To see the other types of publications on this topic, follow the link: Security Suite.

Dissertations / Theses on the topic 'Security Suite'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 20 dissertations / theses for your research on the topic 'Security Suite.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Bartoli, Andrea. "Security protocols suite for machine-to-machine systems." Doctoral thesis, Universitat Politècnica de Catalunya, 2013. http://hdl.handle.net/10803/129622.

Full text
Abstract:
Nowadays, the great diffusion of advanced devices, such as smart-phones, has shown that there is a growing trend to rely on new technologies to generate and/or support progress; the society is clearly ready to trust on next-generation communication systems to face today’s concerns on economic and social fields. The reason for this sociological change is represented by the fact that the technologies have been open to all users, even if the latter do not necessarily have a specific knowledge in this field, and therefore the introduction of new user-friendly applications has now appeared as a bus
APA, Harvard, Vancouver, ISO, and other styles
2

Johansson, Michael. "Internet of things security in healthcare : A test-suite and standard review." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-77138.

Full text
Abstract:
Internet of things is getting more and more popular in healthcare as it comes with benefits that help with efficiency in saving lives and reduce its cost, but it also presents a new attack vector for an attacker to steal or manipulate information sent between them. This report will focus on three properties in the definition of security, confidentiality, integrity and access control. The report will look into what challenges there is in healthcare IoT today through a literature review and from those challenges look into what could minimise these challenges before a device gets into production.
APA, Harvard, Vancouver, ISO, and other styles
3

McCulley, Shane. "Forensic Analysis of G Suite Collaborative Protocols." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2386.

Full text
Abstract:
Widespread adoption of cloud services is fundamentally changing the way IT services are delivered and how data is stored. Current forensic tools and techniques have been slow to adapt to new challenges and demands of collecting and analyzing cloud artifacts. Traditional methods focusing only on client data collection are incomplete, as the client may have only a (partial) snapshot and misses cloud-native artifacts that may contain valuable historical information. In this work, we demonstrate the importance of recovering and analyzing cloud-native artifacts using G Suite as a case study. We dev
APA, Harvard, Vancouver, ISO, and other styles
4

Kohout, David. "Implementace zabezpečení do DLMS protokolu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442396.

Full text
Abstract:
This thesis is focused on smart meters cyber security using DLMS Security Suite standard. Security is more important every day and DLMS specifies multiple methods of authentication and message encryption which is defined in Security Suites. For message creation there are multiple possible formats that can be used. For a better understanding all formats are analysed and compared using a specific example. Main part of this work is about making a testing application called VUT DLMS Tester which is used for testing this standard for real usage in distribution network. Whole development is cooperat
APA, Harvard, Vancouver, ISO, and other styles
5

Marchal, Xavier. "Architectures et fonctions avancées pour le déploiement progressif de réseaux orientés contenus." Thesis, Université de Lorraine, 2019. http://www.theses.fr/2019LORR0049/document.

Full text
Abstract:
Les protocoles historiques d’Internet (TCP/IP) qui servaient à interconnecter les tous premiers ordinateurs ne sont plus adaptés à la diffusion massive de contenus qui en est fait aujourd’hui. De nouveaux protocoles réseau centrés sur les contenus (Information-Centric Networking) sont actuellement conçus pour optimiser ces échanges en pariant sur un changement de paradigme où les contenus, plutôt que les machines sont adressables à l’échelle d’Internet. Cependant, un tel changement ne peut se faire que progressivement et si tous les impératifs opérationnels sont assurés. Ainsi, cette thèse a p
APA, Harvard, Vancouver, ISO, and other styles
6

Třeštíková, Lenka. "Bezpečnostní metriky platformy SAP." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363799.

Full text
Abstract:
Main goal of this thesis is analyzing potential security risks of the SAP NetWeaver platform and identifying various vulnerabilities, that are results of poor system configuration, incorrect segregation of duties or insufficient patch management. Methodology for platform evaluation is defined by vulnerabilities, security requirements and controls will be created.
APA, Harvard, Vancouver, ISO, and other styles
7

Robert, Emilie. "L’Etat de droit et la lutte contre le terrorisme dans l’Union européenne : Mesures européennes de lutte contre le terrorisme suite aux attentats du 11 septembre 2001." Thesis, Lille 2, 2012. http://www.theses.fr/2012LIL20001/document.

Full text
Abstract:
La lutte contre le terrorisme, ainsi que ses conséquences sur la sphère des droits de l'Homme, n'est pas un thème nouveau en Europe. Cependant, depuis les attentats du 11 septembre 2001 perpétrés sur le sol des Etats-Unis, «confirmés» par ceux de Madrid en 2004 et Londres en 2005, elle n'a jamais incarné une telle priorité. La majeure partie des mesures prises par l'Union européenne tombe sous le titre de la coopération en matière pénale, c’est-à-dire sousl’ex-troisième Pilier, parmi lesquelles la décision-cadre sur la lutte contre le terrorisme, la décision-cadre sur le mandat d'arrêt europée
APA, Harvard, Vancouver, ISO, and other styles
8

Rehana, Jinat. "Model Driven Development of Web Application with SPACE Method and Tool-suit." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10905.

Full text
Abstract:
Enterprise level software development using traditional software engineeringapproaches with third-generation programming languages is becoming morechallenging and cumbersome task with the increased complexity of products,shortened development cycles and heightened expectations of quality. MDD(Model Driven Development) has been counting as an exciting and magicaldevelopment approach in the software industry from several years. The ideabehind MDD is the separation of business logic of a system from its implementationdetails expressing problem domain using models. This separation andmodeling of p
APA, Harvard, Vancouver, ISO, and other styles
9

Moyer, Shawn P. "Creating a mix of spooks and suits : a new role for intelligence." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FMoyer.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, March 2003.<br>Thesis advisor(s): Robert Simeral, Robert Looney. Includes bibliographical references (p. 105-111). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
10

Ziani, Adel. "Modeling of Secure Dependable (S&D) applications based on patterns for Resource-Constrained Embedded Systems (RCES)." Phd thesis, Université Toulouse le Mirail - Toulouse II, 2013. http://tel.archives-ouvertes.fr/tel-00929836.

Full text
Abstract:
Non-functional requirements such as Security and Dependability (S&D) become more and more important as well as more and more difficult to achieve, particularly in embedded systems development. Such systems come with a large number of common characteristics, including real-time and temperature constraints, security and dependability as well as efficiency requirements. In particular, the development of Resource Constrained Embedded Systems (RCES) has to address constraints regarding memory, computational processing power and/or energy consumption. In this work, we propose a modeling environment
APA, Harvard, Vancouver, ISO, and other styles
11

Nagy, Jan. "Zabezpečení bezdrátových senzorových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2007. http://www.nusl.cz/ntk/nusl-412805.

Full text
Abstract:
This thesis deals with the security of wireless sensor networks, mainly of the industrial standard ZigBee. The aim of the work is to familiarize with the 802.15.4 standard and the ZigBee technology, especially with present methods of security in this field. I have also analysed the requirements for the security of this technology. Further aim of this work is the introduction of the ZigBee kit and description of the Microchip's ZigBee stack. Analysis of the stack is connected with practical test of security functions in the ZigBee laboratory.
APA, Harvard, Vancouver, ISO, and other styles
12

Wang, Qianxue. "Création et évaluation statistique d'une nouvelle de générateurs pseudo-aléatoires chaotiques." Thesis, Besançon, 2012. http://www.theses.fr/2012BESA2031.

Full text
Abstract:
Dans cette thèse, une nouvelle manière de générer des nombres pseudo-aléatoires est présentée.La proposition consiste à mixer deux générateurs exitants avec des itérations chaotiquesdiscrètes, qui satisfont à la définition de chaos proposée par Devaney. Un cadre rigoureux estintroduit, dans lequel les propriétés topologiques du générateur résultant sont données. Deuxréalisations pratiques d’un tel générateur sont ensuite présentées et évaluées. On montre que lespropriétés statistiques des générateurs fournis en entrée peuvent être grandement améliorées enprocédant ainsi. Ces deux propositions
APA, Harvard, Vancouver, ISO, and other styles
13

Small, Jeremiah. "Patterns in network security: an analysis of architectural complexity in securing recursive inter-network architecture networks." Thesis, 2012. https://hdl.handle.net/2144/17155.

Full text
Abstract:
Recursive Inter-Network Architecture (RINA) networks have a shorter protocol stack than the current architecture (the Internet) and rely instead upon separation of mech- anism from policy and recursive deployment to achieve large scale networks. Due to this smaller protocol stack, fewer networking mechanisms, security or otherwise, should be needed to secure RINA networks. This thesis examines the security proto- cols included in the Internet Protocol Suite that are commonly deployed on existing networks and shows that because of the design principles of the current architecture, these
APA, Harvard, Vancouver, ISO, and other styles
14

Dollar, Timothy Wayne. "Ensuring document security, user coordination, and multimedia synchronization in a prototype groupware suite." 1997. http://catalog.hathitrust.org/api/volumes/oclc/39271833.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Hertenberger, Manfred Paul. "A reference framework for security in enterprise resource planning (ERP) systems." Thesis, 2008. http://hdl.handle.net/10210/496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Boshoff, Paul Marthinus. "Securing host and application information in the TCP/IP protocol suite." Thesis, 2012. http://hdl.handle.net/10210/5673.

Full text
Abstract:
M.Sc.<br>Using the Internet for communication purposes constitutes a high risk, considering the security of such information. The protocol suite used on the Internet is the TCP/IP protocol suite, which consists of the Transmission Control Protocol (TCP) and the Internet Protocol (IP). In a bid to create a basis to support the newly conceptualised ideas, various areas of networking are briefly discussed in this dissertation. The first in this series of areas is that of the OSI layers. This model forms the basis of all networking concepts. The model describes seven layers, of which each performs
APA, Harvard, Vancouver, ISO, and other styles
17

chiao-ju, chuang, and 莊喬汝. "The Study on the Suits and the Causation of Security Fraud." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/41675261778053174337.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Widyopratomo, Daniel Adrianto, and 魏丹尼. "Analysis of Security Protocols and Corresponding Cipher Suites Recommended in ETSI M2M Standards." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/93038423754970301425.

Full text
Abstract:
碩士<br>國立交通大學<br>電機資訊國際學程<br>103<br>Security is one of the fundamental aspects one needs to carefully design and implement for IoT systems. Fortunately, ETSI, as a standard body in telecommunication industry, has defined a comprehensive set of common security mechanisms to protect the IoT system including the corresponding security protocols that we can utilize. For TLS protocols, ETSI also suggests a set of cipher suite algorithms. Those options are categorized into two types, access-dependent and access-independent, based on the relationship between the M2M Service Provider and the Access Net
APA, Harvard, Vancouver, ISO, and other styles
19

Chuang, Wen-Chi, and 莊玟琦. "A Study of the Sense-of-security of Single Female College Students in Off-campus Rental Suites." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/28081919124317626086.

Full text
Abstract:
碩士<br>中原大學<br>室內設計研究所<br>90<br>It is observable that most designers, such as interior designers, and product designs, are male gender who tend to design based on masculine values. Whether from the perspectives of sociology, aesthetics, or functional demands of design products, it is a commonplace that male designs often neglected female values. This may be an indirect cause of the lack of sense-of-security to female college students who reside in off-campus rental suites. Threats to female safety are substantial, including raping, peeping, robbing, or that caused by natural hazards. This ca
APA, Harvard, Vancouver, ISO, and other styles
20

Chu, Wan-Ting, and 朱婉婷. "Security v.s. Child endorser match-up?--Best suited to the endorser for the airline’s advertising communication effect." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/6k9nrq.

Full text
Abstract:
碩士<br>國立嘉義大學<br>休閒事業管理研究所<br>97<br>Since consumers cannot observe quality before flying, an airline’s safety history and reputation can play an important role in the formulation of their beliefs. Among those 19 airlines, China Airlines has the highest flight accident rate and per million flight accident rate is 7.16. Obviously, safety is the most important factor while customers are making their purchasing decision. In fact, have much of ads to use child endorse safety, such as Mitsubishi Savrin a series of ads use child to endorse for safety and reliable. Interestingly, the most emphasis on s
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!