To see the other types of publications on this topic, follow the link: Network measures.

Dissertations / Theses on the topic 'Network measures'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Network measures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Traore, Abdoulaye S. "Mixed Network Interference Management with Multi-Distortion Measures." International Foundation for Telemetering, 2010. http://hdl.handle.net/10150/604294.

Full text
Abstract:
ITC/USA 2010 Conference Proceedings / The Forty-Sixth Annual International Telemetering Conference and Technical Exhibition / October 25-28, 2010 / Town and Country Resort & Convention Center, San Diego, California<br>This paper presents a methodology for the management of interference and spectrum for iNET. It anticipates a need for heavily loaded test environments with Test Articles (TAs) operating over the horizon. In such cases, it is anticipated that fixed and ad hoc networks will be employed, and where spectrum reuse and interference will limit performance. The methodology presented here
APA, Harvard, Vancouver, ISO, and other styles
2

Grando, Felipe. "Methods for the approximation of network centrality measures." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2018. http://hdl.handle.net/10183/186166.

Full text
Abstract:
Medidas de centralidades são um mecanismo importante para revelar informações vitais sobre redes complexas. No entanto, essas métricas exigem um alto custo computacional que prejudica a sua aplicação em grandes redes do mundo real. Em nosso estudo propomos e explicamos que através do uso de redes neurais artificiais podemos aplicar essas métricas em redes de tamanho arbitrário. Além disso, identificamos a melhor configuração e metodologia para otimizar a acurácia do aprendizado neural, além de apresentar uma maneira fácil de obter e gerar um número suficiente de dados de treinamento substancia
APA, Harvard, Vancouver, ISO, and other styles
3

Pellegrinet, Sarah <1988&gt. "Systemic Risk Measures and Connectedness: a network approach." Master's Degree Thesis, Università Ca' Foscari Venezia, 2015. http://hdl.handle.net/10579/6009.

Full text
Abstract:
The main objective of the thesis is the construction of a systemic risk indicator based on the dispersion of the risk measures of the individual institutions of the system. The thesis presents a brief introduction to the literature on systemic risk measures, focusing on the Marginal Expected Shortfall (MES) and the delta CoVaR, which consider not only the yield of an individual firm, but also the effect of its performance on the whole system, and on the connectedness measure between the financial institutions, which measures the relationship between the institutions. We apply the systemic risk
APA, Harvard, Vancouver, ISO, and other styles
4

Benbrook, Jimmie Glen 1943. "A SYSTEM ANALYSIS OF A MULTILEVEL SECURE LOCAL AREA NETWORK (COMPUTER)." Thesis, The University of Arizona, 1986. http://hdl.handle.net/10150/275531.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Hyoungshick. "Complex network analysis for secure and robust communications." Thesis, University of Cambridge, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.610134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fu, Zehua. "Confidence measures in deep neural network based stereo matching." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEC014.

Full text
Abstract:
Malgré des décennies d’amélioration depuis la première proposition de Barnard et Fischler, les approches d’appariement stéréo souffrent encore d’imprécision, notamment en présence d’occlusion, des conditions d’éclairage extrêmes et d’ambiguïté. Pour pallier ces imprécisions, de nombreuses méthodes, appelées mesures de confiance, ont été proposées permettant d’évaluer l’exactitude des appariements. Dans cette thèse, nous étudions les mesures de confiance de l’état de l’art et proposons deux mesures, à bases de réseaux neurones et d’apprentissage profond, permettant d’améliorer les performances
APA, Harvard, Vancouver, ISO, and other styles
7

Olsson, Eric J. "Literature survey on network concepts and measures to support research in network-centric operations." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FOlsson.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fuloria, Shailendra. "Robust security for the electricity network." Thesis, University of Cambridge, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.610100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Woldearegay, Yonas, and Oumar Traore. "Optimization of Nodes in Mixed Network Using Three Distance Measures." International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595764.

Full text
Abstract:
ITC/USA 2011 Conference Proceedings / The Forty-Seventh Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2011 / Bally's Las Vegas, Las Vegas, Nevada<br>This paper presents a method for the management of mixed networks as envisioned in future iNET applications and develops a scheme for global optimal performance for features that include signal to Noise Ratio (SNR), Quality of service (QoS), and Interference. This scheme demonstrates potential for significant enhancement of performance for dense traffic environments envisioned in future telemetry applicatio
APA, Harvard, Vancouver, ISO, and other styles
10

Mooi, Roderick David. "A model for security incident response in the South African National Research and Education network." Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/d1017598.

Full text
Abstract:
This dissertation addresses the problem of a lack of a formal incident response capability in the South African National Research and Education Network (SA NREN). While investigating alternatives it was found that no clear method exists to solve this problem. Therefore, a second problem is identified: the lack of a definitive method for establishing a Computer Security Incident Response Team (CSIRT) or Computer Emergency Response Team (CERT) in general. Solving the second problem is important as we then have a means of knowing how to start when building a CSIRT. This will set the basis for add
APA, Harvard, Vancouver, ISO, and other styles
11

Goyal, Ravi. "Estimating Network Features and Associated Measures of Uncertainty and Their Incorporation in Network Generation and Analysis." Thesis, Harvard University, 2012. http://dissertations.umi.com/gsas.harvard:10605.

Full text
Abstract:
The efficacy of interventions to control HIV spread depends upon many features of the communities where they are implemented, including not only prevalence, incidence, and per contact risk of transmission, but also properties of the sexual or transmission network. For this reason, HIV epidemic models have to take into account network properties including degree distribution and mixing patterns. The use of sampled data to estimate properties of a network is a common practice; however, current network generation methods do not account for the uncertainty in the estimates due to sampling. In chap
APA, Harvard, Vancouver, ISO, and other styles
12

Park, Yongro. "A statistical process control approach for network intrusion detection." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/6835.

Full text
Abstract:
Intrusion detection systems (IDS) have a vital role in protecting computer networks and information systems. In this thesis we applied an SPC monitoring concept to a certain type of traffic data in order to detect a network intrusion. We developed a general SPC intrusion detection approach and described it and the source and the preparation of data used in this thesis. We extracted sample data sets that represent various situations, calculated event intensities for each situation, and stored these sample data sets in the data repository for use in future research. A regular batch mean chart w
APA, Harvard, Vancouver, ISO, and other styles
13

Loutsios, Demetrios. "A holistic approach to network security in OGSA-based grid systems." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/550.

Full text
Abstract:
Grid computing technologies facilitate complex scientific collaborations between globally dispersed parties, which make use of heterogeneous technologies and computing systems. However, in recent years the commercial sector has developed a growing interest in Grid technologies. Prominent Grid researchers have predicted Grids will grow into the commercial mainstream, even though its origins were in scientific research. This is much the same way as the Internet started as a vehicle for research collaboration between universities and government institutions, and grew into a technology with large
APA, Harvard, Vancouver, ISO, and other styles
14

Aktop, Baris. "A framework for maximizing the survivability of network dependent services." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/02Mar%5FAktop.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Kobo, Hlabishi. "Situation-aware routing for wireless mesh networks with mobile nodes." Thesis, University of the Western Cape, 2012. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_6647_1370594682.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Kaiser, Edward Leo. "Addressing Automated Adversaries of Network Applications." PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/4.

Full text
Abstract:
The Internet supports a perpetually evolving patchwork of network services and applications. Popular applications include the World Wide Web, online commerce, online banking, email, instant messaging, multimedia streaming, and online video games. Practically all networked applications have a common objective: to directly or indirectly process requests generated by humans. Some users employ automation to establish an unfair advantage over non-automated users. The perceived and substantive damages that automated, adversarial users inflict on an application degrade its enjoyment and usability by
APA, Harvard, Vancouver, ISO, and other styles
17

Moyo, Norbert. "The potential network effects of travellers' responses to travel demand management measures." Thesis, University of Southampton, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.274449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Bränberg, Stefan. "Computing network centrality measures on fMRI data using fully weighted adjacency matrices." Thesis, Umeå universitet, Institutionen för datavetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-128177.

Full text
Abstract:
A lot of interesting research is currently being done in the field of neuroscience, a recent subject being the effort to analyse the the human brain connectome and its functional connectivity. One way this is done is by applying graph-theory based network analysis, such as centrality, on data from fMRI measurements. This involves creating a graph representation from a correlation matrix containing the correlations over time between all measured voxels. Since the input data can be very big, this results in computations that are too memory and time consuming for an ordinary computer. Researchers
APA, Harvard, Vancouver, ISO, and other styles
19

Signorelli, Camilo Miguel. "Theoretical models and measures of conscious brain network dynamics : an integrative approach." Doctoral thesis, TDX (Tesis Doctorals en Xarxa), 2021. http://hdl.handle.net/10803/671858.

Full text
Abstract:
En el área de la neurociencia de la conciencia, actualmente existe una tendencia de contrastar y comparar modelos de conciencia. Aunque la palabra final es empírica, esfuerzos teóricos son esenciales para poner en contexto tanto suposiciones conceptuales como resultados experimentales. Desde allí, podemos diseñar mejores pruebas y responder a la pregunta sobre que modelo es optimo. En esta dirección, esta tesis explora modelos y enfoques computacionales integrativos. El documento clasifica modelos científicos de conciencia de acuerdo a sus "perfiles explicativos". Resultados empíricos so
APA, Harvard, Vancouver, ISO, and other styles
20

Zhang, Junjie. "Effective and scalable botnet detection in network traffic." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44837.

Full text
Abstract:
Botnets represent one of the most serious threats against Internet security since they serve as platforms that are responsible for the vast majority of large-scale and coordinated cyber attacks, such as distributed denial of service, spamming, and information stolen. Detecting botnets is therefore of great importance and a number of network-based botnet detection systems have been proposed. However, as botnets perform attacks in an increasingly stealthy way and the volume of network traffic is rapidly growing, existing botnet detection systems are faced with significant challenges in terms of
APA, Harvard, Vancouver, ISO, and other styles
21

Shumaker, Todd, and Dennis Rowlands. "Risk assessment of the Naval Postgraduate School gigabit network." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1351.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>This research thoroughly examines the current Naval Postgraduate School Gigabit Network security posture, identifies any possible threats or vulnerabilities, and recommends any appropriate safeguards that may be necessary to counter the found threats and vulnerabilities. The research includes any portion of computer security, physical security, personnel security, and communication security that may be applicable to the overall security of both the .mil and .edu domains. The goal of the research was to ensure that the campus network is
APA, Harvard, Vancouver, ISO, and other styles
22

Astatke, Yacob. "Distance Measures for QOS Performance Management in Mixed Networks." International Foundation for Telemetering, 2008. http://hdl.handle.net/10150/606197.

Full text
Abstract:
ITC/USA 2008 Conference Proceedings / The Forty-Fourth Annual International Telemetering Conference and Technical Exhibition / October 27-30, 2008 / Town and Country Resort & Convention Center, San Diego, California<br>The integrated Network Enhanced Telemetry effort (iNET) was launched to create a telemetry network that will enhance the traditional point-to-point telemetry link from test articles (TAs) to ground stations (GS). Two of the critical needs identified by the Central Test and Evaluation Investment Program (CTEIP) are, "the need to be able to provide reliable coverage in potentially
APA, Harvard, Vancouver, ISO, and other styles
23

Martina, Jean Everson. "Verification of security protocols based on multicast communication." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609650.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Nath, Madhurima. "Application of Network Reliability to Analyze Diffusive Processes on Graph Dynamical Systems." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/86841.

Full text
Abstract:
Moore and Shannon's reliability polynomial can be used as a global statistic to explore the behavior of diffusive processes on a graph dynamical system representing a finite sized interacting system. It depends on both the network topology and the dynamics of the process and gives the probability that the system has a particular desired property. Due to the complexity involved in evaluating the exact network reliability, the problem has been classified as a NP-hard problem. The estimation of the reliability polynomials for large graphs is feasible using Monte Carlo simulations. However, the nu
APA, Harvard, Vancouver, ISO, and other styles
25

Srivatsa, Mudhakar. "Security Architecture and Protocols for Overlay Network Services." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16284.

Full text
Abstract:
Conventional wisdom suggests that in order to build a secure system, security must be an integral component in the system design. However, cost considerations drive most system designers to channel their efforts on the system's performance, scalability and usability. With little or no emphasis on security, such systems are vulnerable to a wide range of attacks that can potentially compromise confidentiality, integrity and availability of sensitive data. It is often cumbersome to redesign and implement massive systems with security as one of the primary design goals. This thesis advocates a pro
APA, Harvard, Vancouver, ISO, and other styles
26

Farquhar, MaryBeth Anne. "Actor Networks in Health Care: Translating Values into Measures of Hospital Performance." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/28312.

Full text
Abstract:
The health care system within the United States is in a state of transition. The industry, confronted with a variety of new technologies, new ways of organizing, spiraling costs, diminishing service quality and new actors, is changing, almost on a daily basis. Reports issued by the Institute of Medicine raise quality issues such as avoidable errors and underuse/overuse of services; other studies document regional variation in care. Improvement in the quality of care, according to health care experts is accomplished through measuring and comparing performance, but there are a number of dispa
APA, Harvard, Vancouver, ISO, and other styles
27

Chance, Christopher P. "Designing and implementing a network authentication service for providing a secure communication channel." Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Mantrach, Amin. "Novel measures on directed graphs and applications to large-scale within-network classification." Doctoral thesis, Universite Libre de Bruxelles, 2010. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210033.

Full text
Abstract:
Ces dernières années, les réseaux sont devenus une source importante d’informations dans différents domaines aussi variés que les sciences sociales, la physique ou les mathématiques. De plus, la taille de ces réseaux n’a cessé de grandir de manière conséquente. Ce constat a vu émerger de nouveaux défis, comme le besoin de mesures précises et intuitives pour caractériser et analyser ces réseaux de grandes tailles en un temps raisonnable.<p>La première partie de cette thèse introduit une nouvelle mesure de similarité entre deux noeuds d’un réseau dirigé et pondéré :la covariance “sum-over-paths”
APA, Harvard, Vancouver, ISO, and other styles
29

Stapelberg, Nicolas Jacques Christian. "Quantitative Relationships Between Clinical Measures Of Depression And Heart Rate Variability As Measured By Linear And Nonlinear Methods." Thesis, Griffith University, 2016. http://hdl.handle.net/10072/367151.

Full text
Abstract:
A relationship exists between mood and cardiac control systems. This relationship has been established through correlations between medical pathology, such as Coronary Heart Disease (CHD), and psychopathological changes in mood, such as Major Depressive Disorder (MDD). Euthymic mood and normal cardiac regulation, as well as the diseases MDD and CHD, are linked by numerous interrelated physiological pathways. These pathways form part of a physiological regulatory network in the body called the psycho-immune-neuroendocrine (PINE) network. PINE network homeostasis can be disrupted by stress, resu
APA, Harvard, Vancouver, ISO, and other styles
30

Yelne, Samir. "Measures of User Interactions, Conversations, and Attacks in a Crowdsourced Platform Offering Emotional Support." Wright State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=wright1482330888961028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Naude, Kevin Alexander. "A method for the evaluation of similarity measures on graphs and network-structured data." Thesis, Nelson Mandela Metropolitan University, 2014.

Find full text
Abstract:
Measures of similarity play a subtle but important role in a large number of disciplines. For example, a researcher in bioinformatics may devise a new computed measure of similarity between biological structures, and use its scores to infer bio-logical association. Other academics may use related approaches in structured text search, or for object recognition in computer vision. These are diverse and practical applications of similarity. A critical question is this: to what extent can a given similarity measure be trusted? This is a difficult problem, at the heart of which lies the broader iss
APA, Harvard, Vancouver, ISO, and other styles
32

Mjikeliso, Yolanda. "Guidelines to address the human factor in the South African National Research and Education Network beneficiary institutions." Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/9946.

Full text
Abstract:
Even if all the technical security solutions appropriate for an organisation’s network are implemented, for example, firewalls, antivirus programs and encryption, if the human factor is neglected then these technical security solutions will serve no purpose. The greatest challenge to network security is probably not the technological solutions that organisations invest in, but the human factor (non-technical solutions), which most organisations neglect. The human factor is often ignored even though humans are the most important resources of organisations and perform all the physical tasks, con
APA, Harvard, Vancouver, ISO, and other styles
33

Van, Heerden Renier Pelser. "A formalised ontology for network attack classification." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011603.

Full text
Abstract:
One of the most popular attack vectors against computers are their network connections. Attacks on computers through their networks are commonplace and have various levels of complexity. This research formally describes network-based computer attacks in the form of a story, formally and within an ontology. The ontology categorises network attacks where attack scenarios are the focal class. This class consists of: Denial-of- Service, Industrial Espionage, Web Defacement, Unauthorised Data Access, Financial Theft, Industrial Sabotage, Cyber-Warfare, Resource Theft, System Compromise, and Runaway
APA, Harvard, Vancouver, ISO, and other styles
34

Lim, Yu-Xi. "Secure Geolocation for Wireless Indoor Networks." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11454.

Full text
Abstract:
The objective of the research is to develop an accurate system for indoor location estimation using a secure architecture based on the IEEE 802.11 standard for infrastructure networks. Elements of this secure architecture include: server-oriented platform for greater trust and manageability; multiple wireless network parameters for improved accuracy; and Support Vector Regression (SVR) for accurate, high-resolution estimates. While these elements have been investigated individually in earlier research, none has combined them to a single security-oriented system. Thus this research investigates
APA, Harvard, Vancouver, ISO, and other styles
35

Baratz, Joshua W. (Joshua William) 1981. "Regions Security Policy (RSP) : applying regions to network security." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/17933.

Full text
Abstract:
Thesis (M. Eng. and S.B.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.<br>Includes bibliographical references (p. 51-54).<br>The Regions network architecture is a new look at network organization that groups nodes into regions based on common purposes. This shift from strict network topology groupings of nodes requires a change in security systems. This thesis designs and implements the Regions Security Policy (RSP). RSP allows a unified security policy to be set across a region, fully controlling data as it enters into, exits from, and tr
APA, Harvard, Vancouver, ISO, and other styles
36

Corte, Coi Claudio. "Network approaches for the analysis of resting state fMRI data." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10820/.

Full text
Abstract:
Negli ultimi anni la teoria dei network è stata applicata agli ambiti più diversi, mostrando proprietà caratterizzanti tutti i network reali. In questo lavoro abbiamo applicato gli strumenti della teoria dei network a dati cerebrali ottenuti tramite MRI funzionale “resting”, provenienti da due esperimenti. I dati di fMRI sono particolarmente adatti ad essere studiati tramite reti complesse, poiché in un esperimento si ottengono tipicamente più di centomila serie temporali per ogni individuo, da più di 100 valori ciascuna. I dati cerebrali negli umani sono molto variabili e ogni operazion
APA, Harvard, Vancouver, ISO, and other styles
37

Sung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.

Full text
Abstract:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2007.<br>Xu, Jun, Committee Chair ; Ahamad, Mustaque, Committee Member ; Ammar, Mostafa, Committee Member ; Bing, Benny, Committee Member ; Zegura, Ellen, Committee Member.
APA, Harvard, Vancouver, ISO, and other styles
38

Opie, Jake Weyman. "Securing softswitches from malicious attacks." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1007714.

Full text
Abstract:
Traditionally, real-time communication, such as voice calls, has run on separate, closed networks. Of all the limitations that these networks had, the ability of malicious attacks to cripple communication was not a crucial one. This situation has changed radically now that real-time communication and data have merged to share the same network. The objective of this project is to investigate the securing of softswitches with functionality similar to Private Branch Exchanges (PBX) from malicious attacks. The focus of the project will be a practical investigation of how to secure ILANGA, an ASTER
APA, Harvard, Vancouver, ISO, and other styles
39

Alfraidi, Hanadi Humoud A. "Interactive System for Scientific Publication Visualization and Similarity Measurement based on Citation Network." Thesis, Université d'Ottawa / University of Ottawa, 2015. http://hdl.handle.net/10393/33135.

Full text
Abstract:
Online scientific publications are becoming more and more popular. The number of publications we can access almost instantaneously is rapidly increasing. This makes it more challenging for researchers to pursue a topic, review literature, track research history or follow research trends. Using online resources such as search engines and digital libraries is helpful to find scientific publications, however most of the time the user ends up with an overwhelming amount of linear results to go through. This thesis proposes an alternative system, which takes advantage of citation/reference relation
APA, Harvard, Vancouver, ISO, and other styles
40

Abdullah, Kulsoom B. "Scaling and Visualizing Network Data to Facilitate in Intrusion Detection Tasks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/10509.

Full text
Abstract:
As the trend of successful network attacks continue to rise, better forms of intrusion, detection and prevention are needed. This thesis addresses network traffic visualization techniques that aid administrators in recognizing attacks. A view of port statistics and Intrusion Detection System (IDS) alerts has been developed. Each help to address issues with analyzing large datasets involving networks. Due to the amount of traffic as well as the range of possible port numbers and IP addresses, scaling techniques are necessary. A port-based overview of network activity produces an improved r
APA, Harvard, Vancouver, ISO, and other styles
41

Oh, Khoon Wee. "Wireless network security : design considerations for an enterprise network /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FOh.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Irwin, Barry Vivian William. "A framework for the application of network telescope sensors in a global IP network." Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1004835.

Full text
Abstract:
The use of Network Telescope systems has become increasingly popular amongst security researchers in recent years. This study provides a framework for the utilisation of this data. The research is based on a primary dataset of 40 million events spanning 50 months collected using a small (/24) passive network telescope located in African IP space. This research presents a number of differing ways in which the data can be analysed ranging from low level protocol based analysis to higher level analysis at the geopolitical and network topology level. Anomalous traffic and illustrative anecdotes ar
APA, Harvard, Vancouver, ISO, and other styles
43

Bonora, Filippo. "Dynamic networks, text analysis and Gephi: the art math." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2013. http://amslaurea.unibo.it/6327/.

Full text
Abstract:
In numerosi campi scientici l'analisi di network complessi ha portato molte recenti scoperte: in questa tesi abbiamo sperimentato questo approccio sul linguaggio umano, in particolare quello scritto, dove le parole non interagiscono in modo casuale. Abbiamo quindi inizialmente presentato misure capaci di estrapolare importanti strutture topologiche dai newtork linguistici(Degree, Strength, Entropia, . . .) ed esaminato il software usato per rappresentare e visualizzare i grafi (Gephi). In seguito abbiamo analizzato le differenti proprietà statistiche di uno stesso testo in varie sue forme (sh
APA, Harvard, Vancouver, ISO, and other styles
44

Bataineh, Mohammad Hindi. "Artificial neural network for studying human performance." Thesis, University of Iowa, 2012. https://ir.uiowa.edu/etd/3259.

Full text
Abstract:
The vast majority of products and processes in industry and academia require human interaction. Thus, digital human models (DHMs) are becoming critical for improved designs, injury prevention, and a better understanding of human behavior. Although many capabilities in the DHM field continue to mature, there are still many opportunities for improvement, especially with respect to posture- and motion-prediction. Thus, this thesis investigates the use of artificial neural network (ANN) for improving predictive capabilities and for better understanding how and why human behave the way they do. Wit
APA, Harvard, Vancouver, ISO, and other styles
45

Morissette, Laurence. "Auditory Object Segregation: Investigation Using Computer Modelling and Empirical Event-Related Potential Measures." Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/37856.

Full text
Abstract:
There are multiple factors that influence auditory steaming. Some, like frequency separation or rate of presentation, have effects that are well understood while others remain contentious. Human behavioural studies and event-related potential (ERP) studies have shown dissociation between a pre-attentive sound segregation process and an attention-dependent process in forming perceptual objects and streams. This thesis first presents a model that synthetises the processes involved in auditory object creation. It includes sensory feature extraction based on research by Bregman (1990), sensory fea
APA, Harvard, Vancouver, ISO, and other styles
46

Wu, Gang Mechanical &amp Manufacturing Engineering Faculty of Engineering UNSW. "The impact of inter-company network technology on correlations between supply chain drivers and performance measures." Publisher:University of New South Wales. Mechanical & Manufacturing Engineering, 2009. http://handle.unsw.edu.au/1959.4/43645.

Full text
Abstract:
This research aims to examine how, and to what extent, the advanced network technology such as custom-built large-scale network, or internet-based technology contribute to the correlations between supply chain drivers and performance measures. The uniqueness of the research is to use network technology as a leverage factor, instead of merely one of the supply chain drivers, to analyse how it would impact on the correlations between supply chain drivers and performance measures. Through literature review, we identified the key drivers in supply chain and the key performance indicators as indep
APA, Harvard, Vancouver, ISO, and other styles
47

Scheepers, Christiaan Frederick. "Implementing energy efficiency measures on the compressed air network of old South African mines / Scheepers C.F." Thesis, North-West University, 2011. http://hdl.handle.net/10394/7569.

Full text
Abstract:
anthracite with the highest fixed carbon and lowest ash contents exhibited the smallest shrinkage during in situ TMA calcination. High fixed carbon, low ash type anthracites are therefore less prone to dimensional instabilities in Soderberg electrodes, as a result of poor calcination. The dimensional changes observed in the calcined anthracites were very similar to those observed for the electrode graphite samples. The expansions/shrinkages observed in the graphite samples were mostly less than 0.5%, whereas the expansions/shrinkages observed in the various calcined anthracites were approximat
APA, Harvard, Vancouver, ISO, and other styles
48

Shatnawi, Ibrahem Mahmoud. "Automated Vehicle Delay and Travel Time Estimation Techniques for Improved Performance Measures of Urban Network System." University of Akron / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=akron1446473677.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

PEDIO, MANUELA. "Essays on the Time Series and Cross-Sectional Predictive Power of Network-Based Volatility Spillover Measures." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2021. http://hdl.handle.net/10281/305198.

Full text
Abstract:
• Questa tesi include due saggi che sono dedicati allo studio delle serie temporali e del potere predittivo a livello di cross-section di un indice di spillover di volatilità di nuova concezione basato sulle volatilità implicite delle opzioni. Nel primo saggio, ci concentriamo sulla stima dell'indice e sulla valutazione se i (cambiamenti nell'indice) possono prevedere i rendimenti in eccesso delle serie temporali di (un insieme di) singoli titoli e dello S&P 500. Si confronta il potere predittivo in-sample e out-of-sample di questo indice con quello dell'indice di spillover di volatilità propo
APA, Harvard, Vancouver, ISO, and other styles
50

De, Bruyn Daniel Nicholas. "Investigation and development of a system for secure synchronisation in a wireless mesh network." Thesis, [Bloemfontein?] : Central University of Technology, Free State, 2010. http://hdl.handle.net/11462/132.

Full text
Abstract:
Thesis (M. Tech.(Electrical Engineering)) -- Central University of technology, Free State, 2010<br>This dissertation gives an overview of the research done in developing a protocol to synchronise information in a secure wireless mesh network. Alternative methods to control wireless devices were investigated in the non-controlled frequency spectrum. The aim of the research was to develop a protocol that can be loaded on a micro-controller with limited intelligence, controlling endpoints. The protocol minimises human interference and automatically negotiates which device becomes the master c
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!