it. By luring the hackerinto the system, it is possible to monitor the processes that are started and running on thesystem by hacker. In other words, honeypot is a trap machine which looks like a realsystem in order to attract the attacker. The aim of the honeypot is analyzing, understanding,watching and tracking hacker’s behaviours in order to create more secure systems.Honeypot is great way to improve network security administrators’ knowledge and learnhow to get information from a victim system using forensic tools. Honeypot is also veryuseful for future threats to keep track of new technology attacks.
Moe, Lwin P. "Cyber security risk analysis framework : network traffic anomaly detection." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118536.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 84-86).
Cybersecurity is a growing research area with direct commercial impact to organizations and companies in every industry. With all other technological advancements in the Internet of Things (IoT), mobile devices, cloud computing, 5G network, and artificial intelligence, the need for cybersecurity is more critical than ever before. These technologies drive the need for tighter cybersecurity implementations, while at the same time act as enablers to provide more advanced security solutions. This paper will discuss a framework that can predict cybersecurity risk by identifying normal network behavior and detect network traffic anomalies. Our research focuses on the analysis of the historical network traffic data to identify network usage trends and security vulnerabilities. Specifically, this thesis will focus on multiple components of the data analytics platform. It explores the big data platform architecture, and data ingestion, analysis, and engineering processes. The experiments were conducted utilizing various time series algorithms (Seasonal ETS, Seasonal ARIMA, TBATS, Double-Seasonal Holt-Winters, and Ensemble methods) and Long Short-Term Memory Recurrent Neural Network algorithm. Upon creating the baselines and forecasting network traffic trends, the anomaly detection algorithm was implemented using specific thresholds to detect network traffic trends that show significant variation from the baseline. Lastly, the network traffic data was analyzed and forecasted in various dimensions: total volume, source vs. destination volume, protocol, port, machine, geography, and network structure and pattern. The experiments were conducted with multiple approaches to get more insights into the network patterns and traffic trends to detect anomalies.
by Lwin P. Moe.
S.M. in Engineering and Management
Mallek, Sabrine. "Social Network Analysis : Link prediction under the Belief Function Framework." Thesis, Artois, 2018. http://www.theses.fr/2018ARTO0204/document.
Full textSocial networks are large structures that depict social linkage between millions of actors. Social network analysis came out as a tool to study and monitor the patterning of such structures. One of the most important challenges in social network analysis is the link prediction problem. Link prediction investigates the potential existence of new associations among unlinked social entities. Most link prediction approaches focus on a single source of information, i.e. network topology (e.g. node neighborhood) assuming social data to be fully trustworthy. Yet, such data are usually noisy, missing and prone to observation errors causing distortions and likely inaccurate results. Thus, this thesis proposes to handle the link prediction problem under uncertainty. First, two new graph-based models for uniplex and multiplex social networks are introduced to address uncertainty in social data. The handled uncertainty appears at the links level and is represented and managed through the belief function theory framework. Next, we present eight link prediction methods using belief functions based on different sources of information in uniplex and multiplex social networks. Our proposals build upon the available information in data about the social network. We combine structural information to social circles information and node attributes along with supervised learning to predict new links. Tests are performed to validate the feasibility and the interest of our link prediction approaches compared to the ones from literature. Obtained results on social data from real-world demonstrate that our proposals are relevant and valid in the link prediction context
Padbidri, Jagan Mohan. "A network-cell based framework for multiscale analysis of granular materials." Pullman, Wash. : Washington State University, 2010. http://www.dissertations.wsu.edu/Dissertations/Spring2010/j_padbidri_041510.pdf.
Full textXu, Fang Yuan. "Smart grid framework analysis and artificial neutral network in load forecast." Thesis, City, University of London, 2011. http://openaccess.city.ac.uk/19752/.
Full textEl-Shehaly, Mai Hassan. "A Visualization Framework for SiLK Data exploration and Scan Detection." Thesis, Virginia Tech, 2009. http://hdl.handle.net/10919/34606.
Full textMaster of Science
Lee, Christopher Patrick. "Framework for botnet emulation and analysis." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28191.
Full textCommittee Chair: Copeland, John; Committee Member: Durgin, Gregory; Committee Member: Goodman, Seymour; Committee Member: Owen, Henry; Committee Member: Riley, George.
Gorbett, Gregory Edward. "Development and Assessment of a Decision Support Framework for Enhancing the Forensic Analysis and Interpretation of Fire Patterns." Digital WPI, 2015. https://digitalcommons.wpi.edu/etd-dissertations/462.
Full textIsaacs, Andrew C. "Siting and sizing of embedded generators : a Jamaican network analysis." Thesis, University of Bath, 2011. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.557791.
Full textSmith, Eugene Herbie. "An analytical framework for monitoring and optimizing bank branch network efficiency / E.H. Smith." Thesis, North-West University, 2009. http://hdl.handle.net/10394/5029.
Full textThesis (M.Com. (Computer Science))--North-West University, Potchefstroom Campus, 2010.
SANTANA, Alixandre Thiago Ferreira de. "Enterprise architecture analysis based on network paradigm: a framework proposal and empirical evaluation." Universidade Federal de Pernambuco, 2017. https://repositorio.ufpe.br/handle/123456789/25224.
Full textApproved for entry into archive by Alice Araujo (alice.caraujo@ufpe.br) on 2018-07-26T21:34:30Z (GMT) No. of bitstreams: 2 license_rdf: 811 bytes, checksum: e39d27027a6cc9cb039ad269a5db8e34 (MD5) TESE Alixandre Thiago Ferreira de Santana.pdf: 11775779 bytes, checksum: c96584c019fac4d26f44797654fcb6e3 (MD5)
Made available in DSpace on 2018-07-26T21:34:30Z (GMT). No. of bitstreams: 2 license_rdf: 811 bytes, checksum: e39d27027a6cc9cb039ad269a5db8e34 (MD5) TESE Alixandre Thiago Ferreira de Santana.pdf: 11775779 bytes, checksum: c96584c019fac4d26f44797654fcb6e3 (MD5) Previous issue date: 2017-02-15
CAPES
While the literature on Enterprise Architecture (EA) models, frameworks, and methodologies for EA implementation has many exemplars, the field is still missing mechanisms of EA analysis. EA analysis is the process which uses any technique or method to extract information from EA models about a particular concern, in order to support EA management by the experts or inform stakeholders. In this thesis, we model the EA as a complex network, a concept discussed in network science, to analyze EA structural aspects. During our exploratory study about EA network analysis (EANA), it was clear that the field was still lacking foundational aspects. First, no common language was shared by researchers. Secondly, there was no clarity about what concerns could be analyzed with network analysis initiatives and thirdly, the techniques and methods´ implementation were not clear in the papers. We solve those gaps in order to describe how to perform analysis of EA components and their relationships supported by network measures. The research approach comprehends qualitative methods such as systematic literature review, thematic analysis and design science research method. The research is conducted in three complementary and interrelated phases, aiming at first, to collect and synthesize the available knowledge about the analysis approaches existent in the literature. Next, we aim to trace a comprehensive understanding of the main concepts involved in EANA such as their analysis concerns, modeling decisions, inputs required and steps necessary to perform it. Altogether, this resulted in a set of six proposed artifacts: EANA meta-model, EANA library, EANA process, EANA data derivation strategy. Finally, we investigate the use of those artifacts, evaluating them empirically through their instantiations and/ or with the help of EA experts of three German multinational companies. The evaluation results were positive regarding, among other criteria, the efficacy and utility of the proposed artifacts in their respective contexts. As contributions, we claim the definition of the conceptual foundations of the EANA research field. Complementary, the study is not limited to the theoretical findings since it advances the understanding of empirical network analysis, whereas it offers a library of analysis initiatives, methods to derive EA data and guidelines to help experts through the analysis process (EANA process). Finally, we also add to the EANA knowledge base two new EANA methods which were also empirically evaluated. We expect that results can enhance the awareness researchers and practitioners about the EA network-based analysis´ efficacy and utility, a step necessary to develop more rationally grounded methods and tools to support the EA management considering structural aspects.
técnicas ou métodos para extrair informações arquiteturais sobre um aspecto de interesse sobre a AE, a partir de modelos, e com o objetivo de dar suporte aos especialistas no gerenciamento da AE ou ainda pra informar seus stakeholders. Nesta tese, a AE é modelada como uma rede complexa, um conceito originário da teoria de redes, com o objetivo de analisar aspectos estruturais de AE. Durante o estudo exploratório sobre a análise de redes aplicada ao contexto de AE, constatamos a ausência de fundamentos conceituais básicos como, por exemplo, um nivelamento conceitual entre os autores dos trabalhos; desconhecimento sobre a abrangência dos estudos de análise estrutural no contexto de AE e finalmente, carência de informação acerca do processo de análise estrutural realizado nos trabalhos. Nosso objetivo principal na tese é investigar como as métricas e métodos de análise de redes podem sem aplicados no contexto de análise de AE. Métodos qualitativos de pesquisa como revisão sistemática de literatura, análise temática e design science research foram utilizados em três fases complementares e inter-relacionadas. Primeiramente, para coletar e consolidar o conhecimento sobre abordagens de análise de AE existentes na literatura. Numa segunda etapa, o objetivo foi traçar um entendimento abrangente sobre os principais conceitos envolvidos na análise estrutural de AE, mapeando seus métodos e técnicas utilizados, culminando com o design de quatro artefatos propostos: um meta-modelo para análise de redes no contexto de AE; uma biblioteca reunindo as iniciativas de análise extraídas dos artigos; um processo de análise de redes para AE e uma estratégia para derivação de dados. Na terceira e última etapa, investigou-se o uso dos artefatos avaliando-os empiricamente por meio de suas instanciações e da opinião de especialistas em AE de três organizações multinacionais alemãs. Os resultados foram positivos considerando, dentre outros critérios, a eficácia e utilidade dos artefatos propostos nos seus respectivos contextos. Como contribuições, esta pesquisa define os conceitos fundamentais para análise de redes em AE, além de avançar no entendimento acerca da análise empírica de redes naquele contexto, uma vez que apresenta um catálogo de métricas e métodos para derivação de dados, além de um processo para auxiliar os especialistas ao longo da execução da análise. Finalmente, a pesquisa também contribui para a base de conhecimento com dois métodos de análise validados também empiricamente. Com base nos resultados, espera-se corroborar o potencial da análise de AE baseada em redes, sua eficácia e utilidade para pesquisadores e práticos, além de estimular a adoção e desenvolvimento de ferramental para suportar o gerenciamento de AE, considerando seus aspectos estruturais.
Ahmed, Karim H. H. "A decision support framework for sustainable supply chain management." Thesis, Loughborough University, 2017. https://dspace.lboro.ac.uk/2134/27611.
Full textNagi, Mohamad. "Integrating Network Analysis and Data Mining Techniques into Effective Framework for Web Mining and Recommendation. A Framework for Web Mining and Recommendation." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/14200.
Full textAkbar, Ghanadian Sara. "A Framework Based on Social Network Analysis (SNA) to Evaluate Facilities and Alternative Network Designs for Closed Loop Supply Chains." Ohio University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1596583638602018.
Full textBotero, Oscar. "Heterogeneous RFID framework design, analysis and evaluation." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00714120.
Full textMadduri, Kamesh. "A high-performance framework for analyzing massive complex networks." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24712.
Full textCommittee Chair: Bader, David; Committee Member: Berry, Jonathan; Committee Member: Fujimoto, Richard; Committee Member: Saini, Subhash; Committee Member: Vuduc, Richard
Eryol, Erkin. "Probabilistic Latent Semantic Analysis Based Framework For Hybrid Social Recommender Systems." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/2/12611921/index.pdf.
Full textGraversen, Therese. "Statistical and computational methodology for the analysis of forensic DNA mixtures with artefacts." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:4c3bfc88-25e7-4c5b-968f-10a35f5b82b0.
Full textWu, Sichao. "Computational Framework for Uncertainty Quantification, Sensitivity Analysis and Experimental Design of Network-based Computer Simulation Models." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/78764.
Full textPh. D.
Perez, Fridrich Shane. "A Framework for the Performance Analysis and Tuning of Virtual Private Networks." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6867.
Full textMüller-Prothmann, Tobias. "Leveraging knowledge communication for innovation framework, methods and applications of social network analysis in research and development /." [S.l.] : [s.n.], 2006. http://www.diss.fu-berlin.de/2006/596/index.html.
Full textCiszek, Thomas. "A Framework for the Development of Social Linking Theory." Thesis, School of Information and Library Science, 2005. http://hdl.handle.net/1901/237.
Full textJiang, Shan. "Statistical Modeling of Multi-Dimensional Knowledge Diffusion Networks: An ERGM-Based Framework." Diss., The University of Arizona, 2015. http://hdl.handle.net/10150/555946.
Full textKausar, Rukhsana [Verfasser], and Stephan [Akademischer Betreuer] Trenn. "Analysis and modeling of water distribution network in the framework of switched DAEs / Rukhsana Kausar ; Betreuer: Stephan Trenn." Kaiserslautern : Technische Universität Kaiserslautern, 2019. http://d-nb.info/1193491517/34.
Full textWang, Hantao. "Analyzing YouTube Content Demand Patternsand Cacheabilityin a Swedish Municipal Network." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119775.
Full textJurinek, Róbert. "Forenzní analýza síťového připojení v OS Linux." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2014. http://www.nusl.cz/ntk/nusl-232875.
Full textZhang, Jianzhe. "Development of an Apache Spark-Based Framework for Processing and Analyzing Neuroscience Big Data: Application in Epilepsy Using EEG Signal Data." Case Western Reserve University School of Graduate Studies / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=case1597089028333942.
Full textLeichtnam, Laetitia. "Detecting and visualizing anomalies in heterogeneous network events : Modeling events as graph structures and detecting communities and novelties with machine learning." Thesis, CentraleSupélec, 2020. http://www.theses.fr/2020CSUP0011.
Full textThe general objective of this thesis is to evaluate the interest of graph structures in the field of security data analysis.We propose an end-to-end approach consisting in a unified view of the network data in the form of graphs, a community discovery system, an unsupervised anomaly detection system, and a visualization of the data in the form of graphs. The unified view is obtained using knowledge graphs to represent heterogeneous log files and network traffics. Community detection allows us to select sub-graphs representing events that are strongly related to an alert or an IoC and that are thus relevant for forensic analysis. Our anomaly-based intrusion detection system relies on novelty detection by an autoencoder and exhibits very good results on CICIDS 2017 and 2018 datasets. Finally, an immersive visualization of security data allows highlighting the relations between security elements and malicious events or IOCs. This gives the security analyst a good starting point to explore the data and reconstruct global attack scenarii
Abramic, Andrej. "ANALYSIS OF MONITORING NETWORK SPATIAL AND TEMPORAL REDUCTION AND THEIR CONSEQUENCES ON THE ECOLOGICAL CLASSIFICATION IN THE SCOPE OF WATER FRAME DIRECTIVE." Doctoral thesis, Universitat Politècnica de València, 2013. http://hdl.handle.net/10251/28851.
Full textAbramic, A. (2011). ANALYSIS OF MONITORING NETWORK SPATIAL AND TEMPORAL REDUCTION AND THEIR CONSEQUENCES ON THE ECOLOGICAL CLASSIFICATION IN THE SCOPE OF WATER FRAME DIRECTIVE [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/28851
Palancia
Munir, Rashid. "A Quantitative Security Assessment of Modern Cyber Attacks. A Framework for Quantifying Enterprise Security Risk Level Through System's Vulnerability Analysis by Detecting Known and Unknown Threats." Thesis, University of Bradford, 2014. http://hdl.handle.net/10454/14251.
Full textFrost, Per. "Utvärdering av den upplevda användbarheten hos CySeMoL och EAAT med hjälp av ramverk för ändamålet och ISO/IEC 25010:2011." Thesis, KTH, Industriella informations- och styrsystem, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-138576.
Full textWarshawsky, David. "A system of systems flexibility framework: A method for evaluating designs that are subjected to disruptions." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/54277.
Full textJung, Kyujin. "Sources of Organizational Resilience During the 2012 Korean Typhoons: an Institutional Collective Action Framework." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc801952/.
Full textNicoll, J. Ross. "A web-oriented framework for the development and deployment of academic facing administrative tools and services." Thesis, University of St Andrews, 2015. http://hdl.handle.net/10023/6857.
Full textSanchis, Cano Ángel. "Economic analysis of wireless sensor-based services in the framework of the Internet of Things. A game-theoretical approach." Doctoral thesis, Universitat Politècnica de València, 2018. http://hdl.handle.net/10251/102642.
Full textThe communications world is moving from a standalone devices scenario to a all-connected scenario known as Internet of Things (IoT), where billions of devices will be connected to the Internet through mobile and fixed networks. In this context, there are several challenges to face, from the development of new standards to the study of the economical viability of the different future scenarios. In this dissertation we have focused on the study of the economic viability of different scenarios using concepts of microeconomics, game theory, non-linear optimization, network economics and wireless networks. The dissertation analyzes the transition from a Human Type Communications (HTC) to a Machine Type Communications (MTC) centered network from an economic point of view. The first scenario is designed to focus on the first stages of the transition, where HTC and MTC traffic are served on a common network infrastructure. The second scenario analyzes the provision of connectivity service to MTC users using a dedicated network infrastructure, while the third stage is centered in the analysis of the provision of services based on the MTC data over the infrastructure studied in the previous scenario. Thanks to the analysis of all the scenarios we have observed that the transition from HTC users-centered networks to MTC networks is possible and that the provision of services in such scenarios is viable. In addition, we have observed that the behavior of the users is essential in order to determine the viability of a business model, and therefore, it is needed to study their behavior and preferences in depth in future studios. Specifically, the most relevant factors are the sensitivity of the users to the delay and to the amount of data gathered by the sensors. We also have observed that the differentiation of the traffic in categories improves the usage of the networks and allows to create new services thanks to the data that otherwise would not be used, improving the monetization of the infrastructure and the data. In addition, we have shown that the capacity provision is a valid mechanism for providers' profit optimization, as an alternative to the pricing mechanisms. Finally, it has been demonstrated that it is possible to create dedicated roles to offer IoT services in the telecommunications market, specifically, the IoT-SPs, which provide wireless-sensor-based services to the final users using a third party infrastructure. Summarizing, this dissertation tries to demonstrate the economic viability of the future IoT networks business models as well as the emergence of new business opportunities and roles in order to justify economically the development and implementation of the new technologies required to offer massive wireless access to machine devices.
El món de les telecomunicacions està canviant d'un escenari on únicament les persones estaven connectades a un model on pràcticament tots els dispositius i sensors es troben connectats, també conegut com a Internet de les Coses (IoT) , on milers de milions de dispositius es connectaran a Internet a través de connexions mòbils i xarxes fixes. En aquest context, hi ha molts reptes que superar, des del desenrotllament de nous estàndards de comunicació a l'estudi de la viabilitat econòmica dels possibles escenaris futurs. En aquesta tesi ens hem centrat en l'estudi de la viabilitat econòmica de diferents escenaris per mitjà de l'ús de conceptes de microeconomia, teoria de jocs, optimització no lineal, economia de xarxes i xarxes inalàmbriques. La tesi analitza la transició des de xarxes centrades en el servici de tràfic HTC a xarxes centrades en tràfic MTC des d'un punt de vista econòmic. El primer escenari ha sigut dissenyat per a centrar-se en les primeres etapes de la transició, en la que ambdós tipus de tràfic són servits davall la mateixa infraestructura de xarxa. En el segon escenari analitzem la següent etapa, en la que el servici als usuaris MTC es realitza per mitjà d'una infraestructura dedicada. Finalment, el tercer escenari analitza la provisió de servicis basats en MTC a usuaris finals, per mitjà de la infraestructura analitzada en l'escenari anterior. Als paràgrafs següents es descriu amb més detall cada escenari. Gràcies a l'anàlisi de tots els escenaris, hem observat que la transició de xarxes centrades en usuaris HTC a xarxes MTC és possible i que la provisió de servicis en tals escenaris és viable. A més a més, hem observat que el comportament dels usuaris és essencial per a determinar la viabilitat dels diferents models de negoci, i per tant, és necessari estudiar el comportament i les preferències dels usuaris en profunditat en estudis futurs. Específicament, els factors més rellevants són la sensibilitat dels usuaris al retard en les dades recopilats pels sensors i la quantitat dels mateixos. També hem observat que la diferenciació del tràfic en categories millora l'ús de les xarxes i permet crear nous servicis emprant dades que, d'una altra manera, no s'aprofitarien, la qual cosa ens permet millorar la monetització de la infraestructura. També hem demostrat que la provisió de capacitat és un mecanisme vàlid, alternatiu a la fixació de preus, per a l'optimització dels beneficis dels proveïdors de servici. Finalment, s'ha demostrat que és possible crear rols específics per a oferir servicis IoT en el mercat de les telecomunicacions, específicament, els IoT-SPs, que proporcionen servicis basats en sensors inalàmbrics utilitzant infraestructures d'accés de tercers i les seues pròpies xarxes de sensors. En resum, en aquesta tesi hem intentat demostrar la viabilitat econòmica de models de negoci basats en xarxes futures IoT, així com l'aparició de noves oportunitats i rols de negoci, la qual cosa ens permet justificar econòmicament el desenrotllament i la implementació de les tecnologies necessàries per a oferir servicis d'accés inalàmbric massiu a dispositius MTC.
Sanchis Cano, Á. (2018). Economic analysis of wireless sensor-based services in the framework of the Internet of Things. A game-theoretical approach [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/102642
TESIS
MORANDO, VERDIANA. "Evaluating the performance of policy networks: connecting theories to organizational praxis. A case study analysis in Lombardy Region to evaluate the performance of the integrated care network managing the patway of persons with Spinal Cord Injury." Doctoral thesis, Università Cattolica del Sacro Cuore, 2012. http://hdl.handle.net/10280/1512.
Full textExperimental case study design for the performance evaluation of health care public services. The thesis is broken down into two main parts: the first part deals with the performance framework construction wherein the international theoretical literature and experiences realized are retrieved and discussed. The second part deliveries an experimental case study design to validate the framework proposed. The case studies focuses on the integrated care pathway for persons whit spinal cord injury/dysfunction. The policy network sets out the Regional policy making and the unity of analysis is a Spinal Unit specialized centre. The framework proved to be consistent and adapted for evaluating policy network for integrated care.
Martinka, Jan. "Digitální forenzní věda a její aplikace při forenzním auditu účetnictví." Master's thesis, Vysoká škola ekonomická v Praze, 2015. http://www.nusl.cz/ntk/nusl-193055.
Full textWang, Zhonglin [Verfasser], Stefan W. [Akademischer Betreuer] Pickl, Stefan W. [Gutachter] Pickl, and Oliver [Gutachter] Rose. "Aggregation-based Decision Support Framework for Resilience Analysis of a Transportation Network / Zhonglin Wang ; Gutachter: Stefan W. Pickl, Oliver Rose ; Akademischer Betreuer: Stefan W. Pickl ; Universität der Bundeswehr München, Fakultät für Informatik." Neubiberg : Universitätsbibliothek der Universität der Bundeswehr München, 2021. http://d-nb.info/1237325641/34.
Full textGreenidge, Nicole. "An integrated national disaster risk reduction and climate change adaptation development investment framework for Barbados, a Small Island Developing State (SIDS)." Thesis, University of Manchester, 2018. https://www.research.manchester.ac.uk/portal/en/theses/an-integrated-national-disaster-risk-reduction-and-climate-change-adaptation-development-investment-framework-for-barbados-a-small-island-developing-state-sids(d6142c04-dff5-42a6-af91-b9e5b88f241d).html.
Full textWannack, Volker Verfasser], Gert [Akademischer Betreuer] [Brunekreeft, Stefan [Akademischer Betreuer] Kettemann, Dennis A. V. [Akademischer Betreuer] Dittrich, and Jörg [Akademischer Betreuer] Borrmann. "Quality Regulation for Monopolistic Electricity Distribution Network Companies: A Theoretical and Experimental Analysis within a Principal-Agent Framework / Volker Wannack. Betreuer: Gert Brunekreeft. Gutachter: Gert Brunekreeft ; Stefan Kettemann ; Dennis A. V. Dittrich ; Jörg Borrmann." Bremen : IRC-Library, Information Resource Center der Jacobs University Bremen, 2015. http://d-nb.info/1081255870/34.
Full textMora, Núñez Néstor. "A multi-fold assessment framework for virtualized collaborative and social learning scenarios." Doctoral thesis, Universitat Oberta de Catalunya, 2016. http://hdl.handle.net/10803/404535.
Full textProponemos un proceso de virtualización de sesiones colaborativas en directo a partir de foros de discusión y chats web con el objetivo de producir recursos de aprendizaje en línea interactivos para ser utilizados por los alumnos y generar un efecto positivo en la participación del alumno. Con el fin de mejorar aún más la implicación del aprendizaje, dotamos a nuestro proceso de virtualización de un marco de evaluación múltiple que proporciona la conciencia efectiva y la retroalimentación constructiva a los alumnos de la colaboración original con interacciones entre los miembros del grupo. La investigación presentada se centra en la evaluación electrónica de aprendizaje colaborativo y social y se extiende con analíticas de aprendizaje y técnicas de análisis de red social que son capaces de analizar y representar las interacciones cognitivas y sociales con sesiones de colaboración en vivo subyacentes.
We propose a virtualization process of live collaborative sessions from Web discussion forums and chats with the aim to produce interactive and attractive online learning resources to be used by learners, thus having a positive effect in learner engagement. In order to enhance further learning engagement, we endow our virtualization process with a multifold assessment framework that provides effective awareness and constructive feedback to learners from the original collaborative interactions among group members. The research presented focuses on e-assessment of collaborative and social learning and extends it with Learning Analytics and Social Network Analysis techniques that are able to analyse and represent cognitive and social interactions underlying live collaborative sessions.
Miles, Austin. "Changes in Social Networks and Narratives associated with Lake Erie Water Quality Management after the 2014 Toledo Water Crisis." The Ohio State University, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1593600584732076.
Full textOnojeharho, Ejovwoke. "Knowledge technologies process and cultures : improving information and knowledge sharing at the Amateur Swimming Association (ASA)." Thesis, Loughborough University, 2015. https://dspace.lboro.ac.uk/2134/19707.
Full textAndersson, Julia, and Kristoffer Sandberg. "Potential Pitfalls in the Implementation Process of an Information System : A Framework for Identifying Pitfalls for Companies in the Startup Phase Aiming to Implement an Information System." Thesis, Linköpings universitet, Interaktiva och kognitiva system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176359.
Full text