Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Malicious attacks.

Rozprawy doktorskie na temat „Malicious attacks”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Malicious attacks”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Opie, Jake Weyman. "Securing softswitches from malicious attacks." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1007714.

Pełny tekst źródła
Streszczenie:
Traditionally, real-time communication, such as voice calls, has run on separate, closed networks. Of all the limitations that these networks had, the ability of malicious attacks to cripple communication was not a crucial one. This situation has changed radically now that real-time communication and data have merged to share the same network. The objective of this project is to investigate the securing of softswitches with functionality similar to Private Branch Exchanges (PBX) from malicious attacks. The focus of the project will be a practical investigation of how to secure ILANGA, an ASTER
Style APA, Harvard, Vancouver, ISO itp.
2

Abu-Bakar, Kamalrulnizam. "Protecting agents against malicious host attacks." Thesis, Aston University, 2004. http://publications.aston.ac.uk/10612/.

Pełny tekst źródła
Streszczenie:
The introduction of agent technology raises several security issues that are beyond conventional security mechanisms capability and considerations, but research in protecting the agent from malicious host attack is evolving. This research proposes two approaches to protecting an agent from being attacked by a malicious host. The first approach consists of an obfuscation algorithm that is able to protect the confidentiality of an agent and make it more difficult for a malicious host to spy on the agent. The algorithm uses multiple polynomial functions with multiple random inputs to convert an a
Style APA, Harvard, Vancouver, ISO itp.
3

Fischer, Benjamin. "Vehicular Group Membership Resilient to Malicious Attacks." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158086.

Pełny tekst źródła
Streszczenie:
There is a range of tools and techniques in the realm of information security that can be used to enhance the security of a distributed network protocol and some of them introduce new problems. A security analysis of the distributed network protocol SLMP is made and three vulnerabilities are identified; messages can be intercepted and tampered with, nodes can fake id, and leader nodes can do a lot of harm if they are malicious. Three versions of SLMP that aims to remedy these vulnerabilities are implemented and the results show that while they remedy the vulnerabilities some of them introduce
Style APA, Harvard, Vancouver, ISO itp.
4

Casile, Roberta <1986&gt. "GNSS interference management techniques against malicious attacks." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/7025/1/Casile_Roberta_tesi.pdf.

Pełny tekst źródła
Streszczenie:
This thesis collects the outcomes of a Ph.D. course in Telecommunications Engineering and it is focused on the study and design of possible techniques able to counteract interference signal in Global Navigation Satellite System (GNSS) systems. The subject is the jamming threat in navigation systems, that has become a very increasingly important topic in recent years, due to the wide diffusion of GNSS-based civil applications. Detection and mitigation techniques are developed in order to fight out jamming signals, tested in different scenarios and including sophisticated signals. The thesis i
Style APA, Harvard, Vancouver, ISO itp.
5

Casile, Roberta <1986&gt. "GNSS interference management techniques against malicious attacks." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/7025/.

Pełny tekst źródła
Streszczenie:
This thesis collects the outcomes of a Ph.D. course in Telecommunications Engineering and it is focused on the study and design of possible techniques able to counteract interference signal in Global Navigation Satellite System (GNSS) systems. The subject is the jamming threat in navigation systems, that has become a very increasingly important topic in recent years, due to the wide diffusion of GNSS-based civil applications. Detection and mitigation techniques are developed in order to fight out jamming signals, tested in different scenarios and including sophisticated signals. The thesis i
Style APA, Harvard, Vancouver, ISO itp.
6

Sivakumaran, Arun. "Malicious user attacks in decentralised cognitive radio networks." Diss., University of Pretoria, 2020. http://hdl.handle.net/2263/79657.

Pełny tekst źródła
Streszczenie:
Cognitive radio networks (CRNs) have emerged as a solution for the looming spectrum crunch caused by the rapid adoption of wireless devices over the previous decade. This technology enables efficient spectrum utility by dynamically reusing existing spectral bands. A CRN achieves this by requiring its users – called secondary users (SUs) – to measure and opportunistically utilise the band of a legacy broadcaster – called a primary user (PU) – in a process called spectrum sensing. Sensing requires the distribution and fusion of measurements from all SUs, which is facilitated by a variety of arch
Style APA, Harvard, Vancouver, ISO itp.
7

Mahlburg, Karl. "Structure Attacks in Cryptographic Protocols." Scholarship @ Claremont, 2001. https://scholarship.claremont.edu/hmc_theses/130.

Pełny tekst źródła
Streszczenie:
Cryptographic protocols are in general difficult to analyze, and complicated attacks exposing security flaws have remained hidden years after a protocol is developed. Recently developed tools such as strand spaces and inductive logical proofs provide mechanical procedures for analyzing protocols. The key to these methods is that a generous upper bound on the activity of a malicious penetrator is often much easier to work with than a tighter bound. However, these formalizations make strong assumptions about the algebraic structure of the cryptosystem that are never met in a real application. In
Style APA, Harvard, Vancouver, ISO itp.
8

Narasimhan, Mayur Harn Lein. "Protecting a mobile agent from colluded truncation attacks by malicious hosts." Diss., UMK access, 2007.

Znajdź pełny tekst źródła
Streszczenie:
Thesis (M.S.)--School of Computing and Engineering. University of Missouri--Kansas City, 2007.<br>"A thesis in computer science." Typescript. Advisor: Lein Harn. Vita. Title from "catalog record" of the print edition Description based on contents viewed May 23, 2008. Includes bibliographical references (leaves 57-58). Online version of the print edition.
Style APA, Harvard, Vancouver, ISO itp.
9

Jolley, Jason. "Attribution, state responsibility, and the duty to prevent malicious cyber-attacks in international law." Thesis, University of Glasgow, 2017. http://theses.gla.ac.uk/8452/.

Pełny tekst źródła
Streszczenie:
Malicious cyber-attacks, those cyber-attacks which do not rise to the level of force in international law, pose a significant problem to the international community. Attributing responsibility for malicious cyber-attacks is imperative if states are to respond and prevent the attacks from continuing. Unfortunately, due to both technical and legal issues attributing malicious cyber-attacks to the responsible state or non-state actor is difficult if not impossible in the vast majority of attacks. Even if an injured state may recursively trace the malicious cyber-attack to the responsible IP addre
Style APA, Harvard, Vancouver, ISO itp.
10

Likarish, Peter F. "Early detection of malicious web content with applied machine learning." Diss., University of Iowa, 2011. https://ir.uiowa.edu/etd/4871.

Pełny tekst źródła
Streszczenie:
This thesis explores the use of applied machine learning techniques to augment traditional methods of identifying and preventing web-based attacks. Several factors complicate the identification of web-based attacks. The first is the scale of the web. The amount of data on the web and the heterogeneous nature of this data complicate efforts to distinguish between benign sites and attack sites. Second, an attacker may duplicate their attack at multiple, unexpected locations (multiple URLs spread across different domains) wit
Style APA, Harvard, Vancouver, ISO itp.
11

Srivastava, Abhinav. "Robust and secure monitoring and attribution of malicious behaviors." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41161.

Pełny tekst źródła
Streszczenie:
Worldwide computer systems continue to execute malicious software that degrades the systemsâ performance and consumes network capacity by generating high volumes of unwanted traffic. Network-based detectors can effectively identify machines participating in the ongoing attacks by monitoring the traffic to and from the systems. But, network detection alone is not enough; it does not improve the operation of the Internet or the health of other machines connected to the network. We must identify malicious code running on infected systems, participating in global attack networks. This dissertat
Style APA, Harvard, Vancouver, ISO itp.
12

Kambhampaty, Krishna Kanth. "Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices." Diss., North Dakota State University, 2019. https://hdl.handle.net/10365/29914.

Pełny tekst źródła
Streszczenie:
There are a variety of communication mediums or devices for interaction. Users hop from one medium to another frequently. Though the increase in the number of devices brings convenience, it also raises security concerns. Provision of platform to users is as much important as its security. In this dissertation we propose a security approach that captures user behavior for identifying malicious activities. System users exhibit certain behavioral patterns while utilizing the resources. User behaviors such as device location, accessing certain files in a server, using a designated or specific use
Style APA, Harvard, Vancouver, ISO itp.
13

Khraisat, Ansam. "Intelligent zero-day intrusion detection framework for internet of things." Thesis, Federation University Australia, 2020. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/179729.

Pełny tekst źródła
Streszczenie:
Zero-day intrusion detection system faces serious challenges as hundreds of thousands of new instances of malware are being created every day to cause harm or damage to the computer system. Cyber-attacks are becoming more sophisticated, leading to challenges in intrusion detection. There are many Intrusion Detection Systems (IDSs), which are proposed to identify abnormal activities, but most of these IDSs produce a large number of false positives and low detection accuracy. Hence, a significant quantity of false positives could generate a high-level of alerts in a short period of time as the n
Style APA, Harvard, Vancouver, ISO itp.
14

Alberdi, Ion. "Malicious trafic observation using a framework to parallelize and compose midpoint inspection devices." Thesis, Toulouse, INSA, 2010. http://www.theses.fr/2010ISAT0008/document.

Pełny tekst źródła
Streszczenie:
Notre thèse stipule qu'au vu de l'ampleur des agissements malveillants dans l'Internet, les logiciels d'extrémité doivent être surveillés. Pour limiter le nombre de points de surveillance, nous proposons de surveiller les logiciels depuis un point d'interconnexion. Nous avons dans ce but conçu Luth, un outil permettant de composer et de paralléliser un ensemble d'inspecteurs de points d'interconnexion (appelés MI) qui implémentent des mini IDS, IPS ou pare-feux, tout en vérifiant la correction et l'optimalité de ces derniers, à l'aide d'un langage de configuration et des algorithmes associés.
Style APA, Harvard, Vancouver, ISO itp.
15

Alberdi, Ion. "Malicious trafic observation using a framework to parallelize and compose midpoint inspection devices." Electronic Thesis or Diss., Toulouse, INSA, 2010. http://www.theses.fr/2010ISAT0008.

Pełny tekst źródła
Streszczenie:
Notre thèse stipule qu'au vu de l'ampleur des agissements malveillants dans l'Internet, les logiciels d'extrémité doivent être surveillés. Pour limiter le nombre de points de surveillance, nous proposons de surveiller les logiciels depuis un point d'interconnexion. Nous avons dans ce but conçu Luth, un outil permettant de composer et de paralléliser un ensemble d'inspecteurs de points d'interconnexion (appelés MI) qui implémentent des mini IDS, IPS ou pare-feux, tout en vérifiant la correction et l'optimalité de ces derniers, à l'aide d'un langage de configuration et des algorithmes associés.
Style APA, Harvard, Vancouver, ISO itp.
16

Leithead, Travis S. "Challenging Policies That Do Not Play Fair: A Credential Relevancy Framework Using Trust Negotiation Ontologies." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd1007.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Canali, Davide. "Plusieurs axes d'analyse de sites web compromis et malicieux." Thesis, Paris, ENST, 2014. http://www.theses.fr/2014ENST0009/document.

Pełny tekst źródła
Streszczenie:
L'incroyable développement du World Wide Web a permis la création de nouveaux métiers, services, ainsi que de nouveaux moyens de partage de connaissance. Le web attire aussi des malfaiteurs, qui le considèrent comme un moyen pour gagner de l'argent en exploitant les services et la propriété d'autrui. Cette thèse propose une étude des sites web compromis et malicieux sous plusieurs axes d'analyse. Même si les attaques web peuvent être de nature très compliquées, on peut quasiment toujours identifier quatre acteurs principaux dans chaque cas. Ceux sont les attaquants, les sites vulnérables héber
Style APA, Harvard, Vancouver, ISO itp.
18

Canali, Davide. "Plusieurs axes d'analyse de sites web compromis et malicieux." Electronic Thesis or Diss., Paris, ENST, 2014. http://www.theses.fr/2014ENST0009.

Pełny tekst źródła
Streszczenie:
L'incroyable développement du World Wide Web a permis la création de nouveaux métiers, services, ainsi que de nouveaux moyens de partage de connaissance. Le web attire aussi des malfaiteurs, qui le considèrent comme un moyen pour gagner de l'argent en exploitant les services et la propriété d'autrui. Cette thèse propose une étude des sites web compromis et malicieux sous plusieurs axes d'analyse. Même si les attaques web peuvent être de nature très compliquées, on peut quasiment toujours identifier quatre acteurs principaux dans chaque cas. Ceux sont les attaquants, les sites vulnérables héber
Style APA, Harvard, Vancouver, ISO itp.
19

Andersson, Stig. "Detecting and characterising malicious executable payloads." Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/30325/1/Stig_Andersson_Thesis.pdf.

Pełny tekst źródła
Streszczenie:
Buffer overflow vulnerabilities continue to prevail and the sophistication of attacks targeting these vulnerabilities is continuously increasing. As a successful attack of this type has the potential to completely compromise the integrity of the targeted host, early detection is vital. This thesis examines generic approaches for detecting executable payload attacks, without prior knowledge of the implementation of the attack, in such a way that new and previously unseen attacks are detectable. Executable payloads are analysed in detail for attacks targeting the Linux and Windows operating syst
Style APA, Harvard, Vancouver, ISO itp.
20

Andersson, Stig. "Detecting and characterising malicious executable payloads." Queensland University of Technology, 2009. http://eprints.qut.edu.au/30325/.

Pełny tekst źródła
Streszczenie:
Buffer overflow vulnerabilities continue to prevail and the sophistication of attacks targeting these vulnerabilities is continuously increasing. As a successful attack of this type has the potential to completely compromise the integrity of the targeted host, early detection is vital. This thesis examines generic approaches for detecting executable payload attacks, without prior knowledge of the implementation of the attack, in such a way that new and previously unseen attacks are detectable. Executable payloads are analysed in detail for attacks targeting the Linux and Windows operating syst
Style APA, Harvard, Vancouver, ISO itp.
21

Prathapani, Anoosha. "Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1289939348.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Yu, Yue. "Resilience Strategies for Network Challenge Detection, Identification and Remediation." Thesis, The University of Sydney, 2013. http://hdl.handle.net/2123/10277.

Pełny tekst źródła
Streszczenie:
The enormous growth of the Internet and its use in everyday life make it an attractive target for malicious users. As the network becomes more complex and sophisticated it becomes more vulnerable to attack. There is a pressing need for the future internet to be resilient, manageable and secure. Our research is on distributed challenge detection and is part of the EU Resumenet Project (Resilience and Survivability for Future Networking: Framework, Mechanisms and Experimental Evaluation). It aims to make networks more resilient to a wide range of challenges including malicious attacks, misconfig
Style APA, Harvard, Vancouver, ISO itp.
23

Sung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.

Pełny tekst źródła
Streszczenie:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2007.<br>Xu, Jun, Committee Chair ; Ahamad, Mustaque, Committee Member ; Ammar, Mostafa, Committee Member ; Bing, Benny, Committee Member ; Zegura, Ellen, Committee Member.
Style APA, Harvard, Vancouver, ISO itp.
24

Langer, André, and Tom Kühnert. "Security issues in Address Autoconfiguration Protocols." Universitätsbibliothek Chemnitz, 2007. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200700491.

Pełny tekst źródła
Streszczenie:
Dynamic address assignment is one of the most important features in wireless ad hoc networks if nodes should be enabled to join and to work in the network by automatically configuring all necessary settings. Different approaches have been developed throughout the last years to achieve this objective of Dynamic Address Autoconfiguration but research primarily focused on efficiency and correctness, less on security issues. Whereas Duplicate Address Detection has become reliable in commonplace scenarios, it is still relatively easy to suspend the whole network functionality in extraordinary situa
Style APA, Harvard, Vancouver, ISO itp.
25

FAVALE, THOMAS. "Strengthening Privacy and Cybersecurity through Anonymization and Big Data." Doctoral thesis, Politecnico di Torino, 2023. https://hdl.handle.net/11583/2975701.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

KALLAS, KASSEM. "A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks." Doctoral thesis, Università di Siena, 2017. http://hdl.handle.net/11365/1005735.

Pełny tekst źródła
Streszczenie:
Every day we share our personal information through digital systems which are constantly exposed to threats. For this reason, security-oriented disciplines of signal processing have received increasing attention in the last decades: multimedia forensics, digital watermarking, biometrics, network monitoring, steganography and steganalysis are just a few examples. Even though each of these fields has its own peculiarities, they all have to deal with a common problem: the presence of one or more adversaries aiming at making the system fail. Adversarial Signal Processing lays the basis of a genera
Style APA, Harvard, Vancouver, ISO itp.
27

Chang, Chung-Cheng, and 張仲丞. "Withstanding Malicious RREQ Packets Flooding Attacks in MANET." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/06901169012462375417.

Pełny tekst źródła
Streszczenie:
碩士<br>國立清華大學<br>資訊工程學系<br>95<br>Mobile ad hoc network (MANET) is a group of mobile wireless nodes that communicate with each other without the aid of the infrastructure such as base station. It has been used in many applications, for example, military application, personal electronic device, ad hoc meeting, etc. Because of the shortcoming of the routing protocol, MANET is vulnerable to some kinds of attacks. Black hole attack, gray hole attack, wormhole attack, traffic analysis attack, and rushing attack are common attacks in ad hoc network. In this thesis, we introduce a critical attack in MA
Style APA, Harvard, Vancouver, ISO itp.
28

Chien-Hung, Chen. "Maximization of Network Survivability against Intelligent and Malicious Attacks." 2005. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-1707200615234200.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Tsai, Jen-Sheng, and 蔡仁勝. "Feature-Based Multipurpose Image Watermarking Resistant against Malicious Attacks." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/33484253343750229545.

Pełny tekst źródła
Streszczenie:
碩士<br>國立成功大學<br>資訊工程學系碩博士班<br>94<br>In this thesis, a feature-based multipurpose image watermarking algorithm is proposed to achieve the goal of image authentication and protection simultaneously. Copyright protection and ownership verification are usually performed by robust watermarks, and fragile watermarks are mainly applied to content authentication and integrity attestation. The proposed watermarking algorithm uses the Hessian-Affine feature detector to extract the characteristic regions of an image. Then the proposed robust embedded scheme exploits the local orientation of each pixel to
Style APA, Harvard, Vancouver, ISO itp.
30

Chen, Chien-Hung, and 陳建宏. "Maximization of Network Survivability against Intelligent and Malicious Attacks." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/00281366107324361645.

Pełny tekst źródła
Streszczenie:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>94<br>Since the 911 terrorist attacks in the United States, how to protect critical information infrastructures effectively has become an even more important topic. One critical information infrastructure, the Internet, has drawn increasing attention from network security experts because of the growing number of malicious attacks on it. However, experience tells us that, in both theory and practice, a system cannot be 100% secured. Therefore, we should not ask “Is the system secure?” but “How secure is the system?” A quantitative “survivability” concept has become a
Style APA, Harvard, Vancouver, ISO itp.
31

Ramasamy, Harigovind Venkatraj. "Parsimonious service replication for tolerating malicious attacks in asynchronous environments /." 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3223699.

Pełny tekst źródła
Streszczenie:
Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2006.<br>Source: Dissertation Abstracts International, Volume: 67-07, Section: B, page: 3913. Adviser: William H. Sanders. Includes bibliographical references (leaves 189-193) Available on microfilm from Pro Quest Information and Learning.
Style APA, Harvard, Vancouver, ISO itp.
32

Chen, Chun-Wei, and 陳俊維. "Maximization of Network Survival Time upon Intelligent and Malicious Attacks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/54993919407182351736.

Pełny tekst źródła
Streszczenie:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>95<br>No information system in a network is absolutely secure. Sophisticated attackers may adopt various types of hacking techniques, such as staff abuses, system vulnerabilities, dictionary attacks, or brute force attacks, to penetrate and damage the system. Therefore, it is essential that effective defense strategies be devised by network administrators to maximize the survival time of critical/core components in networks upon attacks so as to achieve the longest response time. In this thesis, the problem of maximization of the core node survival time upon in
Style APA, Harvard, Vancouver, ISO itp.
33

Chen, Chun-Wei. "Maximization of Network Survival Time upon Intelligent and Malicious Attacks." 2007. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2507200700194900.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Lin, Cheng-Hsu, and 林承旭. "Populating Malicious Flow Entries Against SDN Operations: Attacks and Countermeasures." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/ss887w.

Pełny tekst źródła
Streszczenie:
碩士<br>國立交通大學<br>資訊科學與工程研究所<br>105<br>Software-defined networking (SDN) is a new networking paradigm that enables programmatic control over the network at a centralized controller. The controller offers APIs to allow SDN applications (SDN-Apps) to take care of control-plane functions (e.g., traffic engineering, routing, load balancing, security, etc.). However, some SDN-Apps may be malicious, since benign ones might be compromised or they were developed by untrusted third parties. Though there have been many solutions proposed to block malicious SDN-Apps, all of them did not consider that malic
Style APA, Harvard, Vancouver, ISO itp.
35

Lin, hsin-hung, and 林信宏. "A Robust Gray-level Image Watermarking Scheme Against Malicious/Unwitting Attacks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/39953727486820295707.

Pełny tekst źródła
Streszczenie:
碩士<br>國立暨南國際大學<br>資訊工程學系<br>95<br>Digital watermarking technologies have been developed for many years as a means for copyright protection of multimedia data. Most of those technologies can be divided into two main categories: spatial domain and frequency domain. Recently, a few new watermarking techniques were proposed based on the adjutant data which is produced directly from the feature of the copyrighted image and kept privately by the image owner. Because such methods do not modify the original image, those techniques are very easy be counterfeited. Traditional digital watermarking te
Style APA, Harvard, Vancouver, ISO itp.
36

Pan, Jia-ling, and 潘佳伶. "Effective Network Planning and Defending Strategies to Minimize Attackers’ Success Probabilities under Malicious and Epidemic Attacks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/66477210972395804144.

Pełny tekst źródła
Streszczenie:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>99<br>Due to the Internet’s scalability and connectivity, enterprises and organizations increasingly rely upon the Internet to provide services and to engage in electronic commerce. On the other hand, attackers intelligently attack enterprises and organizations though continuous vulnerability exploitation and advanced attack strategies to achieve the goals of service interruption and/or theft of confidential information. Recently, many attackers apply the characteristics of fast propagation and infection of epidemic attacks to plan more deliberate strategies by usin
Style APA, Harvard, Vancouver, ISO itp.
37

Lee, Yu-Hsuan, and 李昱璇. "Droidivision : Vulnerability Analysis of Multiple Layer Collusion Attacks Using Malicious Intent Simulation." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/r5w7jw.

Pełny tekst źródła
Streszczenie:
碩士<br>國立臺灣科技大學<br>資訊工程系<br>103<br>Among the various smartphone operating systems, Android becomes more and more popular in the mobile operating system. With highly popularity of Android users, there are over 50 billion downloaded apps and the Android platforms have generated high benefit, which has attracted cyber criminals and increased malware in Android platforms at an alarming rate. Android malware samples are even over 650,000. Although Android security mechanism is based on permission model, the applications, improperly use inter-component communication (ICC) which lead to privilege esca
Style APA, Harvard, Vancouver, ISO itp.
38

Shen, Chi-En, and 沈祈恩. "A Flexible Framework for Malicious Open XML Document Detection against APT Attacks." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/55150067458488796714.

Pełny tekst źródła
Streszczenie:
碩士<br>國立清華大學<br>資訊系統與應用研究所<br>102<br>The defense against Advanced Persistence Threat (APT) attacks is a hot issue in recent years. Many organizations and enterprises even governments have been victims of APT attacks. Since APT attacks have a specific objective and are skillfully crafted, motivated, organized and well founded, they should not be ignored. Malicious documents have always been used with the spear phishing attack in the initial infection phase of an APT attack. The detection of malicious documents is important for an early stage defensive APT attack. In recent years, Open XML has
Style APA, Harvard, Vancouver, ISO itp.
39

Chang, Yao-Yuan, and 張耀元. "Network Defense and Recovery Strategies for Maximization of Network Survivability under Malicious Attacks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/88861509387291225501.

Pełny tekst źródła
Streszczenie:
碩士<br>臺灣大學<br>資訊管理學研究所<br>98<br>Because of the rapid advancement of computer and telecommunication technologies in recent years, smaller, less expensive and high performance devices are available for companies and individuals, which accelerate the growth of the Internet and make available to users a variety of new network applications/services. However, our dependency on the Internet has made the PCs and servers connected to the network more vulnerable to attacks, causing great losses to enterprises and individuals. Moreover, an increasing number of new threats, evolution of attack tactics and
Style APA, Harvard, Vancouver, ISO itp.
40

"Hitch-hiking attacks in online social networks and their defense via malicious URL classification." 2012. http://library.cuhk.edu.hk/record=b5549120.

Pełny tekst źródła
Streszczenie:
近年來,網絡的犯罪數量一直在迅速增加。現在,惡意軟件作者編寫惡意程序竊取用戶的個人信息,或提供基於垃圾郵件的營銷服務為利潤的地方。為了更有效地傳播惡意軟件,黑客已經開始瞄準流行的在線社交網絡服務(SNS)的 SNS用戶和服務的互動性之間固有的信任關係。一種常見的攻擊方法是惡意軟件自動登錄使用偷來的 SNS用戶憑據,然後提供接觸/被盜的用戶帳戶的朋友名單,他們通過在一些短消息嵌入惡意 URL(鏈接)。受害人然後認為是他們的朋友提供的鏈接,按一下被感染。然而,這種方法是有效的,惡意軟件來模仿人類類似的行為,它可以超越任何一個/兩個班輪對話。在這篇論文中,我們首先介紹一個新類型的攻擊,提供惡意網址 SNS用戶之間的合法對話。為了證明其概念,我們設計和實施名為 Hitchbot惡意軟件[1],其中包括多個攻擊源,為實現我們所提出的攻擊。特別是,當一個 SNS用戶發送一個鏈接/ URL到他/她的朋友,Hitchbot悄悄地取代類似,但惡意攔截在幾個可能的點之一,互動式輸入/輸出鏈接系統。由於惡意鏈接在一些適當的對話上下文之間的合法用戶交付,這使得它更難以對受害者(以及吊具)來實現攻擊,從而可以大幅增加轉換率。這方法也使 Hitchbot的繞過大多數現有的防禦計劃,主要是靠對用戶的行為或流量異常檢測。 Hitchbot是基於客戶端模塊的形式可以順利上常見的社交網絡服務,包括雅虎和微軟的郵件客戶
Style APA, Harvard, Vancouver, ISO itp.
41

LEE, Yi-Fan, and 李奕汎. "Defense Mechanism Against Malicious and Selective Forwarding Attacks in Large & Mobile Wireless Networks." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/q2k9gk.

Pełny tekst źródła
Streszczenie:
碩士<br>國立中正大學<br>資訊管理系研究所<br>106<br>In this study, we want to propose a new algorithm for large-scale distributed wireless networks, which can be applied to the following conditions: 1) The number of nodes and the wide range of networks, this study is based on supporting the network node is up to 100,000 ; 2) In the high rate of network flow, we will respond to the high rate in this study, so that the network will still maintain a high match probability; 3) We also responded to the malicious attacks on the network, even if the network is still maintain a high match probability; 4) self-adaptati
Style APA, Harvard, Vancouver, ISO itp.
42

Wu, Yu-Pu, and 吳育溥. "Maximization of Network Survivability through Deception Mechanisms under Malicious Collaborative Attacks in Virtualization Environment." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/91557274591659567133.

Pełny tekst źródła
Streszczenie:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>101<br>Virtualization plays an important role in the information technology, especially in the enterprise application. Adopting this technology, legitimate users can utilize computing power and storage resources more flexibly without the geography and hardware limitations. Furthermore, it could save a large amount of budget and raise the utilization to the system. Nevertheless, virtualization also brings great problem with high complexity of information security, especially under the threat of collaborative attack, a new attack trend in recent years. As a service pr
Style APA, Harvard, Vancouver, ISO itp.
43

Lee, Chia-Ling, and 李佳玲. "Effective resource allocation strategies to assure service continuity considering malicious attacks and natural disasters." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/53826400742396768950.

Pełny tekst źródła
Streszczenie:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>101<br>Companies or governments rely on Internet to provide all kinds of service to customers and use Internet to propagate them in order to attract more customers to create more profits. Not only external customers, within the company, they also build their own intranet to handle daily operations. Once companies’ network being broken, they cannot provide regular service to user and also cannot run the daily process which may cause serious problem. Therefore, according to some research, cyber-attacks still is the most significant risk that business worried about sin
Style APA, Harvard, Vancouver, ISO itp.
44

Kuo, Chien-Ting, and 郭建廷. "An Effective Priority Queue-based Scheme to Alleviate Malicious Packet Flows from Distributed DoS attacks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/02344370863990907472.

Pełny tekst źródła
Streszczenie:
碩士<br>東海大學<br>資訊工程與科學系<br>97<br>Distributed Denial-of-Service attacks reduce available bandwidth and resources of targeted systems. By flooding networks and disrupting access to services, they may damage multimedia network services and cause unpredictable losses for Internet Service Providers. In the thesis, we propose to analyze the behavior of packet flows and adopt a priority queue-based algorithm that assigns packets from normal users to a high priority queue and packets from suspected attackers to a low priority queue. Simulations in the network simulator, NS2, prove our proposed priority
Style APA, Harvard, Vancouver, ISO itp.
45

Chan, Chi-Hsiang, and 詹棨翔. "Effective Network Planning and Defending Strategies to Minimize Service Compromise Probabilities under Malicious Collaborative Attacks." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/55048445757700088710.

Pełny tekst źródła
Streszczenie:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>100<br>Recently, Cloud computing which base on virtualization and network technology becomes a popular issue. Through the novel model it provides, users and organizations can decrease the cost on resources and access the applications without geographic limit. The convenient technologies bring a lot of profits but also raise the complexity of information security. In this thesis, we model the network attack and defense scenario as a mathematical formulation and solve the bi-level problem through simulation and mathematical programming. Because of the complexity and n
Style APA, Harvard, Vancouver, ISO itp.
46

Jiang, Kun-Dao, and 江坤道. "A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/27717984998726634904.

Pełny tekst źródła
Streszczenie:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>95<br>Modern organizations have increasingly relied on information technology to facilitate daily business operations. However, the dependency is built upon an environment where hazardous events happen frequently and malicious attacks emerge in an endless stream. To attain the objective of “continuity of services”, we propose an approach based on redundancy allocation to reduce the possibility of threats occurring to an acceptable degree. In the thesis, we formulate a “battle” between the attacker and the network into a two-level programming problem. In the inne
Style APA, Harvard, Vancouver, ISO itp.
47

Jiang, Kun-Dao. "A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks." 2007. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-1907200713220500.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
48

Chuang, Ho-Yang, and 莊禾暘. "A Study on Exposing Evidences of Malicious Attacks and Features of Malwares Based on Memory Forensics." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/7xq84v.

Pełny tekst źródła
Streszczenie:
碩士<br>國立政治大學<br>資訊科學系<br>106<br>Currently, most of the DDoS attacks that exceed 1 TB per second are executed from large-scale-IoT botnets. If these attacks were aimed at critical industrial infrastructure, it could have caused damage to our society at an extraordinary scale. The rising threat of DDoS attacks are fueled by the increased development of IoTs, which has now reached its fourth stage, called the WoT. WoT is a term used to describe approaches, software architectural styles and programming patterns that allow previously IoT objects to be part of the World Wide Web. As WoT approaches r
Style APA, Harvard, Vancouver, ISO itp.
49

Sayed, Bassam. "Protection against malicious JavaScript using hybrid flow-sensitive information flow monitoring." Thesis, 2015. http://hdl.handle.net/1828/7063.

Pełny tekst źródła
Streszczenie:
Modern web applications use several third-party JavaScript libraries to achieve higher levels of engagement. The third-party libraries range from utility libraries such as jQuery to libraries that provide services such as Google Analytics and context- sensitive advertisement. These third-party libraries have access to most (if not all) the elements of the displayed webpage. This allows malicious third-party libraries to perform attacks that steal information from the end-user or perform an action without the end-user consent. These types of attacks are the stealthiest and the hardest to defend
Style APA, Harvard, Vancouver, ISO itp.
50

Chen, Quen-Ting, and 陳冠廷. "Recovery and Resource Reallocation Strategies to Maximize Network Survivability for Multi-Stage Defense Resource Allocation under Malicious Attacks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/93188278162261584891.

Pełny tekst źródła
Streszczenie:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>99<br>The Internet enriches our lives, but it also brings lots of threats to individuals and cooperates from information security. It is difficult to keep network safe forever because cyber attacker could launch attack through the network unlimited by time and space. Consequently, it is a more and more important and critical issue about how to efficiently evaluate network survivability. In this thesis, an innovative metric called Average Degree of Disconnectivity (Average DOD) is proposed. The Average DOD combining the concept of the probability calculated by contes
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!