Dissertations / Theses on the topic 'Trojans'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Trojans.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Karlsson, Ola. "A Study of Jupiter Trojans." Doctoral thesis, Uppsala universitet, Institutionen för fysik och astronomi, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-172151.
Full textRaju, Akhilesh. "Trojan Detection in Hardware Designs." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1504781162418081.
Full textDharmadhikari, Pranav Hemant. "Hardware Trojan Detection in Sequential Logic Designs." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1543919236213844.
Full textCaravut, Sinchai. "MULTIPLE LOGS ANALYSIS FOR DETECTING ZERO-DAY BACKDOOR TROJANS." Cleveland State University / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=csu1210831685.
Full textCollins, Zachary. "Hardware Trojans in FPGA Device IP: Solutions Through Evolutionary Computation." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1554217182155068.
Full textAlmeida, Álvaro José Caseiro de. "Study of the possible collisions between Plutinos and Neptune trojans." Master's thesis, Universidade de Aveiro, 2008. http://hdl.handle.net/10773/2607.
Full textAs propriedades físicas e dinâmicas dos asteróides oferecem uma das poucas limitações na formação, evolução e migração dos planetas gigantes. Os asteróides Troianos partilham o semi-eixo maior da órbita do planeta, mas seguem-no cerca de 60º à frente e atrás, próximo dos dois pontos triangulares de equilíbrio gravitacional de Lagrange (Sheppard & Trujillo (2006)). Na chamada Cintura de Edgeworth-Kuiper (EKB), encontra-se um grupo de asteróides denominados de Plutinos e que pertencem ao grupo dos designados objectos Trans-Neptunianos (TNOs). Estes partilham uma ressonância de movimento médio 3/2 com Neptuno, e alguns deles (como Plutão) chegam mesmo a cruzar a órbita deste planeta. Como objectivo principal deste trabalho, iremos estudar a possibilidade destes dois grupos de asteróides poderem vir a colidir entre si, o que poderia levar a uma mistura entre os dois tipos e ajudar a explicar as cores que ambos apresentam. ABSTRACT: The dynamical and physical properties of asteroids offer one of the few constraints on the formation, evolution, and migration of the giant planets. Trojan asteroids share a planet’s semi-major axis but lead or follow it by about 60º near the two triangular Lagrangian points of gravitational equilibrium (Sheppard & Trujillo (2006)). In the so-called Edgeworth-Kuiper Belt (EKB), there’s a group of asteroids called Plutinos which belong to the group of the designated Trans-Neptunian objects (TNOs). These TNOs share a mean motion resonance of 3/2 with Neptune, and some of them (like Pluto) even cross the orbit of this planet. As the main subject of this work, we will study the possibility that these two groups of asteroids could collide with each other, which could lead to a mixing between the two (types) and help to explain the colors that both present.
Bruzzeguez, Gustavo Andrade. "Estudo sobre hardware trojans e suas ameaças à Administração Pública Federal." reponame:Repositório Institucional da UnB, 2017. http://repositorio.unb.br/handle/10482/32352.
Full textSubmitted by Raquel Viana (raquelviana@bce.unb.br) on 2018-07-23T16:36:11Z No. of bitstreams: 1 2017_GustavoAndradeBruzzeguez.pdf: 2394160 bytes, checksum: c28f3f1d732b548a557f1a9cc46f87d8 (MD5)
Approved for entry into archive by Raquel Viana (raquelviana@bce.unb.br) on 2018-07-24T19:35:27Z (GMT) No. of bitstreams: 1 2017_GustavoAndradeBruzzeguez.pdf: 2394160 bytes, checksum: c28f3f1d732b548a557f1a9cc46f87d8 (MD5)
Made available in DSpace on 2018-07-24T19:35:27Z (GMT). No. of bitstreams: 1 2017_GustavoAndradeBruzzeguez.pdf: 2394160 bytes, checksum: c28f3f1d732b548a557f1a9cc46f87d8 (MD5) Previous issue date: 2018-07-23
Nos últimos anos, pesquisadores vêm demonstrando a possibilidade de implementação de códigos maliciosos em circuitos integrados durante a fabricação destes dispositivos. A ameaça, que ficou conhecida como hardware trojan, vem atraindo a atenção dos governos e da indústria, dado que potencialmente envolve questões de espionagem e guerra cibernética. Diversos estudos vem sendo desenvolvidos na comunidade acadêmica mundial, em particular nos últimos 5 anos, conforme se constatou no levantamento bibliográfico com uso do enfoque meta-analítico. Não obstante, no Brasil, pouco se tem falado sobre o tema. Recentemente, o Gabinete de Segurança Institucional da Presidência da República publicou a Estratégia de Segurança da Informação e Comunicações e de Segurança Cibernética da Administração Pública Federal 2015-2018, o que demonstra a vontade do Estado brasileiro em equacionar os problemas afetos à área cibernética, por meio do planejamento e da coordenação de esforços dos órgãos públicos, em parceria com a sociedade. Trabalhando a partir dos Objetivos Estratégicos declarados nessa Estratégia, e utilizando-se de conceitos do Balanced Scorecard e da metodologia 5W2H, o trabalho propôs desdobramentos, no nível tático, de tais Objetivos, de forma que a Estratégia possa também abordar as questões associadas à ameaça do hardware Trojan. Não obstante os avanços notados na área cibernética, observa-se que o país encontra-se vulnerável à ameaça do hardware Trojan, seja pela incapacidade de detecção da ameaça, seja pela ausência de ações governamentais focando especificamente o problema.
In recent years, researchers have been demonstrating the possibility of malicious code being introduced into integrated circuits during the fabrication of these devices. The threat, which has become known as hardware Trojan, has attracted the attention of governments and industry as it potentially involves espionage and cyber warfare issues. Several studies have been developed in the world academic community, in particular in the last 5 years, as was verified in the bibliographical survey using the meta-analytic approach. Nevertheless, in Brazil, little has been said about the subject. Recently, the Office of Institutional Security of the brazilian Presidency of the Republic has published the Strategy for Information Security and Cybersecurity of the Federal Public Administration 2015-2018, which demonstrates the Brazilian State’s willingness to address the problems to the cybernetic area, through the planning and coordination of efforts of public agencies, in partnership with society. Working from the Strategic Objectives stated in this Strategy, and using concepts from the Balanced Scorecard and the 5W2H methodology, the work proposed a tactical level development of these Objectives, so that the Strategy could also address issues associated with the hardware Trojan threat. Despite the notable advances in the area of cybernetics, it’s noted that the country is vulnerable to the threat of hardware Trojan, either by the inability to detect the threat or by the absence of government actions specifically focusing on the problem.
Bhamidipati, Harini. "SINGLE TROJAN INJECTION MODEL GENERATION AND DETECTION." Case Western Reserve University School of Graduate Studies / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1253543191.
Full textZareen, Farhath. "Detecting RTL Trojans Using Artificial Immune Systems and High Level Behavior Classification." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7992.
Full textBanga, Mainak. "Partition based Approaches for the Isolation and Detection of Embedded Trojans in ICs." Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/34924.
Full textThe inherent stealthy nature of Trojans makes it difficult to detect them at normal IC outputs. More so, with the restriction that one cannot visually inspect the internals of an IC after it has been manufactured. This obviates the use of side-channel signal(s) that acts like a signature of the IC as a means to assess its internal behavior under operational conditions.
In this work, we have selected power as the side-channel signal to characterize the internal
behavior of the ICs. We have used two circuit partitioning based approaches for isolating and
enhancing the behavioral difference between parts of a genuine IC and one with a sequence
detector Trojan in it. Experimental results reveal that these approaches are effective in
exposing anomalous behavior between the targeted ICs. This is reflected as difference in
power-profiles of the genuine and maligned ICs that is magnified above the process variation
ensuring that the discrepancies are observable.
Master of Science
Hoque, Tamzidul. "Ring Oscillator Based Hardware Trojan Detection." University of Toledo / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1430413190.
Full textStaub, Dillon. "Bio-Inspired Hardware Security Defenses: A CRISPR-Cas-Based Approach for Detecting Trojans in FPGA Systems." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1563872470616901.
Full textHarris, Matthew Joshua. "Accelerating Reverse Engineering Image Processing Using FPGA." Wright State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright155535529307322.
Full textGutierrez, Ramon Roger. "Model for Touchdown Dynamics of a Lander on the Solar Power Sail Mission." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-60501.
Full textAmsaad, Fathi Hassan Mohamed. "A Trusted and Efficient Security Approach for the Detection of Hardware Trojans and Authentication of FPGA-based Systems." University of Toledo / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1512494875469127.
Full textDubell, Michael, and David Johansson. "Nätverkssäkerhet med IPS : Förbättrad nätverkssäkerhet med Intrusion Prevention Systems." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23347.
Full textBowman, David C. "Image Stitching and Matching Tool in the Automated Iterative Reverse Engineer (AIRE) Integrated Circuit Analysis Suite." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1533766175549951.
Full textFrisk, Ulf, and Semir Drocic. "The State of Home Computer Security." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2584.
Full textHundreds of millions of people use their home computers every day for different purposes. Many of them are connected to the Internet. Most of them are unaware of the threats or do not know how to protect themselves. This unawareness is a major threat to global computer security.
This master thesis starts by explaining some security related terms that might be unknown to the reader. It then goes on by addressing security vulnerabilities and flaws in the most popular home computer operating systems. The most important threats to home computer security are reviewed in the following chapter. These threats include worms, email worms, spyware and trojan horses. After this chapter some possible solutions for improving home computer security are presented. Finally this master thesis contains a short user survey to find out what the problems are in the real world and what can be doneto improve the current situation.
Hastings, Adam Kendall. "Assuring Intellectual Property Through Physical and Functional Comparisons." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/7035.
Full textJacob, Kabakci Nisha [Verfasser], Georg [Akademischer Betreuer] Sigl, Georg [Gutachter] Sigl, and Sebastian [Gutachter] Steinhorst. "Hardware Trojans and their Security Impact on Reconfigurable System-on-Chips / Nisha Jacob Kabakci ; Gutachter: Georg Sigl, Sebastian Steinhorst ; Betreuer: Georg Sigl." München : Universitätsbibliothek der TU München, 2020. http://d-nb.info/1220319899/34.
Full textWeidler, Nathanael R. "Built-In Return-Oriented Programs in Embedded Systems and Deep Learning for Hardware Trojan Detection." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7620.
Full textBanga, Mainak. "Testing and Verification Strategies for Enhancing Trust in Third Party IPs." Diss., Virginia Tech, 2010. http://hdl.handle.net/10919/30085.
Full textPh. D.
Tselekounis, Ioannis. "Cryptographic techniques for hardware security." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/33148.
Full textBoraten, Travis Henry. "Hardware Security Threat and Mitigation Techniques for Network-on-Chips." Ohio University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1596031630118173.
Full textFarag, Mohammed Morsy Naeem. "Architectural Enhancements to Increase Trust in Cyber-Physical Systems Containing Untrusted Software and Hardware." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/29084.
Full textPh. D.
Hill, Jeremy Michael Olivar. "Detection of Avionics Supply Chain Non-control-flow Malware Using Binary Decompilation and Wavelet Analysis." University of Dayton / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1628159084278194.
Full textLejdemalm, Roger, and Daniel Andreasson. "Skadlig kod och sårbarheter i Windows : En studie i virusens historia och nutidens olika säkerhetsrisker." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2270.
Full textI dag kan man oftast läsa om olika säkerhetshot och risker en datoranvändare måste tänka på för att inte ge någon utomstående möjlighet att komma åt känslig och/eller privat information. Här talas det om nya virus och nya typer av trojaner som sprids som epidemier över Internet, och i bland handlar det om ett spionprogram som följer med en nedladdad fil. Det är svårt att hålla reda på alla typer av skadlig kod som nämns fast med ökad förståelse ökar också chanserna för att klara sig från smitta. Det har visat sig att utvecklingen av skadlig kod är lika stark som den inom kommersiella mjukvaror. Från persondatorns uppkomst i början av 80-talet och fram till i dag, har utveckling skett i alla områden av den skadliga kod det handlar om strategi, syfte och framförallt ren kodkomplexitet.
Dagens ledande leverantör av operativsystem och webbläsare, Microsoft, lovar allt mer sofistikerade säkerhetslösningar varje gång en ny version av ett program släpps. Framförallt nämndes det i samband med lanseringen av Windows Vista att säkerheten var det som stod högst på listan.
Vi har tillsammans med WM-data i Stockholm tagit fram en programvara för fjärradministration av Windows. Huvudmålet var att med hjälp av våra baskunskaper i programmering skapa ett program för Windows XP och Windows Vista där en rad funktioner skulle kunna fjärrstyras utan att en användare vid den drabbade datorn upptäckte intrånget.
I denna rapport beskrivs utvecklingen av programvaran och de tester som gjorts på de båda operativsystemen. Vidare delas begreppet ”skadlig kod” upp i kategorierna virus, maskar, trojaner samt rootkits och förklaras mer ingående tillsammans med en historisk bild över hur utvecklingen av skadlig kod har sett ut.
In media today, you often read about different security threats and risks that one has to be aware of. Many things must be taken into consideration in order to maintain your integrity and information secrecy. It might be new virus outbreak, a new trojan or some kind of spy ware that undetected finds the way to your computer. It’s hard to keep track of all terms and types of malicious code, and with greater understanding, the risk of infection decreases. The development when it comes to malicious code is as strong as the one in commercial software development. From the 80’s until present day, every area in the development of malicious code has evolved, from strategy and purpose to the pure complexity of the code.
Microsoft, the worlds leading supplier of operating systems and web browsers, ensure us with every new release, that measures has been taken in order to enhance the security features. As the new operating system Windows Vista was released, spokesmen said that the security was now the highest priority.
We have, together with WM-data in Stockholm, developed software for remote administration of Windows. The objectives where by using our limited programming skills only, to come up with a program for Windows XP and Windows Vista, where a number of functions could be remotely executed without alerting a user at the infected computer.
This report describes the development of the software together with test results of execution on both operating systems. Further on, the report discusses different types of malicious code, such as viruses, worms, Trojans and root kits, together with a historical study of the development of malicious code.
Venugopalan, Vivek. "Enhancing Trust in Reconfigurable Hardware Systems." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/75212.
Full textPh. D.
Ba, Papa-Sidy. "Détection et prévention de Cheval de Troie Matériel (CTM) par des méthodes Orientées Test Logique." Thesis, Montpellier, 2016. http://www.theses.fr/2016MONTT271/document.
Full textIn order to reduce the production costs of integrated circuits (ICs), outsourcing the fabrication process has become a major trend in the Integrated Circuits (ICs) industry. As an inevitable unwanted side effect, this outsourcing business model increases threats to hardware products. This process raises the issue of un-trusted foundries in which, circuit descriptions can be manipulated with the aim to possibly insert malicious circuitry or alterations, referred to as Hardware Trojan Horses (HTHs). This motivates semiconductor industries and researchers to study and investigate solutions for detecting during testing and prevent during fabrication, HTH insertion.However, considering the stealthy nature of HTs, it is quite impossible to detect them with conventional testing or even with random patterns. This motivates us to make some contributions in this thesis by proposing solutions to detect and prevent HTH after fabrication (during testing).The proposed methods help to detect HTH as well during testing as during normal mode(run-time), and they are logic testing based.Furthermore, we propose prevention methods, which are also logic testing based, in order tomake harder or quasi impossible the insertion of HTH both in netlist and layout levels
Blikstein, Paulo 1972. "The Trojan horse as a Trojan horse." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/61130.
Full textIncludes bibliographical references (leaves 136-140).
This thesis proposes a framework to model intervention in education systems using technology: the Learning Atmosphere. The motivation is to show that innovative learning with expressive technologies can happen even in economically disadvantaged regions, such as public education systems in Brazil, where our case studies took place. The contribution of the thesis is to explore ways in which mutual enrichment can be achieved through collective displacements of habits and mindsets taken for granted. The case studies demonstrate the importance and possibility of a powerful learning experience that builds up from the local culture and expertise, elements often disregarded in schools. Technology plays a central role, enabling diverse and innovative ways of working, expressing and building. In addition, it makes possible epistemological diversity, empowering of students and fulfillment to teachers, reinforcing the community's own livelihood. The core elements within the Learning Atmosphere are: -- Enhance the concept of generative themes using technology. -- Mix and match expressive media, especially low-cost technologies. -- Invest on relationship building and challenge established power relations. The legend of the Trojan Horse has the important role of warning us against the easy way into schools, the trivialization of ideas and the superficial experiences that do not change the praxis and mindsets in schools.
Paulo Blikstein.
S.M.
Geigel, Arturo. "Unsupervised Learning Trojan." NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/17.
Full textLafrenz, Nicholas K. "Trojan Circuit Simulation and Evaluation." Cleveland, Ohio : Case Western Reserve University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=case1265900150.
Full textDepartment of EECS - Computer Engineering Title from PDF (viewed on 2010-05-25) Includes abstract Includes bibliographical references and appendices Available online via the OhioLINK ETD Center
Badier, Hannah. "Transient obfuscation for HLS security : application to cloud security, birthmarking and hardware Trojan defense." Thesis, Brest, École nationale supérieure de techniques avancées Bretagne, 2021. https://tel.archives-ouvertes.fr/tel-03789700.
Full textThe growing globalization of the semiconductor supply chain, as well as the increasing complexity and diversity of hardware design flows, have lead to a surge in security threats: risks of intellectual property theft and reselling, reverse-engineering and malicious code insertion in the form of hardware Trojans during manufacturing and at design time have been a growing research focus in the past years. However, threats during highlevel synthesis (HLS), where an algorithmic description is transformed into a lower level hardware implementation, have only recently been considered, and few solutions have been given so far. In this thesis, we focus on how to secure designs during behavioral synthesis using either a cloud-based or an internal but untrusted HLS tool. We introduce a novel design time protection method called transient obfuscation, where the high-level source code is obfuscated using key-based techniques, and deobfuscated after HLS at register-transfer level. This two-step method ensures correct design functionality and low design overhead. We propose three ways to integrate transient obfuscation in different security mechanisms. First, we show how it can be used to prevent intellectual property theft and illegal reuse in a cloud-based HLS scenario. Then, we extend this work to watermarking, by exploiting the side-effects of transient obfuscation on HLS tools to identify stolen designs. Finally, we show how this method can also be used against hardware Trojans, both by preventing insertion and by facilitating detection
Russell, April A. (April Anne) 1981. "Trojan asteroid spectroscopy and space weathering." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/28614.
Full textIncludes bibliographical references (leaves 48-49).
Trojan asteroids orbit the Sun at Jupiter's L4 and L5 stability points. They are included in the D-class group of asteroids because of their characteristically steep spectral slope. In accordance with spectra of other asteroid classes, we expected that the larger the diameter is of a D-class asteroid, the redder (visually) the asteroid should be in the visible spectrum. Approximately ninety Trojan asteroids have been examined, fourteen of which come from our own observations, and five of which are small and come from the SMASS I data set. The results did not confirm our original hypothesis. Instead, space weathering appears to affect Trojans in a different way than it does other asteroid classes due to their different composition.
by April A. Russell.
S.M.
Waegner, Rena Hinrika [Verfasser], Lutz [Akademischer Betreuer] Trojan, and Carsten [Akademischer Betreuer] Gründker. "Expression von RANK / RANKL im Harnblasenkarzinom / Rena Hinrika Waegner. Betreuer: Lutz Trojan. Gutachter: Lutz Trojan ; Carsten Gründker." Göttingen : Niedersächsische Staats- und Universitätsbibliothek Göttingen, 2015. http://d-nb.info/1080361693/34.
Full textOtterheim, Lena Royalz. "Den Trojanska Hästen." Thesis, Konstfack, Textil, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:konstfack:diva-7176.
Full textGeller, Grace. "Translations and adaptations of Euripides' Trojan Women /." Norton, Mass. : Wheaton College, 2010. http://hdl.handle.net/10090/15122.
Full textCeccaroni, Marta. "Natural and perturbed dynamics about Trojan bodies." Thesis, University of Strathclyde, 2013. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=20280.
Full textMischel, Magnus. "Heuristisk detektering av trojaner." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2826.
Full textThe heuristic methods used by the anti-trojan application TrojanHunter have been evaluated. The evaluation shows that the heuristic scan engine of TrojanHunter has a very good detection ratio and that the detection ratio can be even further improved by implementing the suggested improvements, the most important of which is a white list to avoid misidentifying files that are known not to be trojans.
Hadjicosti, Ioanna. "Aischylos and the Trojan cycle : the lost tragedies." Thesis, University College London (University of London), 2008. http://discovery.ucl.ac.uk/1443963/.
Full textTrojan, Adam Janusz [Verfasser]. "Leberteilresektion bei Kindern und Jugendlichen / Adam Janusz Trojan." Berlin : Medizinische Fakultät Charité - Universitätsmedizin Berlin, 2019. http://d-nb.info/1180388038/34.
Full textDeet, April A. (April Anne). "Effects of space weathering on the Trojan asteroids." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/117441.
Full textCataloged from PDF version of thesis. "The pagination in this thesis reflects how it was delivered to the Institute Archives and Special Collections. Thesis was submitted to the Institute Archives without all the required signatures"--Disclaimer Notice page.
Includes bibliographical references (page 40).
Trojan asteroids orbit at Jupiter's L4 and L5 points. They are included in the D-class of asteroids because of their steep spectral slope. According to spectra of other asteroid classes, the larger the diameter is of a D-class asteroid, the redder the asteroid should be in the visible spectrum. We examined a total of fifteen asteroids, five (from the SMASS 1 data set) were small, and ten (newly collected data) were large. The actual results did not match our expected results, most likely due to the large error bars and the small data set. Space weathering may affect Trojans in the same way as it does other asteroid classes. To know with certainty, further investigation is needed.
by April A. Deet.
S.B.
Coo, Lyndsay Mei-Ling. "Sophocles' Trojan fragments : a commentary on selected plays." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609525.
Full textDivakarla, Shiva Kamini. "Ion Implanted ‘Trojan Horse’ surfaces with antimicrobial activity." Thesis, The University of Sydney, 2018. http://hdl.handle.net/2123/18661.
Full textRudolph, Nicole [Verfasser], Lutz [Akademischer Betreuer] Trojan, Lutz [Gutachter] Trojan, and Günter [Gutachter] Emons. "Der Östrogenrezeptor ERβ unter dem Einfluss selektiver Östrogenrezeptorliganden in kastrationsresistenten Prostatakarzinomzellen / Nicole Rudolph ; Gutachter: Lutz Trojan, Günter Emons ; Betreuer: Lutz Trojan." Göttingen : Niedersächsische Staats- und Universitätsbibliothek Göttingen, 2020. http://d-nb.info/1213520460/34.
Full textCourbon, Franck. "Rétro-conception matérielle partielle appliquée à l'injection ciblée de fautes laser et à la détection efficace de Chevaux de Troie Matériels." Thesis, Saint-Etienne, EMSE, 2015. http://www.theses.fr/2015EMSE0788/document.
Full textThe work described in this thesis covers an integrated circuit characterization methodology based on a partial hardware reverse engineering. On one hand in order to improve integrated circuit security characterization, on the other hand in order to detect the presence of Hardware Trojans. Our approach is said partial as it is only based on a single hardware layer of the component and also because it does not aim to recreate a schematic or functional description of the whole circuit. A low cost, fast and efficient reverse engineering methodology is proposed. The latter enables to get a global image of the circuit where only transistor's active regions are visible. It thus allows localizing every standard cell. The implementation of this methodology is applied over different secure devices. The obtained image according to the methodology declined earlier is processed in order to spatially localize sensible standard cells, nay critical in terms of security. Once these cells identified, we characterize the laser effect over different location of these standard cells and we show the possibility with the help of laser fault injection the value they contain. The technique is novel as it validates the fault model over a complex gate in 90nm technology node.Finally, a Hardware Trojan detection method is proposed using the partial reverse engineering output. We highlight the addition of few non listed cells with the application on a couple of circuits. The method implementation therefore permits to detect, without full reverse-engineering (and so cheaply), quickly and efficiently the presence of Hardware Trojans
Sanderson, Thomas J. "Exploring design concepts for siderophore-fluoroquinolone Trojan horse antimicrobials." Thesis, University of York, 2016. http://etheses.whiterose.ac.uk/15811/.
Full textHerzogenrath, Bern. "trumped!: remote|control, 2 trojan horses (and 3 knocks)." Universität Leipzig, 2020. https://ul.qucosa.de/id/qucosa%3A71590.
Full textDu, Dongdong. "Hardware Trojan Detection Using Multiple-Parameter Side-Channel Analysis." Case Western Reserve University School of Graduate Studies / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=case1278702158.
Full textAli, Stuart Alvaro. "Transferrin trojan horses : a novel approach for drug delivery?" Thesis, Brunel University, 1999. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.285047.
Full text