To see the other types of publications on this topic, follow the link: Online Intrusion.

Dissertations / Theses on the topic 'Online Intrusion'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 16 dissertations / theses for your research on the topic 'Online Intrusion.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Ahmed, Abdulbasit. "Online network intrusion detection system using temporal logic and stream data processing." Thesis, University of Liverpool, 2013. http://livrepository.liverpool.ac.uk/12153/.

Full text
Abstract:
These days, the world is becoming more interconnected, and the Internet has dominated the ways to communicate or to do business. Network security measures must be taken to protect the organization environment. Among these security measures are the intrusion detection systems. These systems aim to detect the actions that attempt to compromise the confidentiality, availability, and integrity of a resource by monitoring the events occurring in computer systems and/or networks. The increasing amounts of data that are transmitted at higher and higher speed networks created a challenging problem for
APA, Harvard, Vancouver, ISO, and other styles
2

Shafi, Kamran Information Technology &amp Electrical Engineering Australian Defence Force Academy UNSW. "An online and adaptive signature-based approach for intrusion detection using learning classifier systems." Awarded by:University of New South Wales - Australian Defence Force Academy, 2008. http://handle.unsw.edu.au/1959.4/38991.

Full text
Abstract:
This thesis presents the case of dynamically and adaptively learning signatures for network intrusion detection using genetic based machine learning techniques. The two major criticisms of the signature based intrusion detection systems are their i) reliance on domain experts to handcraft intrusion signatures and ii) inability to detect previously unknown attacks or the attacks for which no signatures are available at the time. In this thesis, we present a biologically-inspired computational approach to address these two issues. This is done by adaptively learning maximally general rules, whic
APA, Harvard, Vancouver, ISO, and other styles
3

Al, Rawashdeh Khaled. "Toward a Hardware-assisted Online Intrusion Detection System Based on Deep Learning Algorithms for Resource-Limited Embedded Systems." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535464571843315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Norton, Aaron Michael. "Technology mediated communication in intimate relationships." Diss., Kansas State University, 2014. http://hdl.handle.net/2097/18126.

Full text
Abstract:
Doctor of Philosophy<br>Department of Family Studies and Human Services<br>Joyce Baptist<br>Very little research has been conducted to understand how the technology revolution has changed and impacted couple relationships. The proposed study examined the impact of technology on couples in committed relationships through the lens of the couple and technology framework. Specifically, this study used data from 2,826 European couples to examine associations between online boundary crossing, online intrusion, relationship satisfaction, and partner responsiveness. The results suggest that when parti
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Bo. "Byzantine Fault Tolerance for Nondeterministic Applications." Cleveland State University / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=csu1231600826.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Damour, Gabriel. "Information-Theoretic Framework for Network Anomaly Detection: Enabling online application of statistical learning models to high-speed traffic." Thesis, KTH, Matematisk statistik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-252560.

Full text
Abstract:
With the current proliferation of cyber attacks, safeguarding internet facing assets from network intrusions, is becoming a vital task in our increasingly digitalised economies. Although recent successes of machine learning (ML) models bode the dawn of a new generation of intrusion detection systems (IDS); current solutions struggle to implement these in an efficient manner, leaving many IDSs to rely on rule-based techniques. In this paper we begin by reviewing the different approaches to feature construction and attack source identification employed in such applications. We refer to these ste
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Dae Wook. "Data-Driven Network-Centric Threat Assessment." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1495191891086814.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wallin, Clas, and Sara Wisseng. "Konsten att förmedla online-annonser : En studie om vilken typ av online-annonser som används för att nå ut till internetanvändare på ett mindre påträngande sätt." Thesis, Södertörns högskola, Institutionen för samhällsvetenskaper, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-31873.

Full text
Abstract:
Påträngande och störande annonser har blivit alltmer vanligt på internet vilket har medfört att konsumenter fått en alltmer negativ inställning till online-annonser. Därmed har användningen av mjukvaror för blockering av annonser på senare tid blivit alltmer vanligt. Detta har medfört minskningar i reklamintäkter för företag som använder sig av webbaserad marknadsföring, vilket har lagt för handen att de måste anpassa sina online-annonser till konsumenten för att kunna hålla verksamheten lönsam. Syftet med denna studie är att undersöka vilken typ av online-annonser som används för att nå ut ti
APA, Harvard, Vancouver, ISO, and other styles
9

Tokunaga, Robert S. "Cyber-intrusions : strategies of coping with online obsessive relational intrusion." Thesis, 2007. http://hdl.handle.net/10125/20905.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ribeiro, Tiago Miguel Pereira. "Online Machine Learning-enabled Network Intrusion Detection." Dissertação, 2021. https://hdl.handle.net/10216/134763.

Full text
Abstract:
Machine Learning (ML) is seeing growing usage on Network Intrusion Detection Systems (NIDS) and allowing for an early detection of novel attacks, a prime example of how this technology may be applied to the field of cybersecurity. However, computational requirements associated with ML might make it difficult to process traffic in real time, particularly when dealing with a large volume of data or a high throughput connection, undermining the NIDS' usefulness or its detection capabilities. The goal of this dissertation is to implement an IDS capable of detecting malware command and control traf
APA, Harvard, Vancouver, ISO, and other styles
11

Ribeiro, Tiago Miguel Pereira. "Online Machine Learning-enabled Network Intrusion Detection." Master's thesis, 2021. https://hdl.handle.net/10216/134763.

Full text
Abstract:
Machine Learning (ML) is seeing growing usage on Network Intrusion Detection Systems (NIDS) and allowing for an early detection of novel attacks, a prime example of how this technology may be applied to the field of cybersecurity. However, computational requirements associated with ML might make it difficult to process traffic in real time, particularly when dealing with a large volume of data or a high throughput connection, undermining the NIDS' usefulness or its detection capabilities. The goal of this dissertation is to implement an IDS capable of detecting malware command and control traf
APA, Harvard, Vancouver, ISO, and other styles
12

Wang, Hongrui. "Online intrusion detection design and implementation for SCADA networks." Thesis, 2017. http://hdl.handle.net/1828/7984.

Full text
Abstract:
The standardization and interconnection of supervisory control and data acquisition (SCADA) systems has exposed the systems to cyber attacks. To improve the security of the SCADA systems, intrusion detection system (IDS) design is an effective method. However, traditional IDS design in the industrial networks mainly exploits the prede fined rules, which needs to be complemented and developed to adapt to the big data scenario. Therefore, this thesis aims to design an anomaly-based novel hierarchical online intrusion detection system (HOIDS) for SCADA networks based on machine learning algorith
APA, Harvard, Vancouver, ISO, and other styles
13

Martins, Alexandre dos Santos. "A new method for non-intrusive online wiring health monitoring." Master's thesis, 2015. http://hdl.handle.net/10400.26/11966.

Full text
Abstract:
This work presents a method for preventing faults in cables prior to their happening, e.g. due to wire ageing and mounting xtures. The proposed method focus in large diameter cables delivering high currents in aircraft. However, this method could be useful in other scenarios where wiring problems could cause critical problems such as in nuclear power plants, automobiles or trains. The method consists of a sensor embedded in the cable. The sensor is made of several thin wires wrapped around the insulator of the monitoring cable in a mesh grid pattern. The cable with the embedded sensor
APA, Harvard, Vancouver, ISO, and other styles
14

Chen, Hung-Wei, and 陳弘偉. "Understanding Online Intrusive Advertising: Antecedents and Consequences of Cognitive Engagement." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/5m8vps.

Full text
Abstract:
碩士<br>國立臺北大學<br>企業管理學系<br>102<br>How to improve ad effectiveness while reducing ad intrusiveness is an important issue. This study investigates the effects of the phases of a browsing path, relatedness between episodes and information type on a viewer’s cognitive engagement in webpage content on the basis of the attention inertia theory. This study also examines the relationship between cognitive engagement and ad intrusiveness. As a website viewer generates attention inertia and highly engages in webpage content the cognitive processing is intensified. We posit that the interruption of a view
APA, Harvard, Vancouver, ISO, and other styles
15

Tsai, Jui-Lun, and 蔡睿倫. "Understanding Online Intrusive Video Advertising: Antecedents and Consequences of Cognitive Absorption in Video Scenarios." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/fwvrbk.

Full text
Abstract:
碩士<br>國立臺北大學<br>企業管理學系<br>103<br>Improving ad effectiveness and reducing ad intrusiveness is an essential issue for online advertising. This study investigates the antecedents of cognitive absorption in online video environment and understands the effect of cognitive absorption on the viewer’ attitude toward the video advertising. The study examines the effects of relevance of content, balance between skill and challenge, interestingness, and relatedness between episodes on video viewers’ cognitive absorption on the basis of cognitive absorption theory and the inter-related theories: visual se
APA, Harvard, Vancouver, ISO, and other styles
16

Bellentani, Tommaso Maria. "The impact of Cookie Consent Notices on user’s privacy concerns : an empirical analysis." Master's thesis, 2020. http://hdl.handle.net/10400.14/31234.

Full text
Abstract:
Online privacy has become a significant issue in our society with the use of personal information widespread by websites and firms. To regulate this market, the European Union adopted the General Data Protection Regulation to protect online privacy and give back power to users, requiring firms to recover consent before gathering users’ personal information. Therefore, websites introduced cookie consent notices that allow users to specify their choice regarding the management of personal data. However, this design can manipulate user’s privacy concerns while navigating the website. To find out
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!