Academic literature on the topic 'Détection d'attaque de présentation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Détection d'attaque de présentation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Détection d'attaque de présentation"
Mahieu, Rafael, and Vincent Dubée. "Diagnostic d’infection par le SARS-CoV-2 : tests disponibles et stratégie en réanimation." Médecine Intensive Réanimation 30, Hors-série 1 (June 16, 2021): 19–26. http://dx.doi.org/10.37051/mir-00076.
Full textDauchet, J., J. B. Tylcz, C. Marque, and C. Muszynski. "L’électrohystérogramme : présentation et intérêt dans la détection et la surveillance des patientes à risque d’accouchement prématuré." La Revue Sage-Femme 17, no. 6 (December 2018): 289–93. http://dx.doi.org/10.1016/j.sagf.2018.08.001.
Full textZwitter Vitez, Ana. "Présentation du volume." Linguistica 52, no. 1 (December 31, 2012): 7–8. http://dx.doi.org/10.4312/linguistica.52.1.7-8.
Full textNoàl, S., J. L. Godron, D. Delahaigue, and M. Kerkhofs. "« Shift work sleep disorder » : présentation d’un outil diagnostique original de détection des travailleurs en souffrance, à valeur épidémiologique." Médecine du Sommeil 11, no. 1 (January 2014): 21. http://dx.doi.org/10.1016/j.msom.2014.01.047.
Full textBIDANEL, J. P., P. LE ROY, L. OLLIVIER, M. BONNEAU, P. CHARDON, J. M. ELSEN, J. GELLIN, and D. MILAN. "Etablissement et utilisation de la carte génétique porcine." INRAE Productions Animales 9, no. 4 (August 17, 1996): 299–310. http://dx.doi.org/10.20870/productions-animales.1996.9.4.4063.
Full textBIDANEL, J. P., P. LE ROY, L. OLLIVIER, M. BONNEAU, P. CHARDON, J. M. ELSEN, J. GELLIN, and D. MILAN. "Etablissement et utilisation de la carte génétique porcine." INRAE Productions Animales 9, no. 4 (August 20, 1996): 299–310. http://dx.doi.org/10.20870/productions-animales.1996.9.4.4070.
Full textFoka Tagne, Alain Gilles, Anaclet Ananga Onana, Edith Grace Ateumo, and Maïmouna Ngoungoure Monta. "Impacts de l’audit externe et de l’audit interne sur la non-conformité des états comptables et financiers au Cameroun." Revue internationale des sciences de l'organisation N° 15, no. 2 (June 27, 2023): 61–94. http://dx.doi.org/10.3917/riso.015.0061.
Full textLoubet, P., G. Voiriot, M. Neuville, B. Visseaux, and J. F. Timsit. "Virus respiratoires dans les pneumonies associées aux soins." Médecine Intensive Réanimation 27, no. 3 (May 2018): 217–27. http://dx.doi.org/10.3166/rea-2018-0049.
Full textKabuga, A. I., A. Nejati, and S. Shahmahmoodi. "Enterovirus and Parechovirus meningitis in children: a review of the epidemiology, diagnostic challenges, and significance of on-site CSF virology tests in tropical paediatric patients’ care." African Journal of Clinical and Experimental Microbiology 22, no. 1 (January 26, 2021): 12–20. http://dx.doi.org/10.4314/ajcem.v22i1.3.
Full textGeorge, O. T., and O. O. Oduyebo. "Detection of multi-drug resistant tuberculosis (MDR TB) using microscopic observation drug susceptibility (MODS) assay in Lagos State, southwest Nigeria." African Journal of Clinical and Experimental Microbiology 23, no. 2 (May 13, 2022): 174–81. http://dx.doi.org/10.4314/ajcem.v23i2.8.
Full textDissertations / Theses on the topic "Détection d'attaque de présentation"
Tak, Hemlata. "End-to-End Modeling for Speech Spoofing and Deepfake Detection." Electronic Thesis or Diss., Sorbonne université, 2023. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2023SORUS104.pdf.
Full textVoice biometric systems are being used in various applications for secure user authentication using automatic speaker verification technology. However, these systems are vulnerable to spoofing attacks, which have become even more challenging with recent advances in artificial intelligence algorithms. There is hence a need for more robust, and efficient detection techniques. This thesis proposes novel detection algorithms which are designed to perform reliably in the face of the highest-quality attacks. The first contribution is a non-linear ensemble of sub-band classifiers each of which uses a Gaussian mixture model. Competitive results show that models which learn sub-band specific discriminative information can substantially outperform models trained on full-band signals. Given that deep neural networks are more powerful and can perform both feature extraction and classification, the second contribution is a RawNet2 model. It is an end-to-end (E2E) model which learns features directly from raw waveform. The third contribution includes the first use of graph neural networks (GNNs) with an attention mechanism to model the complex relationship between spoofing cues present in spectral and temporal domains. We propose an E2E spectro-temporal graph attention network called RawGAT-ST. RawGAT-ST model is further extended to an integrated spectro-temporal graph attention network, named AASIST which exploits the relationship between heterogeneous spectral and temporal graphs. Finally, this thesis proposes a novel data augmentation technique called RawBoost and uses a self-supervised, pre-trained speech model as a front-end to improve generalisation in the wild conditions
Falade, Joannes Chiderlos. "Identification rapide d'empreintes digitales, robuste à la dissimulation d'identité." Thesis, Normandie, 2020. http://www.theses.fr/2020NORMC231.
Full textBiometrics are increasingly used for identification purposes due to the close relationship between the person and their identifier (such as fingerprint). We focus this thesis on the issue of identifying individuals from their fingerprints. The fingerprint is a biometric data widely used for its efficiency, simplicity and low cost of acquisition. The fingerprint comparison algorithms are mature and it is possible to obtain in less than 500 ms a similarity score between a reference template (enrolled on an electronic passport or database) and an acquired template. However, it becomes very important to check the identity of an individual against an entire population in a very short time (a few seconds). This is an important issue due to the size of the biometric database (containing a set of individuals of the order of a country). Thus, the first part of the subject of this thesis concerns the identification of individuals using fingerprints. Our topic focuses on the identification with N being at the scale of a million and representing the population of a country for example. Then, we use classification and indexing methods to structure the biometric database and speed up the identification process. We have implemented four identification methods selected from the state of the art. A comparative study and improvements were proposed on these methods. We also proposed a new fingerprint indexing solution to perform the identification task which improves existing results. A second aspect of this thesis concerns security. A person may want to conceal their identity and therefore do everything possible to defeat the identification. With this in mind, an individual may provide a poor quality fingerprint (fingerprint portion, low contrast by lightly pressing the sensor...) or provide an altered fingerprint (impression intentionally damaged, removal of the impression with acid, scarification...). It is therefore in the second part of this thesis to detect dead fingers and spoof fingers (silicone, 3D fingerprint, latent fingerprint) used by malicious people to attack the system. In general, these methods use machine learning techniques and deep learning. Secondly, we proposed a new presentation attack detection solution based on the use of statistical descriptors on the fingerprint. Thirdly, we have also build three presentation attacks detection workflow for fake fingerprint using deep learning. Among these three deep solutions implemented, two come from the state of the art; then the third an improvement that we propose. Our solutions are tested on the LivDet competition databases for presentation attack detection
Makiou, Abdelhamid. "Sécurité des applications Web : Analyse, modélisation et détection des attaques par apprentissage automatique." Thesis, Paris, ENST, 2016. http://www.theses.fr/2016ENST0084/document.
Full textWeb applications are the backbone of modern information systems. The Internet exposure of these applications continually generates new forms of threats that can jeopardize the security of the entire information system. To counter these threats, there are robust and feature-rich solutions. These solutions are based on well-proven attack detection models, with advantages and limitations for each model. Our work consists in integrating functionalities of several models into a single solution in order to increase the detection capacity. To achieve this objective, we define in a first contribution, a classification of the threats adapted to the context of the Web applications. This classification also serves to solve some problems of scheduling analysis operations during the detection phase of the attacks. In a second contribution, we propose an architecture of Web application firewall based on two analysis models. The first is a behavioral analysis module, and the second uses the signature inspection approach. The main challenge to be addressed with this architecture is to adapt the behavioral analysis model to the context of Web applications. We are responding to this challenge by using a modeling approach of malicious behavior. Thus, it is possible to construct for each attack class its own model of abnormal behavior. To construct these models, we use classifiers based on supervised machine learning. These classifiers use learning datasets to learn the deviant behaviors of each class of attacks. Thus, a second lock in terms of the availability of the learning data has been lifted. Indeed, in a final contribution, we defined and designed a platform for automatic generation of training datasets. The data generated by this platform is standardized and categorized for each class of attacks. The learning data generation model we have developed is able to learn "from its own errors" continuously in order to produce higher quality machine learning datasets
Makiou, Abdelhamid. "Sécurité des applications Web : Analyse, modélisation et détection des attaques par apprentissage automatique." Electronic Thesis or Diss., Paris, ENST, 2016. http://www.theses.fr/2016ENST0084.
Full textWeb applications are the backbone of modern information systems. The Internet exposure of these applications continually generates new forms of threats that can jeopardize the security of the entire information system. To counter these threats, there are robust and feature-rich solutions. These solutions are based on well-proven attack detection models, with advantages and limitations for each model. Our work consists in integrating functionalities of several models into a single solution in order to increase the detection capacity. To achieve this objective, we define in a first contribution, a classification of the threats adapted to the context of the Web applications. This classification also serves to solve some problems of scheduling analysis operations during the detection phase of the attacks. In a second contribution, we propose an architecture of Web application firewall based on two analysis models. The first is a behavioral analysis module, and the second uses the signature inspection approach. The main challenge to be addressed with this architecture is to adapt the behavioral analysis model to the context of Web applications. We are responding to this challenge by using a modeling approach of malicious behavior. Thus, it is possible to construct for each attack class its own model of abnormal behavior. To construct these models, we use classifiers based on supervised machine learning. These classifiers use learning datasets to learn the deviant behaviors of each class of attacks. Thus, a second lock in terms of the availability of the learning data has been lifted. Indeed, in a final contribution, we defined and designed a platform for automatic generation of training datasets. The data generated by this platform is standardized and categorized for each class of attacks. The learning data generation model we have developed is able to learn "from its own errors" continuously in order to produce higher quality machine learning datasets
Gorintin, Louis. "Etude et réalisation de transistors à nanotubes de carbone pour la détection sélective de gaz." Phd thesis, Ecole Polytechnique X, 2011. http://pastel.archives-ouvertes.fr/pastel-00695013.
Full textGorintin, Louis. "Etude et réalisation de transistors à nanotubes de carbone pour la détection sélective de gaz." Phd thesis, Palaiseau, Ecole polytechnique, 2011. https://pastel.hal.science/docs/00/69/50/13/PDF/These_Louis_Gorintin.pdf.
Full textThis work focuses on sensor based on carbon nanotube field effect transistors (i. E. CNTFETs) modulated chemically. This new generation of sensors has many advantages: compact and inexpensive, they can be integrated in ultrasensitive and autonomous detection systems. The civilian security market is targeted, particularly punctual and network detection of warfare and explosive agent. In order to achieve a scalable and highly reproducible fabrication, which is not possible for a single carbon nanotube transistor, we propose to achieve CNTFETs using random mats of Single Wall carbon nanotubes (CNT). The first part of our work has dealt with the development of a deposition method of CNT mats using an airbrush technique assisted by an automated robot. Commercial carbon nanotubes powders are dispersed in a specific solvent and then deposited randomly by atomization of micro droplets on a hot substrate. The random mats obtained with this technique are extremely uniform (density) and allow to achieve arrays of CNTFETs with reproducible electrical characteristics. The second part has concerned the development of an array of CNTFETs with different metal electrodes (platinum, palladium, gold, nickel, titanium) to address the problem of selectivity of this kind of device. We identify a sort of electronic fingerprinting exploiting the specific interaction of each gas with each metal/SWCNTs junction. This interaction changes in an extremely specific way the transfer characteristics of the CNTFETs. We have demonstrated a sensitivity and selectivity to ammonia, nitrogen dioxide, and dimethyl methylphosphonate (sarin gas simulant) and hydrogen peroxide. These devices, thanks to their relatively low cost fabrication and high selectivity, have the potential to strike the market within a few years
Zah, Vladimir. "Is it worth performing early HIV detection from burden of illness perspective in the United Kingdom and Poland." Thesis, Lyon, 2017. http://www.theses.fr/2017LYSE1124/document.
Full textVladimir Zah brings more than 20 years of Health Economics technology and business experience. Since 2000, in various roles as Health Economist, Project Manager and Chief Investigator, Vlad has implemented more than 170 health economic models and assessments in the phase 2, 3 and 4 settings, across various disease areas for top 30 global pharmaceutical companies. Vlad worked extensively over the last 6 years in opioid dependence.His PhD research on early vs. late HIV detection in the United Kingdom contributed to revisions in HIV early detection policies made by the UK Parliament in 2011. He co-founded the Serbian Chapter of the International Society for Pharmaco-economics and Outcomes Research (ISPOR) in 2007 and served as President of that chapter until 2012. Vlad is an active member of various ISPOR special interest groups (SIG) (including rare diseases) and is ISPOR Central East Europe Executive Committee Chair 2015-2017.Vlad lectures extensively and serves as a key opinion leader in the areas of HEOR, opioid addiction, HIV, diabetes and other. He also consults and provided HEOR training relating to both medications and medical devices to Ministry of Health, National Insurance Funds or at national congresses in Russia, Turkey, Greece, Egypt, Poland, Czech Republic, Slovakia, Hungary, Croatia, Bosnia & Herzegovina, Slovenia, FYROM, Republic of Srpska and India
Silvin, Aymeric. "Résistance sélective des sous-types de cellules dendritiques à l’infection par le VIH et le virus de la grippe." Thesis, Sorbonne Paris Cité, 2015. http://www.theses.fr/2015USPCB104/document.
Full textDendritic cells (DCs) sense viral particles and present viral antigens to induce immune responses. Viruses also replicate in DCs, engaging cytosolic immune responses. How DCs tolerate viruses to ensure functional integrity is unknown. DCs are developmentally organized in distinct subsets. We find that HIV and influenza preferentially infect CD1c+ DCs over CD141+ DCs and pDCs. Replication in CD1c+ DCs was essential for efficient CD8+ T cell activation and cytosolic sensing, while CD141+ DCs and pDCs responded to exogenous virus. Viral fusion was constitutively reduced in CD141+ and pDCs compared to CD1c+ DCs. The small GTPase RAB15 expressed selectively in CD141+ and pDCs contributed to the resistance. Selective resistance of DC subset to viral infections may thus represent a tolerance mechanism to maximize antiviral responses
Bouyahia, Tarek. "Metrics for security activities assisted by argumentative logic." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2017. http://www.theses.fr/2017IMTA0013/document.
Full textThe growth and diversity of services offered by modern systems make the task of securing these systems a complex exercise. On the one hand, the evolution of the number of system services increases the risk of causing vulnerabilities. These vulnerabilities can be exploited by malicious users to reach some intrusion objectives. On the other hand, the most recent competitive systems are those that ensure a certain level of performance and quality of service while maintaining the safety state. Thus, modern security systems must consider the user requirements during the security process.In addition, reacting in critical contexts against an attack after its execution can not always mitigate the adverse effects of the attack. In these cases, security systems should be in a phase ahead of the attacker in order to take necessary measures to prevent him/her from reaching his/her intrusion objective. To address those problems, we argue in this thesis that the reaction process must follow a smart reasoning. This reasoning allows the system, according to a detected attack, to preview the related attacks that may occur and to apply the best possible countermeasures. On the one hand, we propose an approach that generates potential attack scenarios given a detected alert. Then, we focus on the generation process of an appropriate set of countermeasures against attack scenarios generated among all system responses defined for the system. A generated set of countermeasures is considered as appropriate in the proposed approach if it presents a coherent set (i.e., it does not contain conflictual countermeasures) and it satisfies security administrator requirements (e.g., performance, availability). We argue in this thesis that the reaction process can be seen as two agents arguing against each other. On one side the attacker chooses his arguments as a set of actions to try to reach an intrusion objective, and on the other side the agent defending the target chooses his arguments as a set of countermeasures to block the attacker's progress or mitigate the attack effects. On the other hand, we propose an approach based on a recommender system using Multi-Criteria Decision Making (MCDM) method. This approach assists security administrators while selecting countermeasures among the appropriate set of countermeasures generated from the first approach. The assistance process is based on the security administrator decisions historic. This approach permits also, to automatically select appropriate system responses in critical cases where the security administrator is unable to select them (e.g., outside working hours, lack of knowledge about the ongoing attack). Finally, our approaches are implemented and tested in the automotive system use case to ensure that our approaches implementation successfully responded to real-time constraints
Book chapters on the topic "Détection d'attaque de présentation"
COGRANNE, Rémi, Marc CHAUMONT, and Patrick BAS. "Stéganalyse : détection d’information cachée dans des contenus multimédias." In Sécurité multimédia 1, 261–303. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9026.ch8.
Full textVANDER HAEGEN, Marie, and Cécile FLAHAULT. "Expérience des parents d’enfants en rémission d’un cancer." In Le patient et son entourage, 115–30. Editions des archives contemporaines, 2023. http://dx.doi.org/10.17184/eac.7249.
Full textConference papers on the topic "Détection d'attaque de présentation"
Fourcade, A. "Apprentissage profond : un troisième oeil pour les praticiens." In 66ème Congrès de la SFCO. Les Ulis, France: EDP Sciences, 2020. http://dx.doi.org/10.1051/sfco/20206601014.
Full text