To see the other types of publications on this topic, follow the link: Security of ADS.

Dissertations / Theses on the topic 'Security of ADS'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Security of ADS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Miah, Abdul. "Product-based environmental metrics for use within aerospace, defence, space and security industries (ADS)." Thesis, University of Surrey, 2018. http://epubs.surrey.ac.uk/845983/.

Full text
Abstract:
Within the aerospace, defence, space, and security (ADS) industries, there is a growing reporting requirement and interest in understanding and reducing the environmental impacts of products and related risks to business. This dissertation presents the research carried out in collaboration with six ADS companies (ADS Group, Airbus Group, BAE Systems, Bombardier Aerospace, Granta Design, and Rolls-Royce) to establish industry methods for consistently measuring and reporting two pre-selected product-based environmental indicators identified as important to the industry: energy consumption and ac
APA, Harvard, Vancouver, ISO, and other styles
2

Wahlgren, Alex, and Joakim Thorn. "Detecting ADS-B spoofing attacks : using collected and simulated data." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-179040.

Full text
Abstract:
In a time where general technology is progressing at a rapid rate, this thesis aims to present possible advancements to security in regard to air traffic communication. By highlighting how data can be extracted using simple hardware and open-source software the transparency and lack of authentication is showcased. The research is specifically narrowed down to discovering vulnerabilities of the ADS-B protocol in order to apply countermeasures. Through fetching live aircraft data with OpenSky-Network and through fetching simulated ADS-B attack data with OpenScope, this thesis develops a data set
APA, Harvard, Vancouver, ISO, and other styles
3

Chi, Lijun. "Security and Robustness of Autonomous Driving Systems Against Physical Adversarial Attack." Electronic Thesis or Diss., Institut polytechnique de Paris, 2025. http://www.theses.fr/2025IPPAT009.

Full text
Abstract:
Grâce à des mises à jour matérielles itératives et aux avancées dans les réseaux neuronaux profonds (DNN), les systèmes de conduite autonome (ADS) sont de plus en plus intégrés à la vie quotidienne. Cependant, avant que cette technologie ne se généralise, un problème de sécurité qui doit être résolu est celui des attaques adversariales physiques. Ces attaques peuvent manipuler des objets réels pour perturber la perception des ADS et provoquer des accidents de la route. De plus, la diversité des attaques physiques complique la tâche des défenseurs passifs.Cette étude aborde ces défis en analysa
APA, Harvard, Vancouver, ISO, and other styles
4

Shankaran, Rajan. "Asynchronous transfer mode security /." View thesis, 1999. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030616.142410/index.html.

Full text
Abstract:
Thesis (M. Sc.) (Hons.) -- University of Western Sydney, Nepean, 1999.<br>Thesis submitted in fulfilment of the requirements for the award of the degree Master of Science (Honors) from the University of Western Sydney, Nepean, School of Computing and Information Technology. Bibliography : p. 87-88.
APA, Harvard, Vancouver, ISO, and other styles
5

Mead, Jonathan, and mikewood@deakin edu au. "The Australia-Indonesia security relationship." Deakin University. School of International and Political Studies, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20051017.144017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Alach, Zachary James. "Mapping the elements of physical security towards the creation of a holistic physical security model." Connect to thesis, 2007. http://portal.ecu.edu.au/adt-public/adt-ECU2007.0034.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhao, Weiliang. "Security techniques for electronic commerce applications /." View thesis View thesis, 2003. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030505.155156/index.html.

Full text
Abstract:
Thesis (M.Sc. (Hons.)) -- University of Western Sydney, 2003.<br>"A thesis submitted for the degree of Master of Science (Honours) - Computing and Information Technology at University of Western Sydney" Bibliography : leaves 109-114.
APA, Harvard, Vancouver, ISO, and other styles
8

Kong, Yibing. "Security and privacy model for association databases." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20031126.142250/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kazi, Mazharul Haque. "Systematic risk factors in Australian security pricing /." View thesis, 2004. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20050913.105500/index.html.

Full text
Abstract:
Thesis (Ph.D.) -- University of Western Sydney, 2004.<br>"A thesis submitted in fulfilment of requirements for the degree of Doctor of Philosophy in Economics and Finance" Bibliography : leaves 211-226.
APA, Harvard, Vancouver, ISO, and other styles
10

Parnell, Winsome R., and n/a. "Food security in New Zealand." University of Otago. Department of Human Nutrition, 2005. http://adt.otago.ac.nz./public/adt-NZDU20070426.162526.

Full text
Abstract:
There was growing concern in New Zealand in the 1990�s that Food Security: access by all people at all times to enough food for an active healthy life, was not being achieved, despite an abundant food supply. A study of a convenience sample of 40 families with children (58 adults and 92 children) whose sole income was a government welfare benefit was undertaken. Two-thirds of these households regularly relied on a limited variety of food; one-half did not have a sufficient amount of food because of lack of money and outstanding debts. Over the previous year two-thirds had sourced food from a f
APA, Harvard, Vancouver, ISO, and other styles
11

Arakala, Arathi, and arathi arakala@ems rmit edu au. "Secure and Private Fingerprint-based Authentication." RMIT University. Mathematical and Geospatial Sciences, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20081128.102017.

Full text
Abstract:
This thesis studies the requirements and processes involved in building an authentication system using the fingerprint biometric, where the fingerprint template is protected during storage and during comparison. The principles developed in this thesis can be easily extended to authentication systems using other biometric modalities. Most existing biometric authentication systems store their template securely using an encryption function. However, in order to perform matching, the enrolled template must be decrypted. It is at this point that the authentication system is most vulnerable as the
APA, Harvard, Vancouver, ISO, and other styles
12

Ng, Ching Yu. "Contributions to security in wireless ad-hoc networks." Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060320.153622/index.html.

Full text
Abstract:
Thesis (M.Comp.Sc.)--University of Wollongong, 2005.<br>Typescript. This thesis is subject to a 6 month embargo (12/12/05 to 12/06/06) and may only be viewed and copied with the permission of the author. For further information please Contact the Archivist. Includes bibliographical references: leaf 65-72.
APA, Harvard, Vancouver, ISO, and other styles
13

Kintis, Andreas G. "The European Union's Common Foreign and Security Policy : much ado about nothing?" Thesis, University of Hull, 2002. http://hydra.hull.ac.uk/resources/hull:15917.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Szewczyk, Patryk. "An Investigation into factors inhibiting Australian end-users from utilising ADSL Router security effectively." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2015. https://ro.ecu.edu.au/theses/1705.

Full text
Abstract:
Australia has consistently been identified as a major Internet user that will continue to be targeted by cybercrime. Some protection is afforded by specialised security software for computers. Asymmetric Digital Subscriber Line (ADSL) routers can complement specialised security software in counteracting the severity of cybercriminal activity. However, this relies on the adequate and appropriate selection of security mechanisms and controls on the ADSL router. Increasingly, there is research evidence of cyberattacks specifically targeting or exploiting vulnerabilities within ADSL routers. These
APA, Harvard, Vancouver, ISO, and other styles
15

Lessner, Dirk. "Network security for embedded systems /." [St. Lucia, Qld.], 2005. http://adt.library.uq.edu.au/public/adt-QU20060215.160952/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Grose, Robert, and robert grose@deakin edu au. "Formal and Informal Controls of Government over Social Security Expenditure-An Analysis." RMIT University. Business, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20080627.102004.

Full text
Abstract:
While a significant amount of research has examined the more traditional budgetary and procedural controls used by governments to maintain control over social security expenditure, very little research has examined the more obscure formal social controls used to achieve the same purpose. The primary aim of this study was to fill this research vacuum by examining both the formal and informal mechanisms used by governments to maintain control over social security expenditure and to achieve longer-term public policy appropriation. In particular the study focused on the payment of Job Newstar
APA, Harvard, Vancouver, ISO, and other styles
17

Zavodny, Joseph E. "Security requirements and organization for non-tactical ADP systems on small surface ships." Thesis, Monterey, California. Naval Postgraduate School, 1985. http://hdl.handle.net/10945/21539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Kailasanathan, Chandrapal. "Securing digital images." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20041026.150935/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Sun, Zhaohui, and n/a. "Improving Security in WLAN With the Use of Smart Antennas." Griffith University. School of Engineering, 2006. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20070115.143811.

Full text
Abstract:
Wireless communication systems are increasingly deployed by family, businesses, government and SOHO users because of the freedom wireless communications afford, simplicity of installation and ease of use. Along with its rapid development, the security problem in wireless communication network has attracted more and more attention. It has been estimated that the IEEE 80.211 standard is susceptible to attacks both on data content and user authentication, such as eavesdropping, spoofing and Denial of Service. These attacks are due to the standard's inherent flaws and space signal sharing caused b
APA, Harvard, Vancouver, ISO, and other styles
20

Quinn, Peter Thomas, and peter quinn@anu edu au. "HUMAN SECURITY AND DEVELOPMENT: THE CASE OF CAMBODIA." The Australian National University. Centre for Asian Societies and Histories, College of Asia & the Pacific, 2008. http://thesis.anu.edu.au./public/adt-ANU20100701.122958.

Full text
Abstract:
Human security was promoted in 1994 by the UNDP as a concept embracing not only freedom from war and violence (or personal security), but also embracing individual�s basic needs for (and rights to) economic security, food security, health security, environmental security, community security and political security. Following this formulation, the concept has been subject to considerable scrutiny particularly in the context of state centric security studies. Extending the concept of security beyond the state to the individual appeared problematic, especially as the mechanisms designed to ma
APA, Harvard, Vancouver, ISO, and other styles
21

Khoo, How San, and xiaosan@starhub net sg. "Approaches to the Regional Security Analysis of Southeast Asia." The Australian National University. Choose one, 1999. http://thesis.anu.edu.au./public/adt-ANU20050617.140925.

Full text
Abstract:
The purpose of this study is to critically evaluate three scholarly perspectives -- balance of power, institutional, and security complex -- to examine the evolving dynamics of security interdependence and inter-state relations among Southeast Asian states and external powers since 1945. This study is thus a comparative evaluation of the strengths and weaknesses of the three methods in their empirical analysis of the regional security dynamics of Southeast Asia.¶ There is much merit in the balance of power approach. It tracked the consequences of the bipolar Cold War rivalry on Southeast Asia.
APA, Harvard, Vancouver, ISO, and other styles
22

au, D. Mickler@murdoch edu, and David Mickler. "Protecting Civilians or Preserving Interests? Explaining the UN Security Council's Non-intervention in Darfur, Sudan, 2003-06." Murdoch University, 2009. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20091112.122459.

Full text
Abstract:
The UN Security Council is the preeminent multilateral decision-making body and has the legal authority to initiate military interventions if it first determines a threat to international peace and security, including from civil wars or widespread state repression. While traditional norms of non-intervention and the politics of the Cold War curtailed the body’s ability to fulfil this role, evolving understandings and practices of sovereignty and security in the post-Cold War era have led to the apparent emergence of a new norm permitting ‘humanitarian intervention’ and an in principle acceptan
APA, Harvard, Vancouver, ISO, and other styles
23

au, c. liss@murdoch edu, and Carolin Liss. "Maritime Piracy in Southeast Asia and Bangladesh, 1992-2006: A Prismatic Interpretation of Security." Murdoch University, 2007. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20080218.120400.

Full text
Abstract:
Southeast Asia and Bangladesh are at present global hot-spots of pirate attacks on merchant vessels and fishing boats. This thesis explains why, and in what form, piracy still exists. It will argue that an examination of contemporary piracy is important because it can be understood as both a symptom and a reflection of a range of geo-political and socio-economic problems and security concerns. The thesis examines pirate attacks on small craft, including fishing boats, and merchant vessels in Southeast Asia and Bangladesh between 1992 and 2006. It describes the different types of contemporary
APA, Harvard, Vancouver, ISO, and other styles
24

VanMeter, Robert Andrew. "Is hypertext a solution to implementing an ADP security program in DON? Issues and problems." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/28320.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>The goal of this thesis is to provide an overview of hypertext to determine its feasibility for resolving some of the problems currently facing newly assigned and inexperienced ADP security officers. The proclivity within DOD for using documents in virtually every facet of work suggests that hypertext has a promising future in the DOD. To implement an ADP security program in the Navy, the information presented in the DON AIS Security Guidelines should be carefully selected and filtered to derive a tool that provides an effective
APA, Harvard, Vancouver, ISO, and other styles
25

Tootell, Holly. "The social impact of using automatic identification technologies and location-based services in national security." Access electronically, 2007. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20080519.145309/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Bai, Yun. "On formal specification of authorization policies and their transformations : thesis /." View thesis View thesis, 2000. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030612.090157/index.html.

Full text
Abstract:
Thesis (Ph.D.)--University of Western Sydney, 2000.<br>"A thesis submitted for the degree of Doctor of Philosophy at University of Western Sydney - Nepean." "September 2000." Bibliography : leaves 141-150.
APA, Harvard, Vancouver, ISO, and other styles
27

BROOKS, David, and d. brooks@ecu edu au. "Public street surveillance: a psychometric study on the perceived social risk." Edith Cowan University. Computing, Health And Science: School Of Engineering, 2003. http://adt.ecu.edu.au/adt-public/adt-ECU2006.0007.html.

Full text
Abstract:
Public street surveillance, a domain of Closed Circuit Television (CCTV), has grown enormously and is becoming common place with increasing utilization in society as an all-purpose security tool. Previous authors (Ditton, 1999; Davies, 1998; Horne, 1998; Tomkins, 1998) have raised concern over social, civil and privacy issues, but there has been limited research to quantify these concerns. There are a number of core aspects that could relocate the risk perception and therefore, social support of public street surveillance. This study utilized the psychometric paradigm to quantitatively measure
APA, Harvard, Vancouver, ISO, and other styles
28

Gupta, Rajat. "Diversification Premium on Indian ADRs During the Financial Crisis." Scholarship @ Claremont, 2010. http://scholarship.claremont.edu/cmc_theses/23.

Full text
Abstract:
Non-arbitrage asset pricing has been an avenue of unending interest to financial academics and practitioners alike. With increased capital outflow being permitted by developing economies, investors now have easy access to securities issued by foreign firms. The issue investigated in this research is concerned with the persistent presence of arbitrage opportunities between depository receipts and domestic stocks of Indian firms during the recent financial crisis. Instead of being priced in parity with one another during the crisis, ADRs of Indian firms were overpriced by as much as 70% for mo
APA, Harvard, Vancouver, ISO, and other styles
29

Mickler, David. "Protecting civilians or preserving interests? : explaining the UN Security Council's non-intervention in Darfur, 2003-06 /." Murdoch University Digital Theses Program, 2009. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20091112.122459.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Zhang, Jun Qi. "Oblivious transfer protocols for securing electronic commerce /." View thesis View thesis, 2002. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030417.113506/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Song, Beomsik. "Observations on the cryptologic properties of the AES algorithm." Access electronically, 2004. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20041028.102719/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Pirzada, Asad Amir. "Trust-based routing in pure ad-hoc wireless networks." University of Western Australia. School of Computer Science and Software Engineering, 2007. http://theses.library.uwa.edu.au/adt-WU2007.0193.

Full text
Abstract:
[Truncated abstract] An ad-hoc network of wireless nodes is a temporarily formed network, created, operated and managed by the nodes themselves. Due to its peculiar establishment and operational properties it is also often termed an infrastructure-less, self-organised, or spontaneous network. In order to extend the communication range of the nodes, beyond a single hop, specially configured routing protocols are used. The unique feature of these protocols is their ability to form routes in spite of a dynamic topology. For effective functioning of the network it is essential that the network nod
APA, Harvard, Vancouver, ISO, and other styles
33

KC, Sharan Kumar. ""Filling the sinful stomach" : a critical, systemic learning action research approach to food security in the eastern hills of Nepal /." View thesis View thesis, 2001. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030414.142817/index.html.

Full text
Abstract:
Thesis (Ph.D.) -- University of Western Sydney, Hawkesbury, 2001.<br>A thesis submitted for the degree of Doctor of Philosophy of the University of Western Sydney, Hawkesbury, February, 2001. Bibliography : leaves 296-314.
APA, Harvard, Vancouver, ISO, and other styles
34

Weekley, Paul. "Improving Sahelian food security through facilitating action learning networks : a case study among the Fulbe Jelgobe of Northern Burkina Faso /." [Richmond, N.S.W.} : Faculty of Environmental Management and Agriculture, University of Western Sydney, Hawkesbury, 1999. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030508.110110/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Feld, Klaus-Peter. "Bilanzierung von ABS-Transaktionen im IFRS-Abschluss : Anwendung von IAS 39 und SIC-12, konzeptionelle Probleme und Folgen für die Abschlussprüfung /." Düsseldorf : IDW-Verl, 2007. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=015520157&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Xiong, Linping, and n/a. "Modelling Medical Insurance Reform in China - Distributional Effects for Urban Employees and Residents." University of Canberra, 2009. http://erl.canberra.edu.au./public/adt-AUC20091215.151814.

Full text
Abstract:
In the last decade or so, China has begun to reform its health care system nationwide, due to pressures like an ageing population and increasing demand on health services. In the late 1990s, the Chinese government established the medical insurance scheme for urban employees and retirees. Then, in 2003, a new rural co-operative medical insurance scheme was established for rural areas in China. Most recently, in late 2007, a medical insurance program was introduced in 79 pilot cities, aiming to cover all urban residents who are not in the labour market and with all urban residents becoming benef
APA, Harvard, Vancouver, ISO, and other styles
37

Whitehouse, Jennie L. Alexander Sara E. ""Just add women and stir gently" : gendered impacts of tourism development on household livelihood security and implications for local participation /." Waco, Tex. : Baylor University, 2006. http://hdl.handle.net/2104/5001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

McLennan, Bruce Clark. "Contemporary maritime pressures and their implications for naval force structure planning." Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20070315.111709/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Sedaghat, Soroush. "Web authenticity /." View thesis, 2002. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20031216.135109/index.html.

Full text
Abstract:
Thesis (M.Sc.) (Honours) in Computing-- University of Western Sydney, 2002.<br>"A dissertation presented to the University of Western Sydney, School of Computing and Information Technology, in partial fulfillment of the requirements for the degree of Master of Science (Honours) in Computing. Bibliography: p. 438-471.
APA, Harvard, Vancouver, ISO, and other styles
40

Weiland, John, and n/a. "The Future of International Media Coverage of Military Operations." Griffith University. School of International Business and Asian Studies, 2003. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20051104.143303.

Full text
Abstract:
Given the nature of modem warfare and the impact that technology has in contemporary war reporting, the primary objective of this thesis is to identify the most likely means by which the international media will cover future military operations. Initial research concentrates on the cultural and systemic ethos of the military and media professions and examines whether any differences have an adverse impact on how they operate during periods of armed conflict. A brief review of the history of war reporting is undertaken for several purposes; firstly, to discover if any differences between the pr
APA, Harvard, Vancouver, ISO, and other styles
41

Smith, Andrew Humanities &amp Social Sciences Australian Defence Force Academy UNSW. "The factors influencing the employment of the Australian Defence Organisation in homeland security roles since 11 September 2001." Awarded by:University of New South Wales - Australian Defence Force Academy. School of Humanities and Social Sciences, 2007. http://handle.unsw.edu.au/1959.4/38735.

Full text
Abstract:
This thesis makes an assessment of the factors influencing the involvement of the Australian Defence Organisation (ADO) in homeland security roles since 11 September 2001 (9/11). This is approached on a largely empirical basis, using document analysis and case studies supported with interviews with key individuals and experts. The thesis commences with an Introduction that provides brief context for the thesis and specifies its central question as ???what factors have shaped the role of the ADO in Australia's response to the homeland security environment that has emerged since 11 September 2
APA, Harvard, Vancouver, ISO, and other styles
42

Bartrum, Dee A., and n/a. "Job Change and Job Insecurity in the Police Service: Applying the Cognitive-Motivational-Relational Theory of Emotion." Griffith University. School of Psychology, 2006. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20070219.115614.

Full text
Abstract:
This thesis tested an appraisal, coping and adaptation model of job insecurity and organisational change with a sample of police officers. The model integrated key aspects of Lazarus' (1991a, 1999) cognitive-motivational-relational theory of emotion (personal coping resources, appraisal questions, emotion, coping and adaptation outcomes) with the ten job characteristics (opportunity for control, opportunity for skill use, externally generated goals, variety, environmental clarity, availability of money, physical security, opportunity for interpersonal contact, valued social position and suppor
APA, Harvard, Vancouver, ISO, and other styles
43

Kurnio, Hartono. "Contributions to group key distribution schemes." Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060509.103409/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Fares, Tony Yussef. "Digital rights management for smart containment objects." Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060511.151012/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Salim, Farzad. "Detecting and resolving redundancies in EP3P policies." Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20061120.151611/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Techateerawat, Piya, and piyat33@yahoo com. "Key distribution and distributed intrusion detection system in wireless sensor network." RMIT University. Electrical and Computer Systems Engineering, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20080729.162610.

Full text
Abstract:
This thesis proposes a security solution in key management and Intrusion Detection System (IDS) for wireless sensor networks. It addresses challenges of designing in energy and security requirement. Since wireless communication consumes the most energy in sensor network, transmissions must be used efficiently. We propose Hint Key Distribution (HKD) for key management and Adaptive IDS for distributing activated IDS nodes and cooperative operation of these two protocols. HKD protocol focuses on the challenges of energy, computation and security. It uses a hint message and key chain to consume
APA, Harvard, Vancouver, ISO, and other styles
47

Ripiloski, Sasho, and sash1982@optusnet com au. "Macedonia 1991-2001: a case-study of conflict prevention - lessons learned and broader theoretical implications." RMIT University. Global Studies, Social Science and Planning, 2009. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20090507.141532.

Full text
Abstract:
Notwithstanding a broad range of internal and external stresses, Macedonia was the only republic to attain its independence peacefully from the otherwise violent disintegration of the former Yugoslavia in the early 1990s. Subject of a timely and sustained international response, it was feted as a rare preventive success for the international community. Whilst not necessarily decisive, this mobilisation helped ensure a non-violent transition to independence. Yet, much to the surprise of outside observers, Macedonia would fall into conflict a decade after independence, when self-styled freedo
APA, Harvard, Vancouver, ISO, and other styles
48

Chen, YiQun. "Contributions to privacy preserving with ring signatures." Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20070104.134826/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Persson, Pontus. "Ökad leveranssäkerhet i fjärrvärmesystem med hjälp av externa panncentraler : En simulerings- och optimeringsstudie på Sandviken Energi ABs fjärrvärmenät." Thesis, Högskolan i Gävle, Avdelningen för byggnadsteknik, energisystem och miljövetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-36959.

Full text
Abstract:
En stor andel av Sveriges bostäder och lokaler är beroende av fjärrvärmeleveransen. Energimyndigheten i Sverige påtalar att störningar och avbrott i fjärrvärmevärmeleveransen kan leda till allvarliga konsekvenser för individer och samhällsviktiga funktioner. Höga krav ställs på fjärrvärmesystemen som förväntas kunna leverera en trygg energiförsörjning till alla kunder, oavsett tid på dygnet. En viktig åtgärd för att öka leveranskvaliteten i fjärrvärmesystem är att säkerställa tillgängligheten på produktionsanläggningar.   Energibolaget Sandviken Energi AB (SEAB) arbetar aktivt med frågeställni
APA, Harvard, Vancouver, ISO, and other styles
50

Ahl, Gullan. "Reliabilitets- och validitetstestning av ADL-instrument RAINBOW - ett teamdokument." Thesis, Högskolan i Örebro, 1998. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-54256.

Full text
Abstract:
Ett nytt instrument utvecklades från Katz´ ADL-index, vilket visat sig vara ett allt för grovt instrument, för att kartlägga patientens aktivitetsförmåga och självständighetsutveckling. Bedömningsinstrumentet innehåller patientdata samt kategori-index och kom att kallas RAINBOW på grund av att instrumentet är i fyrfärgstryck. En kontroll av det nykonstruerade team-instrumentet utfördes i syfte att mäta dess tillförlitlighet. Mellanbedömar reliabilitet mellan oberoende bedömare har prövats. Validiteten har analyserats på 4 patienter ur materialet och jämförts med Katz´ ADl-index. Studien, som b
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!