Índice

  1. Tesis

Literatura académica sobre el tema "3D security"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "3D security".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Tesis sobre el tema "3D security"

1

Rolland-Nevière, Xavier. "Tatouage 3D robuste." Thesis, Nice, 2014. http://www.theses.fr/2014NICE4083/document.

Texto completo
Resumen
Les modèles 3D sont des contenus précieux très utilisés dans l'industrie, et donc la cible potentielle de piratages. Le tatouage robuste pour les maillages 3D apporte une réponse au problème du traçage de traître. Dans l'état de l'art du domaine, la couche d'adaptation du contenu en particulier est testée face des attaques standards. Une approche robuste à la pose est alors étudiée. Elle utilise une estimation robuste de l'épaisseur, définie comme la distance un nuage de points construits à partir de mesures du diamètre. Les performances expérimentales montrent qu'elle forme un point de départ
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Musa, Shahrulniza. "Visualising network security attacks with multiple 3D visualisation and false alert classification." Thesis, Loughborough University, 2008. https://dspace.lboro.ac.uk/2134/14241.

Texto completo
Resumen
Increasing numbers of alerts produced by network intrusion detection systems (NIDS) have burdened the job of security analysts especially in identifying and responding to them. The tasks of exploring and analysing large quantities of communication network security data are also difficult. This thesis studied the application of visualisation in combination with alerts classifier to make the exploring and understanding of network security alerts data faster and easier. The prototype software, NSAViz, has been developed to visualise and to provide an intuitive presentation of the network security
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Nunnally, Troy J. "Advanced visualizations for network security." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52993.

Texto completo
Resumen
Monitoring volumes of malicious network data for across multiple sources can potentially be overwhelming. As a result, vital data is at a greater risk of being overlooked and the time span for analyzing it could be too lengthy. One way to address this issue is to employ network security visualization techniques to evaluate security risks and identify malicious activity to help mitigate compromised nodes on a network. The purpose of this thesis is to introduce a visualization framework to help reduce task-completion time, enhance situational awareness, and decrease user error of complex visua
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Bishop, Craig, Ian Armstrong, and Rolando Navarette. "A Novel Method for 3D Printing High Conductivity Alloys for UHF Applications." International Foundation for Telemetering, 2014. http://hdl.handle.net/10150/577400.

Texto completo
Resumen
ITC/USA 2014 Conference Proceedings / The Fiftieth Annual International Telemetering Conference and Technical Exhibition / October 20-23, 2014 / Town and Country Resort & Convention Center, San Diego, CA<br>Traditional approaches to constructing 3D structural electronics with conductive and dielectric materials include ink-jet printed, silver-bearing ink and fine copper wire meshes. One approach combines stereo-lithographic 3D-printed photo-polymers with direct-printed silver-bearing conductive inks. Results have shown 3D conductive structures with conductivities in the range 2x10⁶ to 1x10⁷ S/
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Thomas, Andrew Scott. "Exploring the Efficiency of Software-Defined Radios in 3D Heat Mapping." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/7754.

Texto completo
Resumen
A common method of connecting to the internet is a wireless network. These networks can be monitored to discover the area of their coverage, but commercial receivers don't always provide the most accurate results. A software-defined radio was programmed to sniff wireless signals and tested against a commercial receiver and the results were compared. The results suggest that the software-defined radio performs at least as well as the commercial receiver in distance measurements and significantly better in samples taken per minute. It was determined that the software-defined radio is a viable re
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Mouton, Andre. "On artefact reduction, segmentation and classification of 3D computed tomography imagery in baggage security screening." Thesis, Cranfield University, 2014. http://dspace.lib.cranfield.ac.uk/handle/1826/8501.

Texto completo
Resumen
This work considers novel image-processing and computer-vision techniques to advance the automated analysis of low-resolution, complex 3D volumetric Computed Tomography (CT) imagery obtained in the aviation-security-screening domain. Novel research is conducted in three key areas: image quality improvement, segmentation and classification. A sinogram-completion Metal Artefact Reduction (MAR) technique is presented. The presence of multiple metal objects in the scanning Field of View (FoV) is accounted for via a distance-driven weighting scheme. The technique is shown to perform comparably to t
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Norwood, Charles Ellis. "Demonstration of Vulnerabilities in Globally Distributed Additive Manufacturing." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/99104.

Texto completo
Resumen
Globally distributed additive manufacturing is a relatively new frontier in the field of product lifecycle management. Designers are independent of additive manufacturing services, often thousands of miles apart. Manufacturing data must be transmitted electronically from designer to manufacturer to realize the benefits of such a system. Unalterable blockchain legers can record transactions between customers, designers, and manufacturers allowing each to trust the other two without needing to be familiar with each other. Although trust can be established, malicious printers or customers sti
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Peña, Guevara Javier Nilo, Acuña Leslie Dueñas, and Lynch Oscar Dupuy. "Distribuidores exclusivos de la marca MADPAX en el Perú." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2018. http://hdl.handle.net/10757/626040.

Texto completo
Resumen
Esta investigación plantea un escenario de negocio de importación de ventas minorista, dónde la idea del negocio es distribuir de manera exclusiva una marca de mochilas con modelos innovadores líder en el mercado extranjero al mercado nacional, a fin de poder construir una identidad que sitúe la marca en el top of mind de nuestro mercado objetivo. Este trabajo está estructurado con los siguientes temas que representan cada uno un capítulo de esta investigación los cuales son: los aspectos generales del negocio con visión global, planeamiento estratégico analizando los factores internos y
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Beugnon, Sébastien. "Sécurisation des maillages 3D pour l'industrie de la chaussure et la maroquinerie." Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS097.

Texto completo
Resumen
Avec l'augmentation des échanges de données et les évolutions technologiques et sociales récentes, les contenus multimédias prennent une place importante dans le trafic mondial. Aujourd'hui, les objets 3D sont utilisés dans un large nombre d'applications, par exemple, les applications médicales, les simulations, les jeux vidéo, l'animation et les effets spéciaux. La consommation d'objets 3D par le grand public est devenue un marché lucratif pouvant prendre la forme de plateformes de téléchargement d'objets 3D dans différents formats.Cette thèse, en collaboration avec la société STRATEGIES, con
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Itier, Vincent. "Nouvelles méthodes de synchronisation de nuages de points 3D pour l'insertion de données cachées." Thesis, Montpellier, 2015. http://www.theses.fr/2015MONTS017/document.

Texto completo
Resumen
Cette thèse aborde les problèmes liés à la protection de maillages d'objets 3D. Ces objets peuvent, par exemple, être créés à l'aide d'outil de CAD développés par la société STRATEGIES. Dans un cadre industriel, les créateurs de maillages 3D ont besoin de disposer d'outils leur permettant de vérifier l'intégrité des maillages, ou de vérifier des autorisations pour l'impression 3D par exemple. Dans ce contexte nous étudions l'insertion de données cachées dans des maillages 3D. Cette approche permet d'insérer de façon imperceptible et sécurisée de l'information dans un maillage. Il peut s'agir d
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!