Dissertations / Theses on the topic 'Open throat'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 37 dissertations / theses for your research on the topic 'Open throat.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Mitchell, Helen Frances. "Defining vocal quality in female classical singers: pedagogical, acoustical and perceptual studies." Thesis, The University of Sydney, 2005. http://hdl.handle.net/2123/710.
Full textMitchell, Helen Frances. "Defining vocal quality in female classical singers: pedagogical, acoustical and perceptual studies." University of Sydney. Australian Centre for Applied Research in Music Performance, 2005. http://hdl.handle.net/2123/710.
Full textAdewopo, Victor A. "Exploring Open Source Intelligence for cyber threat Prediction." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin162491804723753.
Full textKhanna, Isha. "Phishing on Open WLANs: Threat and Preventive Measure." Thesis, Virginia Tech, 2009. http://hdl.handle.net/10919/36170.
Full textMaster of Science
McCarthy, Martin. "Contra-rotating open rotor reverse thrust aerodynamics." Thesis, Cranfield University, 2011. http://dspace.lib.cranfield.ac.uk/handle/1826/10448.
Full textEngvall, Christoffer. "Security in Wireless Sensor Networks for Open Controller." Thesis, Linköpings universitet, Databas och informationsteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-91089.
Full textTariq, Muhammad Tahir and Aleem. "Quality of the Open Source Software." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1251.
Full text0046-737218653 , 0046-739131829
Pratt, Landon James. "Cliff Walls: Threats to Validity in Empirical Studies of Open Source Forges." BYU ScholarsArchive, 2013. https://scholarsarchive.byu.edu/etd/3511.
Full textEdman, Jakob. "En Kommunikations Illustration : Interaktionen mellan deltagare i ledarlösa samarbeten." Thesis, Uppsala University, Media and Communication Studies, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-124544.
Full textPurpose: The objective of this study is to illustrate how participants in leaderless based projects communicate with each other. Several studies have focused on technology-supported projects, such as open source projects, with an established project manager and goal. There is a lack, to the best of our knowledge, in studies that deal with the communication pattern in a leaderless computer supported collaborative project.
Method: We have chosen to use a quantitative method where we systematically group several messages according to their content. This method was used in a similar study to illustrate the communication between participants involved in an open source project. We have taken the same Kripendorff based method and adapted it to our study by adding more descriptive variables.
Theoretical perspectives: Manuel Castell discusses the aspects of a new communication power that is rooted in the individual as part of a larger creative audience. The collaborative works we have studies are prime examples of how the creative audience works together and of mass self‐communication. In order to analyze the potential motivations behind the participant’s involvement in these collaborative works, we have adopted the ideas of Preece and Shneidermans frame theory. They have identified 4 major roles in most onlinebased co‐operations and refer to them as reader, contributor, collaborator and leader.
Result: Our results show that the communication in computer supported collaborative works is characterized by positive and energetic communication. The participants are all involved by their own will; they contribute because they want to. We believe this to be the major factor influencing the flow and form of communication between the participants. The majority of posts are comments to other participants or contributing posts that add to the progression of the discourse. We also have reason to believe that the use of smileys and embedded pictures is related to the tools available to the participants; the quicker and easier it is to add a picture the more likely the participants will use these tools.
Thompson, Linda. "The association between frontal lisping and an anterior open bite, a tongue thrust swallow, the concurrence of an anterior open bite and a tongue thrust swallow and slow diadochokinetic rate." Master's thesis, University of Cape Town, 2006. http://hdl.handle.net/11427/2935.
Full textJägenstedt, Gabriel. "Analysis and Simulation of Threats in an Open, Decentralized, Distributed Spam Filtering System." Thesis, Linköpings universitet, Databas och informationsteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-81012.
Full textMacLean, Alexander Curtis. "Commit Patterns and Threats to Validity in Analysis of Open Source Software Repositories." BYU ScholarsArchive, 2012. https://scholarsarchive.byu.edu/etd/2963.
Full textCox, Shaphan Leon. "'Whose city/whose Fremantle?' : reconceptualising space for an open politics of place." Thesis, Curtin University, 2012. http://hdl.handle.net/20.500.11937/607.
Full textMartin, Claude F. III. "A call for new ASW screen geometries for carrier battlegroup open ocean transits under the 1990's threat." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23561.
Full textA simulation model was specified. It examines United States Navy Antisubmarine Warfare Screen alternative dispositions for Carrier Battlegroups. The scenario posed is open ocean transit under the threat of an attack from foreign submarine hulls built in the 1990s. The investigation raises the issue of the appropriateness of current Navy practices and suggests that new tactics be developed. The author's thoughts are that there will be ever newer, more lethal, unpredictable threats to United States' maritime independence than current doctrine addresses. The full implementation of the simulation program has not been accomplished. A segment of verification output is shown for expository purposes only. A discussion is given on the adequacy of the model's abstractions along with the possible impact on potential results of experiments.
Campoli, Andrea. "MECHANCIAL PROPERTIES OF ELASTIC THREAD FORCE SYSTEMS IN CANINE EXPOSURES AND APPLICATION OF FORCE." Master's thesis, Temple University Libraries, 2019. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/591232.
Full textM.S.
Objectives: To investigate differences in the modulus of elasticity, tensile strength, and load at breakage for elastic thread alone and elastic thread with gold chain in combination used in force application of palatally impacted and exposed maxillary canines. Methods: Two groups with n=6 in each were tested. A circular portion of elastic thread was cut, tied and measured to the nearest hundredth of a millimeter and recorded. Five links of a gold chain were cut and an elastic thread was tied to the fifth link opposite the bondable eyelet. The length of the elastic thread and the total apparatus was measured to the hundredth of a millimeter and recorded. An Instron with a ramp speed of 100 mm/min was used for all testing. Results: The addition of the gold chain, as compared to the elastic thread alone, increased the modulus from 8.8 MPa (SD 3.7) to 17.0 MPa (SD 5.03), (p< 0.04) and significantly decreased the maximum tensile stress at breakage from 92.1N (SD 5.0) to 84.1N (SD 1.6), (p<0.004) and the tensile stress at maximum load from 107.8 N (SD 6.7) to 93.8N (SD 4.8), (p<0.002). The stress-strain curve for both groups demonstrated an initial linear behavior followed by non-linear behavior, partially obeying Hooke’s Law, due to the inherent nature of the elastic thread. The addition of the gold chain introduced a rigid element by reducing the of length of the elastic thread by one-half, altering the properties of the assembly. Conclusions: The modulus of elasticity (stiffness) increases and the toughness and resiliency decreases when a gold chain is added to the assembly and compared to elastic thread alone. This could indicate that in the gold chain group, more initial force/strain is delivered to the tooth and there is less stress relaxation over time due to the decrease in the amount of elastic thread. Therefore, the elastic thread alone delivers a more constant and continuous force to the tooth. The use of elastic thread alone may provide a biomechanically more efficient approach to orthodontic movement of impacted and open exposed teeth.
Temple University--Theses
Dobson, Thomas Kirwan. "Entropy and self-organization—an open system approach to the origins of homeland security threats." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45839.
Full textThis thesis addresses the problem that there is no coherent, unifying paradigm for understanding the origins of homeland security threats. In addition, the thesis asks if the concept of disorder as understood in the dynamics of open, dissipative systems can provide a way of understanding real-world homeland security threats. Ideas from approaches to complex systems based on the idea of dissipative systems were synthesized to create a scalable model of a living social system that imports and exports disorder (entropy) via the transfer of matter, energy, and information. Then, the idea of a dissipative system that exports disorder to its surroundings as it self-organizes was meta-theoretically applied to the processes of self-organization occurring in the world, such as technological advance, population growth, economic growth, and globalization, and can be causally linked to real-world homeland security threats. One conclusion is that, on a descriptive level, the causes of homeland security threats can be modeled as a complex, dissipative system. Another conclusion is that causes of homeland security threats and the means to counter them often lie in complex social, economic, and environmental processes that are well outside the jurisdiction of Department of Homeland Security and the homeland security enterprise, meaning that we should reconsider our approach to homeland security.
Holzer, Corey T. "The application of natural language processing to open source intelligence for ontology development in the advanced persistent threat domain." Thesis, Purdue University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10249704.
Full textOver the past decade, the Advanced Persistent Threat (APT) has risen to forefront of cybersecurity threats. APTs are a major contributor to the billions of dollars lost by corporations around the world annually. The threat is significant enough that the Navy Cyber Power 2020 plan identified them as a “must mitigate” threat in order to ensure the security of its warfighting network.
Reports, white papers, and various other open source materials offer a plethora of information to cybersecurity professionals regarding these APT attacks and the organizations behind them but mining and correlating information out of these various sources needs the support of standardized language and a common understand of terms that comes from an accepted APT ontology.
This paper and its related research applies the science of Natural Language Processing Open Source Intelligence in order to build an open source Ontology in the APT domain with the goal of building a dictionary and taxonomy for this complex domain.
Varshney, Rimpu. "Towards Designing Open Secure IoT System - Insights for practitioners." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20199.
Full textJennings, Stephen Gregory. "Creation, Verification, and Validation of a Panel Code for the Analysis of Ship Propellers in a Steady, Uniform Wake." ScholarWorks@UNO, 2010. http://scholarworks.uno.edu/td/1209.
Full textSmith, Sonny. "Low Risk, High Threat, Open Access Security in a Post 9-11 World: A Study of the Smithsonian Institution's Office of Protection Services." Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/28004.
Full textPh. D.
Thran, Julia [Verfasser]. "Ein räumliches Orientierungsgedächtnis im Zentralkomplex von Drosophila melanogaster und die spezifische Rolle von ellipsoid-body-open / Julia Thran." Mainz : Universitätsbibliothek Mainz, 2013. http://d-nb.info/1034181548/34.
Full textSousa, João Carlos Tanganho de. "Parallel run-time for CO-OPN." Master's thesis, Faculdade de Ciências e Tecnologia, 2009. http://hdl.handle.net/10362/8101.
Full textDomain Specific Modeling (DSM) is a methodology to provide programs or system’s specification at higher level of abstraction, making use of domain concepts instead of low level programming details. To support this approach, we need to have enough expressive power in terms of those domain concepts, which means that we need to develop new languages , usually termed Domain Specific Languages (DSLs). An approach to execute specifications developed using DSLs goes by applying a model transformation technique to produce a specification in another language. These transformation techniques are applied sucessively until the specification reaches a language with an implemented run-time. The language named Concurrent Object-Oriented Petri Nets (CO-OPN) is being used successfully as a target language for such model transformation techniques. CO-OPN is an object-oriented formal language for specifying concurrent systems, that separates coordination from computational tasks. CO-OPN offers mechanisms to define the system structure and behavior, and like DSLs, relieves the developer from stipulate how that structure and behavior are attained by the underlying system. The currently available code generator for CO-OPN only produces sequential code, despite of this language potential of expressing specifications rich in concurrent behavior. The generated sequential code can be executed either in a Sequential Run-Time or in the step simulator, which is part of CO-OPN Builder IDE. The generation of sequential code turns out to be an adversity to CO-OPN application since concurrent specifications cannot be executed in parallel and therefore this languages potential is not fully exploited. This dissertation aims at filling this CO-OPN’s execution gap, through the development of a Parallel Run-Time. The new Run-Time is achieved through the adaptation of the sequential code generator and actual execution support mechanisms. In this manner, all concurrent specifications that target CO-OPN benefit from thread safe code, ready for execution in parallel and distributed environments, relieving the developer from delving into parallel programming details.By guaranteeing a safe execution environment, CO-OPN becomes an alternative to the way parallel software is nowadays developed.
Garimella, Suresh. "Actuator Modeling and Control For a Three Degrees of Freedom Differential Thrust Control Testbed." Ohio University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1195164411.
Full textBurgess, Craig Neilson. "Identification of a suspect before being charged: legitimate freedom of speech or a threat to a fair trial?" Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16178/1/Craig_Burgess_Thesis.pdf.
Full textBurgess, Craig Neilson. "Identification of a suspect before being charged: legitimate freedom of speech or a threat to a fair trial?" Queensland University of Technology, 2005. http://eprints.qut.edu.au/16178/.
Full textPearce, Michael Bruce. "Development and evaluation of a secure web gateway with messaging functionality : utilizing existing ICAP and open-source tools to notify and protect end users from Internet security threats." Thesis, University of Canterbury. Computer Science and Software Engineering, 2010. http://hdl.handle.net/10092/5457.
Full textKeller, Anne M. ""One Narrow Thread of Green": The Vision of May Theilgaard Watts, the Creation of the Illinois Prairie Path, and a Community's Crusade for Open Space in Chicago's Suburbs." Antioch University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=antioch1466590966.
Full textLucas, D. Pulane. "Disruptive Transformations in Health Care: Technological Innovation and the Acute Care General Hospital." VCU Scholars Compass, 2013. http://scholarscompass.vcu.edu/etd/2996.
Full textHuang, Chi-Chih, and 黃啟智. "Anti-Threat Monitoring for Open Service Gateway initiative Platforms." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/65591855287206343817.
Full text國立成功大學
工程科學系碩博士班
95
Home networks are becoming increasingly popular. Open Service Gateway initiative (OSGi) platforms are a solution for integrating heterogeneous devices and e-services in home networks. In this thesis, it was found out that e-services running on an OSGi platform can not be fully protected, so a method to solve this problem is proposed. Based on Java security mechanisms, OSGi does not have its own intrusion detection system, resulting in weak protection from potential threats. Three types of threats, including shared object attacks, denial of service attacks, and abuse of legitimate e-service attacks, were simulated. All of these attacks are likely for commercial products and can successfully crash the system or steal information. To improve the security of OSGi, an Advanced OSGi Security Layer (AOSL) with detectors is proposed to solve the problems identified on OSGi platforms. The performance results show that AOSL can provide a more stable and secure execution environment for e-services, although it makes the execution time 14% to 135% slower than an unmodified OSGi platform.
Kao, Jen-tse, and 高仁澤. "Foreign Military Threat and Endogeonus Growth in a Small Open Economy." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/52183847011770732205.
Full text輔仁大學
經濟學研究所
97
This paper makes extension of Shieh et al. (2007) to a small open economy and examines the impact of foreign military threat on domestic economic growth rate under the assumptions concerning perfect and imperfect world capital market. The findings are: under the perfect world capital market assumption, foreign military threat has no effect on domestic economic growth rate. This result greatly contrasts with the result in Shieh et al. (2007); however, under the imperfect world capital market assumption, the impact of foreign military threat depends on whether the coefficient of relative risk aversion is greater than 1. Precisely speaking, when the coefficient of relative risk aversion is greater (smaller) than 1, a rise in foreign military threat would raise (reduce) domestic economic growth rate. This result is compatible with the result in Shieh et al. (2007).
Martins, Cláudio Dinis Neves. "Generating Threat Intelligence based on OSINT and a Cyber Threat Unified Taxonomy." Master's thesis, 2020. http://hdl.handle.net/10451/45122.
Full textAs ameaças cibernéticas atuais utilizam múltiplos meios de propagação, tais como a engenharia social, vulnerabilidades de e-mail e aplicações e, muitas vezes, operam em diferentes fases, tais como o comprometimento de um único dispositivo, o movimento lateral na rede e a exfiltração de dados. Estas ameaças são complexas e dependem de táticas bem avançadas, por forma a passarem despercebidas nas defesas de segurança tradicionais, como por exemplo firewalls. Um tipo de ameaças que tem tido um impacto significativo na ascensão do cibercrime são as ameaças persistentes avançadas (APTs), as quais têm objetivos claros, são altamente organizadas, têm acesso a recursos praticamente ilimitados e tendem a realizar ataques ocultos por longos períodos e com múltiplas tentativas. À medida que as organizações têm tido consciência que os ciberataques estão a aumentar em quantidade e complexidade, a utilização de informação sobre ciberameaças está a ganhar popularidade para combater tais ataques. Esta tendência tem acompanhado a evolução das APTs, uma vez que estas exigem um nível de resposta diferente e mais específico a cada organização. A informação sobre ciberameaças pode ser obtida de diversas fontes e em diferentes formatos, sendo a informação de fonte aberta (OSINT) uma das mais comuns. Também pode ser obtida por plataformas especificas de ameaças (TIPs) que ajudam a consumir, produzir e partilhar informações sobre ciberameaças. As TIPs têm múltiplas vantagens que permitem às organizações explorar facilmente os principais processos de recolha, enriquecimento e partilha de informações relacionadas com ameaças. No entanto, devido ao elevado volume de informação OSINT recebido por dia e às diversas taxonomias existentes para classificação de ciberameaças provenientes do OSINT, as TIPs atuais apresentam limitações de processamento desta, capaz de produzir informação inteligente (threat intelligence, TI) de qualidade que seja útil no combate de ciberataques, impedido assim a sua adoção em massa. Por sua vez, os analistas de segurança desperdiçam um tempo considerável em analisar o OSINT e a classificá-lo com diferentes taxonomias, por vezes, correspondentes a ameaças da mesma categoria. Esta dissertação propõe uma solução, denominada Automated Event Classification and Correlation Platform (AECCP), para algumas das limitações das TIPs mencionadas anteriormente e relacionadas com a gestão do conhecimento de ameaças, a triagem de ameaças, o elevado volume de informação partilhada, a qualidade dos dados, as capacidades de análise avançadas e a automatização de tarefas. Esta solução procura aumentar a qualidade da TI produzidas por TIPs, classificando-a em conformidade com um sistema de classificação comum, removendo a informação irrelevante, ou seja, com baixo valor, enriquecendo-a com dados importantes e relevantes de fontes OSINT, e agregando-a em eventos com informação semelhante. O sistema de classificação comum, denominado de Unified Taxonomy, foi definido no âmbito desta dissertação e teve como base uma análise de outras taxonomias públicas conhecidas e utilizadas na partilha de TI. O AECCP é uma plataforma composta por componentes que podem trabalhar em conjunto ou individualmente. O AECCP compreende um classificador (Classifier), um redutor de informação irrelevante (Trimmer), um enriquecedor de informação baseado em OSINT (Enricher) e um agregador de agregador de eventos sobre a mesma ameaça, ou seja, que contêm informação semelhante (Clusterer). O Classifier analisa eventos e, com base na sua informação, classifica-os na Unified Taxonomy, por forma a catalogar eventos ainda não classificados e a eliminar a duplicação de taxonomias com o mesmo significado de eventos previamente classificados. O Trimmer elimina a informação menos pertinente dos eventos baseando-se na classificação do mesmo. O Enricher enriquece os eventos com dados externos e provenientes de OSINT, os quais poderão conter informação importante e relacionada com a informação já presente no evento, mas não contida no mesmo. Por último, o Clusterer agrega eventos que partilham o mesmo contexto associado à classificação de cada um e à informação que estes contêm, produzindo aglomerados de eventos que serão combinados num único evento. Esta nova informação garantirá aos analistas de segurança o acesso e fácil visibilidade a informação relativa a eventos semelhantes aos que estes analisam. O desenho da arquitetura do AECCP, foi fundamentado numa realizada sobre três fontes públicas de informação que continham mais de 1100 eventos de ameaças de cibersegurança partilhados por 24 entidades externas e colecradas entre os anos de 2016 e 2019. A Unified Taxonomy utilizada pelo Classifier, foi produzida com base na análise detalhada das taxonomias utilizadas por estes eventos e nas taxonomias mais utilizadas na comunidade de partilha de TI sobre ciberameaças. No decorrer desta análise foram também identificados os atributos mais pertinentes e relevantes para cada categoria da Unified Taxonomy, através da agregação da informação em grupos com contexto semelhante e de uma análise minuciosa da informação contida em cada um dos mais de 1100 eventos. A dissertação, também, apresenta os algoritmos utilizados na implementação de cada um dos componentes que compõem o AECCP, bem como a avaliação destes e da plataforma. Na avaliação foram utilizadas as mesmas três fontes de OSINT utilizadas na análise inicial, no entanto, com 64 eventos criados e partilhados mais recentemente que os utilizados nessa análise. Dos resultados, foi possível verificar um aumento de 72% na classificação dos eventos, um aumento médio de 54 atributos por evento, com uma redução nos atributos com pouco valor e aumento superior de atributos com maior valor, após os eventos serem processados pelo AECCP. Foi também possível produzir 24 eventos agregados, enriquecidos e classificados pelos outros componentes do AECCP. Por último, foram processados pelo AECCP 6 eventos com grande volume de informação produzidos por uma plataforma externa, denominada de PURE, onde foi possível verificar que o AECCP é capaz de processar eventos oriundos de outras plataformas e de tamanho elevando. Em suma, a dissertação apresenta quatro contribuições, nomeadamente, um sistema de classificação comum, a Unified Taxonomy, os atributos mais pertinentes para cada uma das categorias da Unified Taxonomy, o desenho da arquitetura do AECCP composto por 4 módulos (Classifier, Trimmer, Enricher e Clusterer) que procura resolver 5 das limitações das atuais TIPs (gestão do conhecimento de ameaças, a triagem de ameaças, o elevado volume de informação partilhada, a qualidade dos dados e as capacidades de análise avançadas e a automatização de tarefas) e a sua implementação e avaliação.
Today’s threats use multiple means of propagation, such as social engineering, email, and application vulnerabilities, and often operate in different phases, such as single device compromise, network lateral movement and data exfiltration. These complex threats rely on well-advanced tactics for appearing unknown to traditional security defences. One type that had a major impact in the rise of cybercrime are the advanced persistent threats (APTs), which have clear objectives, are highly organized and well-resourced and tend to perform long term stealthy campaigns with repeated attempts. As organizations realize that attacks are increasing in size and complexity, threat intelligence (TI) is growing in popularity and use amongst them. This trend followed the evolution of the APTs as they require a different level of response that is more specific to the organization. TI can be obtained via many formats, being open source intelligence (OSINT) one of the most common; and using threat intelligence platforms (TIPs) that aid organization consuming, producing and sharing TI. TIPs have multiple advantages that enable organisations to easily bootstrap the core processes of collecting, normalising, enriching, correlating, analysing, disseminating and sharing of threat related information. However, current TIPs have some limitations that prevents theirs mass adoption. This dissertation proposes a solution to some of these limitations related with threat knowledge management, limited technology enablement in threat triage, high volume of shared threat information, data quality and limited advanced analytics capabilities and tasks automation. Overall, our solution improves the quality of TI by classifying it accordingly a common taxonomy, removing the information with low value, enriching it with valuable information from OSINT sources, and aggregating it into clusters of events with similar information. This dissertation offers a complete data analysis of three OSINT feeds and the results that made us to design our solution, a detailed description of the architecture of our solution, its implementations and its validation, including the processing of events from other academic solutions.
Azevedo, Rui Correia Neves Cordeiro de. "Leveraging OSINT to improve threat intelligence quality." Master's thesis, 2019. http://hdl.handle.net/10451/37202.
Full textThe Impact of cyber-attacks and its cost has become a top priority for most organizations. To more aptly protect themselves, organizations are moving from reactive to proactive defensive measures, investing in cyber threat intelligence (CTI) to provide them forewarning about the risks they face, as well as to accelerate their response times in the detection of attacks. One means to obtain CTI is the collection of open source intelligence (OSINT) feeds via threat intelligence platforms and their representation as indicators of compromise (IoC). However, most of these platforms are providing threat information with little to no processing. This Situation increases the pressure on security analysts who, already faced with the arduous task of sorting through the multitude of alerts originating from their networks must also sort this additional flow of data to find relevant intelligence.This dissertation proposes an architecture to generate threat intelligence of quality in the form of new intelligence is obtained by correlating IoCs coming from different OSINT feeds that contain information on the same threat, aggregation them into clusters, and then representing the threat information contained within those clusters in a single enriched IoC. This dissertation first offers an overview of the use of CTI, methodologies, and technologies used, before proposing an architecture focused on a clustering approach, for which two methods are introduced, the naïve and the n-level aggregation. It then describes the implementation of this architecture and its validation. The proposal was implemented in a prototype confirmed with 34 OSINT feeds, which allowed the creation of enriched IoCs that may enable the identification of cyber-attacks not previously possible by analyzing the received IoCs individually.
Rodrigues, Pedro Edgar Bessa. "Segurança Informática de Redes e Sistemas (Abordagem Open-Source)." Master's thesis, 2010. http://hdl.handle.net/10348/747.
Full textDurante o decorrer da sua história, o Homem demonstrou sempre um enorme desejo de informação. Desde o surgimento do primeiro sistema de informação, a «Fala», passando pela «Escrita», pelo «Livro», pela «Imprensa», até ao surgimento do mais revolucionário de todos, a «Internet», o ser humano procurou sempre uma partilha global da informação. As sucessivas (r)evoluções da informação mostraram ser capazes de mudar e moldar toda uma sociedade. A «Internet» não foi excepção. O aparecimento desta provou que a partilha global da informação é possível e desencadeou uma revolução de tal ordem, que apenas pode ser comparável com a grande «Revolução Industrial», trazendo até nós a denominada «Sociedade da Informação e do conhecimento». Percebendo que através de sistemas computacionais conseguiriam apresentar uma maior produtividade, as empresas começaram a aderir às redes informáticas. Actualmente é muito difícil encontrarmos empresas que não possuam infra-estruturas informáticas para suprir as suas necessidades. Esta informatização das organizações fez surgir novos conceitos, tais como o de «empresa virtual», «e-business», «home office», «e-commerce», entre outros. A informação tornou-se, cada vez mais, um activo importantíssimo das organizações capaz de gerar valor, lucros e benefícios. Porém, os computadores e a maneira como se comunicam, não servem apenas para auxiliar as empresas nos seus processos. Com os conhecimentos adequados é possível alguém aproveitar o poder computacional para executar os denominados «ataques informáticos», com os mais variados objectivos, colocando a informação em risco. Provado o enorme valor da informação para as empresas é de grande necessidade criar medidas e soluções de protecção. Esta Dissertação de Mestrado tratará do estudo de uma dessas soluções: o software de auditoria de segurança, Babel Enterprise.
During the course of history, man has always shown a great desire for information. Since the emergence of the first information system, the «speech», followed by «writing», the «book», the «press» to the emergence of the most revolutionary of all, the «Internet», man has always sought a share of the global information. Successive (r)evolutions of the information proved to be able to change and shape the whole society. The «Internet» was no exception. The emergence of this proved that the global sharing of information is possible, sparking a revolution of such order, which can only be comparable with the phenomenon of large «Industrial Revolution», bringing us up today’s society, the so-called «information society and knowledge». Realizing that through computer systems will be able to provide greater productivity, companies began to join the computer network. Today it is very difficult to find companies that lack IT infrastructure to meet their needs. This informatization of organizations gave rise to new concepts, such as «virtual enterprise», «home office», «e-business», «E-commerce», among others. The information has become an important asset of organizations to generate value, profits and benefits. However, the computers and how they communicate, exist not only to help companies in their workflow. With the appropriate knowledge somebody harness the computing power to perform the so-called «cyber attacks» with the most varied objectives, putting information at risk. Proved the huge value of the business information is of great need to create measures and protective solutions. This Master Thesis will address the study of one of these solutions. The audit networks tool, Babel Enterprise.
Park, Sang. "The Effects of the Back Clearance Size and the Balance Holes on the Back Clearance Flow of the Centrifugal Pump with Semi-Open Impeller." 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2008-12-89.
Full textPetrou, K. "From the ice to the open ocean : threats to phytoplankton productivity in the Antarctic marine ecosystem from a changing climate." Thesis, 2010. http://hdl.handle.net/10453/36273.
Full textThe Antarctic marine ecosystem is unique and dynamic, changing seasonally and forming specialised niche habitats including open ocean, sea ice and meltwater environments. Phytoplankton are key species in the structure and function of the Antarctic ecosystem, instrumental in the regions biogeochemistry, fundamental to the food web and strong contributors to global primary production and carbon sequestration. Understanding the photosynthetic plasticity of Antarctic phytoplankton is essential to understanding the effects global change is likely to have on primary production in the region. Through a series of experiments, this thesis explores the processes of light acclimation, photoprotection and photoinhibition in Antarctic microalgae under different environmental stressors, comparing photophysiological responses of species known to inhabit the sea-ice, meltwater and pelagic regions of Antarctic waters. The photosynthetic properties of three Antarctic diatoms (Fragilariopsis cylindrus, Pseudo-nitzschia subcurvata and Chaetoceros sp.) to changes in salinity, temperature and light were compared. Large heterogeneities in the photoprotective capacity of the three species and several distinct physiological strategies in response to the rapid changes in the ambient environment were observed (Publication I). Similarly, photosynthesis and net primary productivity was species-specific with large differences between environmental conditions (Publication II). Fast induction kinetics and pulse amplitude modulated fluorometry were used to demonstrate high levels of flexibility in light acclimation capabilities of sea ice algae from the east Antarctic. Inhibitors and pigment analyses identified xanthophyll cycling as the critical mechanism for photoprotection and preferred means by which sea ice diatoms regulated energy flow to PS1 (Publication III). While immunoblot analyses of natural communities measured minimal D1 protein breakdown in algae exposed to irradiances up to 200 µmol photons m⁻² s⁻¹. These data showed that sea ice diatoms had low intrinsic susceptibility to PSII photoinactivation and strong irradiance-dependent induction of non-photochemical quenching that was independent of protein resynthesis (Publication IV). The remaining chapters investigated photoprotective strategies and photosynthetic plasticity of phytoplankton under nutrient limitation. Nitrogen depletion in F. cylindrus had a strong influence on non-photochemical quenching capacity and resulted in the impairment of photosynthetic electron transport resulting in the formation of Qʙ non-reducing PSII centres within the photosystem (Publication V). The influence of iron-limitation and high light stress on the growth and physiology of Southern Ocean phytoplankton revealed a community-based response of measurable changes in pigment ratios, photosynthetic capacity and community composition (Publication VI). Iron-limited phytoplankton altered the allocation of photosynthetically derived energy, increasing photoprotective pigment pools and down-regulating photochemistry, at the expense of photosynthetic plasticity.
Hung, Sheng-Yu, and 洪聖育. "The study on free-throw line shooting of the accuracy and shooting average by different levels of basketball players under the open and closed eyes conditions." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/vpdpf8.
Full text國立東華大學
體育與運動科學系
105
The purpose of this study was to discuss the accuracy and shooting average of a basketball shot; through shooting with open and closed-eyes from the free-throw-line. Subjects of the study include 10 players from each the level 1 and level 3 of Dong-Hua University who participated in the “Academic Year 99’s College League Games”. In addition, 10 players from Hualien High School who participated in the “Academic Year 99’s High-school League Games” were also measured objects. The experiment came in two stages: The subjects began shooting from the free-throw-line. Stage one starts off with 10 open-eye shots; followed by another 10 of closed-eye shots. Stage two starts off with 15 open-eye shots; followed by another 15 of closed-eye shots. There were 50 shots in total. After each shot, the researchers immediately recorded the scores and shooting average. Finally, an independent two-way ANOVA was used to analyze the accuracy of the shooting tests; while a one-way ANOVA analysis of variance was carried out to investigate the shooting average of free-throw shots. The study results showed that all three groups of subjects performed better in both accuracy and shooting average; and that the level 1 group were better than those of level 3 group and High-school group. A comparison of all three groups on their first and second closed-eye shots, we saw that the level 1 group performed better on their second try; while there were no significant distinctions between the two trials for the level 3 group and the High-school teams. On this basis, we can thus inferred that the level 1 group possesses better adaptability in the closed-eye shots test.
Cassir, Natasha. "Efficacy and stability of orofacial myofunctional therapy on restoring mature pattern of swallowing and nasal breathing in children before orthodontic treatment." Thèse, 2016. http://hdl.handle.net/1866/16429.
Full textIntroduction: Mouth breathing is often associated with a weak orofacial musculature and a low resting tongue position, leading to malocclusion and potentially sleep-disordered breathing in children. Objective: To evaluate the effect of orofacial myofunctional therapy on the reestablishment of a mature pattern of swallowing and nasal breathing by stabilizing a proper position of the tongue and lips at rest. Methods: This prospective randomized single-blind controlled study evaluated 37 patients (age six to fourteen years) divided into two groups who received either a complete orofacial myofunctional therapy (7 sessions) including swallowing pattern and tongue posture, or a simplified therapy modifying their tongue posture (3 sessions). Both groups were seen at three months and one year following treatment completion. Results: Results suggested that treatment outcomes were similar when treating tongue-lip posture at rest along with tongue thrust, and treating without addressing tongue thrust (p = 0.59). Both treatments were efficacious as there was a significant difference between the pre- and post- evaluations for both groups (p < 0.001), and these differences remained stable at the one year follow-up. Conclusion: Treating a tongue thrust habit with specific related exercises, may not be a necessary component of an orofacial myofunctional therapy to reestablish tongue posture at rest and nasal breathing in children with no other functional problems.