To see the other types of publications on this topic, follow the link: Security agents.

Dissertations / Theses on the topic 'Security agents'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Security agents.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Abouzakhar, Nasser Salem. "Intelligent agents-based networks security." Thesis, University of Sheffield, 2005. http://etheses.whiterose.ac.uk/3575/.

Full text
Abstract:
The growing dependence of modem society on telecommunication and information networks has become inevitable. The increase in the number of networks interconnected over the Internet has led to an increase in security threats. The existing mobile and fixed network systems and telecommunication protocols are not appropriately designed to deal with current developed distributed attacks. I started my research work by exploring the deployment of intelligent Agents that could detect network anomalies and issue automated response actions. An Intelligent Agent (IA) [Knapik et at, 1998] is an entity tha
APA, Harvard, Vancouver, ISO, and other styles
2

Shibli, Awais. "Security Infrastructure and Applicationsfor Mobile Agents." Doctoral thesis, KTH, Data- och systemvetenskap, DSV, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-12764.

Full text
Abstract:
Research areas of this dissertation are security for mobile agents, for applications based on mobile agents, and for distributed network environments in which mobile agents execute. Mobile agents paradigm has captured researchers’ and industry’s interests long time ago because of its innovative capabilities and attractive applications. The ability of mobile agents to autonomously migrate from host to host, transferring their code and internal state, enables them to accomplish tasks in network and distributed environments more conveniently, robustly, and efficiently than traditional client-serv
APA, Harvard, Vancouver, ISO, and other styles
3

Tekbacak, Fatih Tuğlular Tuğkan. "Developing a security mechanism for software agents/." [s.l.]: [s.n.], 2006. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000526.pdf.

Full text
Abstract:
Thesis (Master)--İzmir Institute of Technology, İzmir, 2006.<br>Keywords: Agents, security protocols, software, software development, software security. Includes bibliographical references (leaves. 73-76).
APA, Harvard, Vancouver, ISO, and other styles
4

CORDEIRO, JOANNA DE VASCONCELOS. "AGENTS OF TERROR AS AGENTS OF SECURITY: CONTESTING HISTORIES OF THE IRA." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2011. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=18315@1.

Full text
Abstract:
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR<br>PROGRAMA DE SUPORTE À PÓS-GRADUAÇÃO DE INSTS. DE ENSINO<br>Aquilo que vem sendo interpretado como terror pode, por sua vez, ser interpretado como segurança. As narrativas padrão sobre organizações como o Exército Republicano Irlandês, baseadas em afirmações sobre terror de uma lado e revolução de outro, podem ser relidas com base em narrativas (também usuais) sobre segurança, termo este que infere muito mais legitimidade que terror. A dissertação se debruça sobre o pensamento de Jef Huysmans a fim de fazer uma leitura do IRA enqua
APA, Harvard, Vancouver, ISO, and other styles
5

Furst, Alexander J. "State Regulation of Private Police and Security Agents." Bowling Green State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1245626912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

WEN, XUE. "THREE ESSAYS ON SOCIAL SECURITY WITH MYOPIC AGENTS." Doctoral thesis, Università Cattolica del Sacro Cuore, 2012. http://hdl.handle.net/10280/1469.

Full text
Abstract:
Questa tesi si compone di tre capitoli. Nel primo capitolo, si presenta una rassegna della letteratura sui principali contributi teorici di modellazione per la progettazione della sicurezza sociale, assumendo gli individui come non-standard preferences. Ci concentriamo su tre approcci particolari: time inconsistent preferences, temptation preferences e myopia. Il secondo capitolo studia gli incentivi politici per la progettazione della politica di sicurezza sociale nelle democrazie competitive con le famiglie lungimiranti e miopi in un ambiente di probabilistic voting. In particolare, l'analis
APA, Harvard, Vancouver, ISO, and other styles
7

WEN, XUE. "THREE ESSAYS ON SOCIAL SECURITY WITH MYOPIC AGENTS." Doctoral thesis, Università Cattolica del Sacro Cuore, 2012. http://hdl.handle.net/10280/1469.

Full text
Abstract:
Questa tesi si compone di tre capitoli. Nel primo capitolo, si presenta una rassegna della letteratura sui principali contributi teorici di modellazione per la progettazione della sicurezza sociale, assumendo gli individui come non-standard preferences. Ci concentriamo su tre approcci particolari: time inconsistent preferences, temptation preferences e myopia. Il secondo capitolo studia gli incentivi politici per la progettazione della politica di sicurezza sociale nelle democrazie competitive con le famiglie lungimiranti e miopi in un ambiente di probabilistic voting. In particolare, l'analis
APA, Harvard, Vancouver, ISO, and other styles
8

Xu, Ke. "Mobile agent security through multi-agent cryptographic protocols." Thesis, University of North Texas, 2004. https://digital.library.unt.edu/ark:/67531/metadc4473/.

Full text
Abstract:
An increasingly promising and widespread topic of research in distributed computing is the mobile agent paradigm: code travelling and performing computations on remote hosts in an autonomous manner. One of the biggest challenges faced by this new paradigm is security. The issue of protecting sensitive code and data carried by a mobile agent against tampering from a malicious host is particularly hard but important. Based on secure multi-party computation, a recent research direction shows the feasibility of a software-only solution to this problem, which had been deemed impossible by some rese
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Jaljouli, Raja Computer Science &amp Engineering Faculty of Engineering UNSW. "A proposed security protocol for data gathering mobile agents." Awarded by:University of New South Wales. School of Computer Science and Engineering, 2006. http://handle.unsw.edu.au/1959.4/23999.

Full text
Abstract:
We address the security issue of the data which mobile agents gather as they are traversing the Internet. Our goal is to devise a security protocol that truly secures the data which mobile agents gather. Several cryptographic protocols were presented in the literature asserting the security of gathered data. Formal verification of the protocols reveals unforeseen security flaws, such as truncation or alteration of the collected data, breaching the privacy of the gathered data, sending others data under the private key of a malicious host, and replacing the collected data with data of similar a
APA, Harvard, Vancouver, ISO, and other styles
10

Sarracco, Fabiano. "Mobile agents security: algorithmic approaches for hostile hosts detection." Doctoral thesis, La Sapienza, 2006. http://hdl.handle.net/11573/917058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Vugarda, Alessandro <1981&gt. "Mobile agents security: how to capture a powerful intruder." Master's Degree Thesis, Università Ca' Foscari Venezia, 2016. http://hdl.handle.net/10579/8245.

Full text
Abstract:
Nei testi accademici di informatica si possono trovare molti problemi tipici dei sistemi distribuiti risolti grazie all'impiego degli agenti mobili. Tuttavia, si sa ancora poco circa il comportamento di questi sistemi quando alcuni nodi diventano pericolosi, oppure uno o più agenti diventano pericolosi, come ad esempio il problema della cattura di un intruso o della decontaminazione di una rete. Lo scopo di questa tesi è di fare una panoramica dei temi principali sugli agenti mobili, con un focus particolare sulla sicurezza. Verrà anche proposta una soluzione per la cattura di un intruso p
APA, Harvard, Vancouver, ISO, and other styles
12

Yao, Ming. "A security architecture for protecting dynamic components of mobile agents." Thesis, Queensland University of Technology, 2004. https://eprints.qut.edu.au/15913/1/Ming_Yao_Thesis.pdf.

Full text
Abstract:
New techniques,languages and paradigms have facilitated the creation of distributed applications in several areas. Perhaps the most promising paradigm is the one that incorporates the mobile agent concept. A mobile agent in a large scale network can be viewed as a software program that travels through a heterogeneous network, crossing various security domains and executing autonomously in its destination. Mobile agent technology extends the traditional network communication model by including mobile processes, which can autonomously migrate to new remote servers. This basic idea results in
APA, Harvard, Vancouver, ISO, and other styles
13

Yao, Ming. "A security architecture for protecting dynamic components of mobile agents." Queensland University of Technology, 2004. http://eprints.qut.edu.au/15913/.

Full text
Abstract:
New techniques,languages and paradigms have facilitated the creation of distributed applications in several areas. Perhaps the most promising paradigm is the one that incorporates the mobile agent concept. A mobile agent in a large scale network can be viewed as a software program that travels through a heterogeneous network, crossing various security domains and executing autonomously in its destination. Mobile agent technology extends the traditional network communication model by including mobile processes, which can autonomously migrate to new remote servers. This basic idea results in
APA, Harvard, Vancouver, ISO, and other styles
14

Gunupudi, Vandana. "Performance Evaluation of Data Integrity Mechanisms for Mobile Agents." Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4366/.

Full text
Abstract:
With the growing popularity of e-commerce applications that use software agents, the protection of mobile agent data has become imperative. To that end, the performance of four methods that protect the data integrity of mobile agents is evaluated. The methods investigated include existing approaches known as the Partial Result Authentication Codes, Hash Chaining, and Set Authentication Code methods, and a technique of our own design, called the Modified Set Authentication Code method, which addresses the limitations of the Set Authentication Code method. The experiments were run using the DADS
APA, Harvard, Vancouver, ISO, and other styles
15

Raghunathan, Subhashini. "A Security Model for Mobile Agents using X.509 Proxy Certificates." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3320/.

Full text
Abstract:
Mobile agent technology presents an attractive alternative to the client-server paradigm for several network and real-time applications. However, for most applications, the lack of a viable agent security model has limited the adoption of the agent paradigm. This thesis presents a security model for mobile agents based on a security infrastructure for Computational Grids, and specifically, on X.509 Proxy Certificates. Proxy Certificates serve as credentials for Grid applications, and their primary purpose is temporary delegation of authority. Exploiting the similarity between Grid applications
APA, Harvard, Vancouver, ISO, and other styles
16

Azfar, Abdullah. "Multiple Escrow Agents in VoIP." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10895.

Full text
Abstract:
Using a Key escrow agent in conjunction with Voice over IP (VoIP) communication ensures that law enforcements agencies (LEAs) can retrieve the session key used to encrypt data between two users in a VoIP session. However, the use of a single escrow agent has some drawbacks. A fraudulent request by an evil employee from the LEA can lead to improper disclosure of a session key. After the escrow agent reveals the key this evil person could fabricate data according to his/her needs and encrypt it again (using the correct session key). In this situation the persons involved in the communication ses
APA, Harvard, Vancouver, ISO, and other styles
17

Idrissi, Hind. "Contributions to the security of mobile agent systems." Thesis, La Rochelle, 2016. http://www.theses.fr/2016LAROS022/document.

Full text
Abstract:
Récemment, l’informatique distribuée a connu une grande évolution en raison de l’utilisation du paradigme des agents mobiles, doté d’innovantes capacités, au lieu du système client-serveur où les applications sont liées à des nœuds particuliers dans les réseaux. Ayant capturé l’intérêt des chercheurs et de l’industrie, les agents mobiles sont capables de migrer de manière autonome d’un nœud à un autre à travers le réseau, en transférant de leur code et leurs données, ce qui leur permet d’effectuer efficacement des calculs, de recueillir des informations et d’accomplir des tâches. Cependant, en
APA, Harvard, Vancouver, ISO, and other styles
18

Shibli, Muhammad Awais. "Building Secure Systems using Mobile Agents." Thesis, KTH, Computer and Systems Sciences, DSV, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4622.

Full text
Abstract:
<p>The progress in the field of computer networks and Internet is increasing with tremendous volume in recent years. This raises important issue with regards to security. Several solutions emerged in the past which provide security at host or network level. These traditional solutions like antivirus, firewall, spy-ware, and authentication mechanisms provide security to some extends, but they still face the challenge of inherent system flaws, OS bugs and social engineering attacks. Recently, some interesting solution emerged like Intrusion Detection and Prevention systems, but these too have so
APA, Harvard, Vancouver, ISO, and other styles
19

Lutz, Alison Eve. "Knowledge, perceptions, and behaviors of Florida Extension agents regarding community food security." [Gainesville, Fla.] : University of Florida, 2006. http://purl.fcla.edu/fcla/etd/UFE0015641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Kolli, Manoj Kumar, and Srikanth Reddy Arimanda. "Performance study of security mechanism for mobile agent domain." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4700.

Full text
Abstract:
Context: Mobile agents are considered quite challenging and provide scope for developing innovative applications in distributed computing domain. One important area where there is a scope to employ mobile agents successfully is the Network security domain. There are plethora of mobile agent based security mechanisms proposed till now. But the successful deployment of the security mechanism is effected by the parameters like performance, efficiency, ability to identify the intruders, and the models vulnerability to direct attacks and so-on which make the successful deployment of the mobile agen
APA, Harvard, Vancouver, ISO, and other styles
21

Chalamalasetty, Kalyani. "Architecture for IMS Security to Mobile:Focusing on Artificial Immune System and Mobile Agents Integration." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5795.

Full text
Abstract:
The IP Multimedia Subsystem (IMS) is an open IP based service infrastructure that enables an easy deployment of new rich multimedia services mixing voice and data. The IMS is an overlay network on top of IP that uses SIP as the primary signaling mechanism. As an emerging technology, the SIP standard will certainly be the target of Denial of Service (DoS) attacks and consequently IMS will also inherit this problem. The objective of proposed architecture for IMS is to cram the potential attacks and security threats to IP Multimedia Subsystem (IMS) and explore the security solutions developed by
APA, Harvard, Vancouver, ISO, and other styles
22

Ng, Chee Wan. "Discrete-event simulation with agents for modeling of dynamic asymmetric threats in maritime security." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FNg.pdf.

Full text
Abstract:
Thesis (M.S. in Modeling, Virtual Environments and Simulation (MOVES))--Naval Postgraduate School, December 2007.<br>Thesis Advisor(s): Buss, Arnold H. ; Hiles, John. "December 2007." Description based on title screen as viewed on January 22, 2008. Includes bibliographical references (p. 79-82). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
23

Hicks, Kathleen H. "Change agents : who leads and why in the execution of US national security policy." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/59793.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Political Science, 2010.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references.<br>This dissertation examines the factors affecting national security mission assignment decisions. It focuses on cases in which military or civilian agents are selected in lieu of the other. Six factors are identified for testing as possible contributors to agency selection. These factors are drawn from the existing academic literature in the fields of civil-military relations, presidential and congressional politics, and pu
APA, Harvard, Vancouver, ISO, and other styles
24

Ma, Chunyan. "Mathematical security models for multi-agent distributed systems." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2568.

Full text
Abstract:
This thesis presents the developed taxonomy of the security threats in agent-based distributed systems. Based on this taxonomy, a set of theories is developed to facilitate analyzng the security threats of the mobile-agent systems. We propose the idea of using the developed security risk graph to model the system's vulnerabilties.
APA, Harvard, Vancouver, ISO, and other styles
25

Selliah, Sentil. "Mobile agent based attack resistant architecture for distributed intrusion detection system." Morgantown, W. Va. : [West Virginia University Libraries], 2001. http://etd.wvu.edu/templates/showETD.cfm?recnum=2060.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2001.<br>Title from document title page. Document formatted into pages; contains vii, 61 p. : ill. Includes abstract. Includes bibliographical references (p. 50-52).
APA, Harvard, Vancouver, ISO, and other styles
26

Monteiro, Valter. "How intrusion detection can improve software decoy applications." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FMonteiro.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Kaiser, Edward Leo. "Addressing Automated Adversaries of Network Applications." PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/4.

Full text
Abstract:
The Internet supports a perpetually evolving patchwork of network services and applications. Popular applications include the World Wide Web, online commerce, online banking, email, instant messaging, multimedia streaming, and online video games. Practically all networked applications have a common objective: to directly or indirectly process requests generated by humans. Some users employ automation to establish an unfair advantage over non-automated users. The perceived and substantive damages that automated, adversarial users inflict on an application degrade its enjoyment and usability by
APA, Harvard, Vancouver, ISO, and other styles
28

El, Hariri Mohamad. "Secure Control and Operation of Energy Cyber-Physical Systems Through Intelligent Agents." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3854.

Full text
Abstract:
The operation of the smart grid is expected to be heavily reliant on microprocessor-based control. Thus, there is a strong need for interoperability standards to address the heterogeneous nature of the data in the smart grid. In this research, we analyzed in detail the security threats of the Generic Object Oriented Substation Events (GOOSE) and Sampled Measured Values (SMV) protocol mappings of the IEC 61850 data modeling standard, which is the most widely industry-accepted standard for power system automation and control. We found that there is a strong need for security solutions that are c
APA, Harvard, Vancouver, ISO, and other styles
29

Garrigues, Olivella Carles. "Contributions to mobile agent protection from malicious hosts." Doctoral thesis, Universitat Autònoma de Barcelona, 2008. http://hdl.handle.net/10803/5799.

Full text
Abstract:
La utilització d'agents mòbils en sistemes distribuïts comporta diverses avantatges. Les avantatges més freqüentment citades inclouen: reducció de la càrrega de la xarxa, decrement de la latència de les comunicacions, adaptació dinàmica, i millor suport per dispositius mòbils amb connexions intermitents, entre d'altres. No obstant, els beneficis oferts pels agents mòbils no han estat suficients per estimular el seu ús generalitzat. La raó principal per la qual els agents mòbils no han estat àmpliament adoptats encara, a pesar dels seus avantatges tecnològics, és que aquesta tecnologia comporta
APA, Harvard, Vancouver, ISO, and other styles
30

Bernardes, Mauro Cesar. "Avaliação do uso de agentes móveis em segurança computacional." Universidade de São Paulo, 1999. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-04022002-103542/.

Full text
Abstract:
Em decorrência do aumento do número de ataques de origem interna, a utilização de mecanismos de proteção, como o firewall, deve ser ampliada. Visto que este tipo de ataque, ocasionado pelos usuários internos ao sistema, não permite a localização imediata, torna-se necessário o uso integrado de diversas tecnologias para aumentar a capacidade de defesa de um sistema. Desta forma, a introdução de agentes móveis em apoio a segurança computacional apresenta-se como uma solução natural, uma vez que permitirá a distribuição de tarefas de monitoramento do sistema e automatização do processo de tomada
APA, Harvard, Vancouver, ISO, and other styles
31

Giansiracusa, Michelangelo Antonio. "A secure infrastructural strategy for safe autonomous mobile agents." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16052/1/Michaelangelo_Giansiracusa_Thesis.pdf.

Full text
Abstract:
Portable languages and distributed paradigms have driven a wave of new applications and processing models. One of the most promising, certainly from its early marketing, but disappointing (from its limited uptake)is the mobile agent execution and data processing model. Mobile agents are autonomous programs which can move around a heterogeneous network such as the Internet, crossing through a number of different security domains, and perform some work at each visited destination as partial completion of a mission for their agent user. Despite their promise as a technology and paradigm to
APA, Harvard, Vancouver, ISO, and other styles
32

Giansiracusa, Michelangelo Antonio. "A Secure Infrastructural Strategy for Safe Autonomous Mobile Agents." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16052/.

Full text
Abstract:
Portable languages and distributed paradigms have driven a wave of new applications and processing models. One of the most promising, certainly from its early marketing, but disappointing (from its limited uptake)is the mobile agent execution and data processing model. Mobile agents are autonomous programs which can move around a heterogeneous network such as the Internet, crossing through a number of different security domains, and perform some work at each visited destination as partial completion of a mission for their agent user. Despite their promise as a technology and paradigm to dri
APA, Harvard, Vancouver, ISO, and other styles
33

Tang, Jin. "Mobile IPv4 Secure Access to Home Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11536.

Full text
Abstract:
With the fast development of wireless networks and devices, Mobile IP is expected to be used widely so that mobile users can access the Internet anywhere, anytime without interruption. However, some problems, such as firewall traversal and use of private IP addresses, restrict use of Mobile IP. The objective of this thesis is to design original schemes that can enable a mobile node at abroad to access its home network as well as the Internet securely and that can help Mobile IP to be used widely and commercially. Our solutions are secure, efficient, and scalable. They can be implemented and ma
APA, Harvard, Vancouver, ISO, and other styles
34

Старцева, Т. М. "Судовий прецедент у механізмі захисту прав людини". Thesis, Українська академія банківської справи Національного банку України, 2006. http://essuir.sumdu.edu.ua/handle/123456789/60865.

Full text
Abstract:
Права і свободи людини та їх гарантії визначають зміст і спрямованість діяльності держави. Утвердження прав і свобод людини є головним її обов’язком [1]. Законодавство України передбачає систему засобів, які створюють необхідні умови реалізації прав і свобод людини. Механізм захисту прав людини, його структура, окремі аспекти функціонування неодноразово ставали предметом наукового дослідження фахівців з різних галузей права [2,с. 333-335; 3, с. 100-101; 4, с. 15].
APA, Harvard, Vancouver, ISO, and other styles
35

Scheepers, Julien. "Logiques, formes et enjeux de l'ethnicisation des compétences professionnelles. Les cas comparés des éducateurs dans le travail social et des agents de sécurité privée : les cas comparés des éducateurs dans le travail social et des agents de sécurité privée." Thesis, Nice, 2013. http://www.theses.fr/2013NICE2025.

Full text
Abstract:
Le point de départ de cette recherche est la montée en puissance d'une lisibilité ethnique (notamment via le culturalisme) de la déviance déclinée en figures de la délinquance et de la vulnérabilité. Dans ce cadre, les éducateurs et les agents de sécurité issus des populations minoritaires apparaissent comme plus à même d'intervenir sur des populations considérées comme à "leur image". J’interroge dans ce travail ce lien supposé entre ethnicité,compétences professionnelles et public cible de l'action.Il s’agit d’une enquête par entretiens auprès d'éducateurs et d'agents de sécurité issus de mi
APA, Harvard, Vancouver, ISO, and other styles
36

Arroyo, Antonio. "Professionnalisation et développement professionnel : cas des agents de sécurité privée de la branche surveillance humaine en France." Thesis, Normandie, 2017. http://www.theses.fr/2017NORMR088.

Full text
Abstract:
Ce travail de recherche porte sur l’étude de la tension entre le discours institutionnel sur la professionnalisation de la sécurité privée en France et le processus d’exercice et d’apprentissage du métier par les agents de sécurité. Différents facteurs indiquent les enjeux du projet institutionnel de professionnalisation et des dispositifs de formation. Le chercheur met en évidence, à partir d’une approche qualitative et multidimensionnelle, les intentions institutionnelles et l’écart existant entre le discours et la réalité. Sur le terrain, les agents de sécurité vivent mal leur entrée dans l
APA, Harvard, Vancouver, ISO, and other styles
37

Hamburger, Heidi. "Southwest Border Patrol Agent Perceptions of Job-Related Threats and Dangers." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5874.

Full text
Abstract:
The U.S. Southwest Border is associated with highly politicized topics, yet the lived experience of Border Patrol agents is not one of them. Border Patrol agents face risks to their personal safety and security as they attempt to safeguard the national security of the United States while implementing the policies of their organization, which are sometimes at odds with the beliefs and expectations of agents in the field. The purpose of this phenomenological study was to explore perceptions and lived experiences related to the threats and dangers that Border Patrol agents face as they protect th
APA, Harvard, Vancouver, ISO, and other styles
38

Martínez, Villalba Anna. "Desenvolupament de metodologia analítica per a la determinació de fàrmacs antiparasitaris." Doctoral thesis, Universitat de Barcelona, 2016. http://hdl.handle.net/10803/400865.

Full text
Abstract:
Els fàrmacs veterinaris són utilitzats per tractar i prevenir malalties en els animals de producció, ja que és imprescindible disposar d’unes condicions salubres per als animals i així assegurar un subministrament de carn de qualitat amb garanties de seguretat. Ara bé, l’ús, que en alguns casos s’ha convertit en abús d’aquestes substàncies, ha portat a una creixent preocupació per part de la societat deguda a la possible presència d’aquests compostos en els productes d’origen animal destinats al consum humà i els possibles efectes adversos que aquests puguin provocar en la salut dels consumido
APA, Harvard, Vancouver, ISO, and other styles
39

Soares, Camila Carla Dantas. "Entre muros, celas e sombras: história oral de mulheres trabalhadoras de uma instituição prisional." Universidade Federal da Paraíba, 2017. http://tede.biblioteca.ufpb.br:8080/handle/tede/9468.

Full text
Abstract:
Submitted by Fernando Souza (fernandoafsou@gmail.com) on 2017-09-08T14:02:35Z No. of bitstreams: 1 arquivototal.pdf: 2141186 bytes, checksum: 00d11d5dfde9704044ecaf5cadd7cb80 (MD5)<br>Made available in DSpace on 2017-09-08T14:02:35Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 2141186 bytes, checksum: 00d11d5dfde9704044ecaf5cadd7cb80 (MD5) Previous issue date: 2017-04-24<br>It is a qualitative research that used the technique of Oral Thematic History. The present study had as main objective: to know the history of penitentiary security agents of a female prison institution. The research was
APA, Harvard, Vancouver, ISO, and other styles
40

Калетнік, В. В. "Сучасний стан адміністративно-правового забезпечення інформаційної безпеки в Україні: теоретико-правовий аналіз". Thesis, Національний авіаційний університет, 2021. https://er.nau.edu.ua/handle/NAU/53718.

Full text
Abstract:
Мета: аналіз сучасного стану адміністративно-правового забезпечення інформаційної безпеки в Україні, напрацювання науково обґрунтованих пропозицій та рекомендацій з цього питання. Методи дослідження: у дослідженні автор використовував методи теоретичного аналізу та аналізу змісту, монографічний метод, метод систематизації для виявлення та конкретизації авторської позиції в рамках досліджуваних питань. При підготовці висновків та рекомендацій за результатами дослідження був використаний метод узагальнення. Результати дослідження: визначено напрями підвищення ефективності адміністративно-п
APA, Harvard, Vancouver, ISO, and other styles
41

Huin, Leslie. "Sécurité d'accès dans les Systèmes d'Information Coopératifs : modélisation et Implémentation à l'aide d'agents." Thesis, Lyon 3, 2012. http://www.theses.fr/2012LYO30028.

Full text
Abstract:
Le partage entre sources indépendantes hétérogènes et distribuées peut être résolu par la construction d’un système d’information coopératif (SIC). Un SIC est un ensemble de composants plus ou moins autonomes, souvent préexistants qui travaillent de manière synergique en échangeant information, expertise et en coordonnant leurs activités. Cela implique notamment la prise en compte de l’interopérabilité liée aux différences de description des données et de représentation de la sémantique. La gestion des données est alors assurée sans recours à un schéma global complet pour respecter l’autonomie
APA, Harvard, Vancouver, ISO, and other styles
42

Chico, i. Rovira Joaquim. "Estratègies analítiques per a la determinació d’antimicrobians en aliments." Doctoral thesis, Universitat de Barcelona, 2014. http://hdl.handle.net/10803/277258.

Full text
Abstract:
Els compostos antimicrobians són un dels grups de fàrmacs més utilitzats en l’àmbit veterinari; el seu ús està molt relacionat amb les pràctiques de la ramaderia intensiva. L’aplicació d’agents antimicrobians en aquest àmbit ha comportat importants avantatges, però també té efectes contraproduents, ja que pot implicar la presència de residus d’aquests tant en el medi ambient com en aliments d’origen animal, originant riscos de diferents tipus, com ara reaccions al•lèrgiques o creació de resistències bacterianes en els consumidors d’aliments. Aquest darrer factor ha estat motiu de creixent preo
APA, Harvard, Vancouver, ISO, and other styles
43

Loulou-Aloulou, Monia. "Approche formelle pour la spécification, la vérification et le déploiement des politiques de sécurité dynamiques dans les systèmes à base d’agents mobiles." Thesis, Bordeaux 1, 2010. http://www.theses.fr/2010BOR14088/document.

Full text
Abstract:
Nous avons développé dans le cadre de cette thèse deux aspects complémentaires liés à la sécurité des systèmes d’agents mobiles : l'aspect statique et l'aspect dynamique. Pour l’aspect statique, nous avons proposé une spécification formelle des politiques de sécurité qui traite les différentes préoccupations de sécurité dans les systèmes à base d'agents mobiles et couvre les différents concepts liés à la définition de tels systèmes. L'aspect dynamique, s'intéresse à définir formellement l'ensemble des opérations élémentaires de reconfiguration de ces politiques et de définir un cadre qui expri
APA, Harvard, Vancouver, ISO, and other styles
44

PIRES, Higo Fellipe Silva. "ABIDS-WSN: UM FRAMEWORK DE DETECÇÃO DE INTRUSÃO EM REDES DE SENSORES SEM FIO ORIENTADO POR AGENTES INTELIGENTES." Universidade Federal do Maranhão, 2017. http://tedebc.ufma.br:8080/jspui/handle/tede/1772.

Full text
Abstract:
Submitted by Maria Aparecida (cidazen@gmail.com) on 2017-08-01T14:53:33Z No. of bitstreams: 1 Higo Felipe.pdf: 3289455 bytes, checksum: 294f49f96fd41d35ca0024df16006292 (MD5)<br>Made available in DSpace on 2017-08-01T14:53:33Z (GMT). No. of bitstreams: 1 Higo Felipe.pdf: 3289455 bytes, checksum: 294f49f96fd41d35ca0024df16006292 (MD5) Previous issue date: 2017-01-26<br>CAPES<br>Lately, there has been a significant advance in several technologies directly or indirectly related to Ubiquitous Computing. Among them, the technology of Wireless Sensor Networks (WSNs) can be mentioned. Having its sp
APA, Harvard, Vancouver, ISO, and other styles
45

Borràs, i. Aguadé Sílvia. "Seguretat alimentària en l’alimentació animal. Anàlisi d’agents antimicrobians en pinsos." Doctoral thesis, Universitat de Barcelona, 2014. http://hdl.handle.net/10803/277213.

Full text
Abstract:
La producció animal és una important activitat econòmica en tot el món, que té per objectiu satisfer la demanda d’aliments d’una població mundial en constant augment. En els sistemes de producció intensiva d’animals, l’ús de medicaments veterinaris ha esdevingut una pràctica habitual per tal de prevenir i controlar l’aparició de malalties, i mantenir així la viabilitat i l’eficiència de la indústria ramadera. Els agents antimicrobians, principalment agents antibacterians i antiparasitaris, són els medicaments veterinaris més emprats. Pel que fa a les vies d’administració, la pràctica més estes
APA, Harvard, Vancouver, ISO, and other styles
46

Bugeja, Joseph. "Smart connected homes : concepts, risks, and challenges." Licentiate thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-7793.

Full text
Abstract:
The growth and presence of heterogeneous connected devices inside the home have the potential to provide increased efficiency and quality of life to the residents. Simultaneously, these devices tend to be Internet-connected and continuously monitor, collect, and transmit data about the residents and their daily lifestyle activities. Such data can be of a sensitive nature, such as camera feeds, voice commands, physiological data, and more. This data allows for the implementation of services, personalization support, and benefits offered by smart home technologies. Alas, there has been a rift of
APA, Harvard, Vancouver, ISO, and other styles
47

Lima, Christiane Ferreira Lemos. "AGENTES INTELIGENTES PARA DETECÇÃO DE INTRUSOS EM REDES DE COMPUTADORES." Universidade Federal do Maranhão, 2002. http://tedebc.ufma.br:8080/jspui/handle/tede/316.

Full text
Abstract:
Made available in DSpace on 2016-08-17T14:52:45Z (GMT). No. of bitstreams: 1 Cristiane Lima.pdf: 1837914 bytes, checksum: acce166dfcbb2c425c7249c9bd06c29d (MD5) Previous issue date: 2002-05-10<br>Recently, the interest for advanced techniques for network intrusion detection have been increased for protecting important information in computational environment. This research work presents a proposal of a new network intrusion detection system based on a society of intelligent agents whose reasoning are aupported by neural network paradigms, named NIDIA (Network Intrusion Detection System bas
APA, Harvard, Vancouver, ISO, and other styles
48

Tan, Victor Hock Kim. "Interaction tracing for mobile agent security." Thesis, University of Southampton, 2004. https://eprints.soton.ac.uk/259235/.

Full text
Abstract:
This thesis develops a new technique, interaction tracing, to address the security issue of protecting mobile agents from potentially malicious hosts. In this technique, a mobile agent is modeled as a black box whose behaviour can be captured through a trace of its inputs and outputs during the process of execution. Formalization of the activity of creating and verifying traces is detailed for a simple agent programming language using operational semantics. An interaction protocol is developed to enable secure exchange of traces between entities in the system that are responsible for verifying
APA, Harvard, Vancouver, ISO, and other styles
49

Velay, Maxime. "Méthodes d’optimisation distribuée pour l’exploitation sécurisée des réseaux électriques interconnectés." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT063/document.

Full text
Abstract:
Notre société étant plus dépendante que jamais au vecteur électrique, la moindre perturbation du transport ou de l’acheminement de l’électricité a un impact social et économique important. La fiabilité et la sécurité des réseaux électriques sont donc cruciales pour les gestionnaires de réseaux, en plus des aspects économiques. De plus, les réseaux de transport sont interconnectés pour réduire les coûts des opérations et pour améliorer la sécurité. Un des plus grand défis des gestionnaires des réseaux de transport est ainsi de se coordonner avec les réseaux voisins, ce qui soulève des problèmes
APA, Harvard, Vancouver, ISO, and other styles
50

El, Hachem Jamal. "A Model Driven Method to Design and Analyze Secure System-of-Systems Architectures : Application to Predict Cascading Attacks in Smart Buildings." Thesis, Pau, 2017. http://www.theses.fr/2017PAUU3026/document.

Full text
Abstract:
Le Système-de-Systèmes (SdS) devient l'un des principaux paradigmes pour l'ingénieriedes solutions de la prochaine génération, telles que les villes intelligentes, les bâtiments intelligents,les systèmes médicaux, les systèmes d'interventions d'urgence et les systèmes de défense. Parconséquent, l'intérêt apporté aux SdS, leur architecture et surtout leur sécurité est en croissancecontinue. Cependant, les caractéristiques de différenciation des SdS, telles que le comportementémergent et l'indépendance managériale et opérationnelle de ses constituants, peuvent introduiredes problèmes spécifiques
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!