Dissertations / Theses on the topic 'Signal processing for network security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Signal processing for network security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Lu, Xiaotao. "Cost-effective signal processing algorithms for physical-layer security in wireless networks." Thesis, University of York, 2016. http://etheses.whiterose.ac.uk/16043/.
Full textDi, Mauro Mario. "Statistical models for the characterization, identification and mitigation of distributed attacks in data networks." Doctoral thesis, Universita degli studi di Salerno, 2018. http://hdl.handle.net/10556/3088.
Full textThe thesis focuses on statistical approaches to model, mitigate, and prevent distributed network attacks. When dealing with distributed network attacks (and, more in general, with cyber-security problems), three fundamental phases/issues emerge distinctly. The first issue concerns the threat propagation across the network, which entails an "avalanche" effect, with the number of infected nodes increasing exponentially as time elapses. The second issue regards the design of proper mitigation strategies (e.g., threat detection, attacker's identification) aimed at containing the propagation phenomenon. Finally (and this is the third issue), it is also desirable to act on the system infrastructure to grant a conservative design by adding some controlled degree of redundancy, in order to face those cases where the attacker has not been yet defeated. The contributions of the present thesis address the aforementioned relevant issues, namely, propagation, mitigation and prevention of distributed network attacks. A brief summary of the main contributions is reported below. The first contribution concerns the adoption of Kendall’s birth-and-death process as an analytical model for threat propagation. Such a model exhibits two main properties: i) it is a stochastic model (a desirable requirement to embody the complexity of real-world networks) whereas many models are purely deterministic; ii) it is able to capture the essential features of threat propagation through a few parameters with a clear physical meaning. By exploiting the remarkable properties of Kendall’s model, the exact solution for the optimal resource allocation problem (namely, the optimal mitigation policy) has been provided for both conditions of perfectly known parameters, and unknown parameters (with the latter case being solved through a Maximum-Likelihood estimator). The second contribution pertains to the formalization of a novel kind of randomized Distributed Denial of Service (DDoS) attack. In particular, a botnet (a network of malicious entities) is able to emulate some normal traffic, by picking messages from a dictionary of admissible requests. Such a model allows to quantify the botnet “learning ability”, and to ascertain the real nature of users (normal or bot) via an indicator referred to as MIR (Message Innovation Rate). Exploiting the considered model, an algorithm that allows to identify a botnet (possibly) hidden in the network has been devised. The results are then extended to the case of a multi-cluster environment, where different botnets are concurrently present in the network, and an algorithm to identify the different clusters is conceived. The third contribution concerns the formalization of the network resilience problem and the consequent design of a prevention strategy. Two statistical frameworks are proposed to model the high availability requirements of network infrastructures, namely, the Stochastic Reward Network (SRN), and the Universal Generating Function (UGF) frameworks. In particular, since in the network environment dealing with multidimensional quantities is crucial, an extension of the classic UGF framework, called Multi-dimensional UGF (MUGF), is devised. [edited by author]
XVI n.s.
Mynampati, Vittal Reddy, Dilip Kandula, Raghuram Garimilla, and Kalyan Srinivas. "Performance and Security of Wireless Mesh Networks." Thesis, Blekinge Tekniska Högskola, Avdelningen för telekommunikationssystem, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2901.
Full textXu, Jingxin. "Unusual event detection in crowded scenes." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/76365/1/Jingxin_Xu_Thesis.pdf.
Full textMoore, Patrick. "Architectural investigation into network security processing." Thesis, Queen's University Belfast, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.492519.
Full textZhao, Wentao. "Genomic applications of statistical signal processing." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2952.
Full textLiu, Jinshan. "Secure and reliable deep learning in signal processing." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/103740.
Full textDoctor of Philosophy
Deep learning has provided computers and mobile devices extraordinary powers to solve challenging signal processing problems. For example, current deep learning technologies are able to improve the quality of machine translation significantly, recognize speech as accurately as human beings, and even outperform human beings in face recognition. Although deep learning has demonstrated great advantages in signal processing, it can be insecure and unreliable if the model is not trained properly or is tested under adversarial scenarios. In this dissertation, we study the following three security and reliability issues in deep learning-based signal processing methods. First, we provide insights on how the deep learning model reliability is changed as the size of training data increases. Since generating training data requires a tremendous amount of labor and financial resources, our research work could help researchers and product developers to gain insights on balancing the tradeoff between model performance and training data size. Second, we propose a novel model to detect the abnormal testing data that are significantly different from the training data. In deep learning, there is no performance guarantee when the testing data are significantly different from the training data. Failing to detect such data may cause severe security risks. Finally, we design a system to detect sensor attacks targeting autonomous vehicles. Deep learning can be easily fooled when the input sensor data are falsified. Security and safety can be enhanced significantly if the autonomous driving systems are able to figure out the falsified sensor data before making driving decisions.
Farhat, Md Tanzin. "An Artificial Neural Network based Security Approach of Signal Verification in Cognitive Radio Network." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo153511563131623.
Full textCARDOSO, LUIZ ALBERTO LISBOA DA SILVA. "ANALYSIS OF PLASTIC NEURAL NETWORK MODELLING APPROACH TO SIGNAL PROCESSING." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 1992. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=9512@1.
Full textOs modelos plásticos de redes neurais são estudados e avaliados como uma interessante abordagem da neurocomputação ao processamento de sinais. Dentre estes, o modelo SONN, recentemente proposto por Tenório e Lee, é revisado e adotado como base para a implementação de um ambiente interativo de prototipagem e análise de redes, dada sua reduzida carga heurística. Como ilustração de seu emprego, um problema de detecção e classificação de sinais pulsados é solucionado, com resultados que preliminarmente indicam a adequação do modelo como ferramenta na filtragem não-linear de sinais e no reconhecimento de padrões.
Plastic neural network models are evaluated as an attractive neurocomputing approach to signal processing. Among these, the SONN model, as recently introduced by Tenorio and Lee, is reviewed and adopted as the basis for the implementation of an interactive network prototyping and analysis system, due to its reduced heuristics. Its use is exemplified in the task of detection and classification of pulsed signals, showing up results that preliminarily qualify the model as a tool for non-linear filtering and pattern recognition applications.
Harper, Scott Jeffery. "A Secure Adaptive Network Processor." Diss., Virginia Tech, 2003. http://hdl.handle.net/10919/28023.
Full textPh. D.
Montaño-Gutierrez, Luis Fernando. "Dynamic signal processing by the glucose sensing network of Saccharomyces cerevisiae." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/28973.
Full textHirotsu, Kenichi. "Neural network hardware with random weight change learning algorithm." Diss., Georgia Institute of Technology, 1993. http://hdl.handle.net/1853/15765.
Full textHloupis, Georgios. "Seismological data acquisition and signal processing using wavelets." Thesis, Brunel University, 2009. http://bura.brunel.ac.uk/handle/2438/3470.
Full textFießler, Andreas Christoph Kurt. "Hybrid Hardware/Software Architectures for Network Packet Processing in Security Applications." Doctoral thesis, Humboldt-Universität zu Berlin, 2019. http://dx.doi.org/10.18452/20023.
Full textNetwork devices like switches, bridges, routers, and firewalls are subject to a continuous development to keep up with ever-rising requirements. As the overhead of software network processing already became the performance-limiting factor for a variety of applications, also former software functions are shifted towards dedicated network processing hardware. Although such application-specific circuits allow fast, parallel, and low latency processing, they require expensive and time-consuming development with minimal possibilities for adaptions. Security can also be a major concern, as these circuits are virtually a black box for the user. Moreover, the highly parallel processing capabilities of specialized hardware are not necessarily an advantage for all kinds of tasks in network processing, where sometimes a classical CPU is better suited. This work introduces and evaluates concepts for building hybrid hardware-software-systems that exploit the advantages of both hardware and software approaches in order to achieve performant, flexible, and versatile network processing and packet classification systems. The approaches are evaluated on standard software systems, extended by a programmable hardware circuit (FPGA) to provide full control and flexibility. One key achievement of this work is the identification and mitigation of challenges inherent when a hybrid combination of multiple packet classification circuits with different characteristics is used. We introduce approaches to reduce redundant classification effort to a minimum, like re-usage of intermediate classification results and determination of dependencies by header space analysis. In addition, for some further challenges in hardware based packet classification like filtering circuits with dynamic updates and fast hash functions for lookups, we describe feasibility and optimizations. At last, the hybrid approach is evaluated using a standard SDN switch instead of the FPGA accelerator to prove portability.
Wang, Zhenzhong. "System Design and Implementation of a Fast and Accurate Bio-Inspired Spiking Neural Network." FIU Digital Commons, 2015. http://digitalcommons.fiu.edu/etd/2227.
Full textFukuzono, Hayato. "Spatial Signal Processing on Distributed MIMO Systems." 京都大学 (Kyoto University), 2016. http://hdl.handle.net/2433/217206.
Full textRatiu, Alin. "Continuous time signal processing for wake-up radios." Thesis, Lyon, INSA, 2015. http://www.theses.fr/2015ISAL0078/document.
Full textWake-Up Receivers (WU-RX) have been recently proposed as candidates to reduce the communication power budget of wireless networks. Their role is to sense the environment and wake up the main receivers which then handle the bulk data transfer. Existing WU-RXs achieve very high sensitivities for power consumptions below 50uW but severely degrade their performance in the presence of out-of-band blockers. We attempt to tackle this problem by implementing an ultra low power, tunable, intermediate frequency filtering stage. Its specifications are derived from standard WU-RX architectures; it is shown that classic filtering techniques are either not tunable enough or demand a power consumption beyond the total WU-RX budget of 100uW. We thus turn to the use of Continuous Time Digital Signal Processing (CT-DSP) which offers the same level of programmability as standard DSP solutions while providing an excellent scalability of the power consumption with respect to the characteristics of the input signal. A CT-DSP chain can be divided into two parts: the CT-ADC and the CT-DSP itself; the specifications of these two blocks, given the context of this work, are also discussed. The CT-ADC is based on a novel, delta modulator-based architecture which achieves a very low power consumption; its maximum operation frequency was extended by the implementation of a very fast feedback loop. Moreover, the CT nature of the ADC means that it does not do any sampling in time, hence no anti-aliasing filter is required. The proposed ADC requires only 24uW to quantize signals in the [10MHz 50MHz] bandwidth for an SNR between 32dB and 42dB, resulting in a figure of merit of 3-10fJ/conv-step, among the best reported for the selected frequency range. Finally, we present the architecture of the CT-DSP which is divided into two parts: a CT-IIR and a CT-FIR. The CT-IIR is implemented by placing a standard CT-FIR in a feedback loop around the CT-ADC. If designed correctly, the feedback loop can now cancel out certain frequencies from the CT-ADC input (corresponding to those of out-of-band interferers) while boosting the power of the useful signal. The effective amplitude of the CT-ADC input is thus reduced, making it generate a smaller number of tokens, thereby reducing the power consumption of the subsequent CT-FIR by a proportional amount. The CT-DSP consumes around 100uW while achieving more than 40dB of out-of-band rejection; for a bandpass implementation, a 2MHz passband can be shifted over the entire ADC bandwidth
Larson, P. T., and D. A. Sheaffer. "TRANSIENT REDUCTION ANALYSIS using NEURAL NETWORKS (TRANN)." International Foundation for Telemetering, 1992. http://hdl.handle.net/10150/608892.
Full textOur telemetry department has an application for a data categorization/compression of a high speed transient signal in a short period of time. Categorization of the signal reveals important system performance and compression is required because of the terminal nature of our telemetry testing. Until recently, the hardware for the system of this type did not exist. A new exploratory device from Intel has the capability to meet these extreme requirements. This integrated circuit is an analog neural network capable of performing 2 billion connections per second. The two main advantages of this chip over traditional hardware are the obvious computation speed of the device and the ability to compute a three layer feed-forward neural network classifier. The initial investigative development work using the Intel chip has been completed. The results from this proof of concept will show data categorization/compression performed on the neural network integrated circuit in real time. We will propose a preliminary design for a transient measurement system employing the Intel integrated circuit.
Hussain, A. "Novel artificial neural network architectures and algorithms for non-linear dynamical system modelling and digital communications applications." Thesis, University of Strathclyde, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.263481.
Full textAl-Breiki, Mohamed Ahmed Mohamed Naser. "Digital signal processing extra-tropical cyclones warning system using WiMAX." Thesis, University of Hertfordshire, 2013. http://hdl.handle.net/2299/10628.
Full textWang, Lu. "Task Load Modelling for LTE Baseband Signal Processing with Artificial Neural Network Approach." Thesis, KTH, Signalbehandling, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-160947.
Full textDenna avhandling utvecklar ett automatiskt eller ett guidat automatiskt verktyg for att forutsaga behov av hardvaruresurser, ocksa kallat uppgiftsbelastning, med avseende pa programvarans algoritmparametrar i en LTE basstation. I signalbehandling i en LTE basstation, ar det viktigt att fa kunskap om hur mycket av hardvarans resurser som kommer att tas i bruk nar en programvara ska koras pa en viss plattform. Informationen ar vardefull for nagon att forsta systemet och plattformen battre, vilket kan mojliggora en rimlig anvandning av tillgangliga resurser. Processen att utveckla verktyget anses vara processen att bygga en matematisk modell mellan hardvarans belastning och programvaruparametrarna, dar processen denieras som approximation av en funktion. Enligt den universella approximationssatsen, kan problemet losas genom en intelligent metod som kallas articiella neuronnat (ANN). Satsen visar att en godtycklig funktion kan approximeras med ett tva-skiktS neuralt natverk sa lange aktiveringsfunktionen och antalet dolda neuroner ar korrekt. Avhandlingen dokumenterar ett arbets- ode for att bygga modellen med ANN-metoden, samt studerar matematiska metoder for val av delmangder av data, sasom Partiell korrelation och sekventiell sokning som dataforbehandlingssteg for ANN. For att gora valet av uppgifter som lampar sig for ANN har en andring gjorts i den sekventiella sokmetoden, som ger battre resultat. Resultaten visar att det ar mojligt att utveckla ett sadant guidat automatiskt verktyg for prediktionsandamal i LTE basbandssignalbehandling under specika precisions begransningar. Jamfort med andra metoder, har dessa modellverktyg med intelligent tillvagagangssatt en hogre precisionsniva och battre adaptivitet, vilket innebar att den kan anvandas i godtycklig del av plattformen aven om overforingskanalerna ar olika.
Peng, Liangjian. "Applications of artificial neural networks to power systems network reduction and static security assessment." Thesis, University of Strathclyde, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.366090.
Full textHu, Xi. "Network and sensor management for mulitiple sensor emitter location system." Diss., Online access via UMI:, 2008.
Find full textIncludes bibliographical references.
Ali, Rozniza. "Ensemble classification and signal image processing for genus Gyrodactylus (Monogenea)." Thesis, University of Stirling, 2014. http://hdl.handle.net/1893/21734.
Full textFERRETTI, DANIELE. "Signal Processing algorithms and Learning Systems for Infant Cry Detection." Doctoral thesis, Università Politecnica delle Marche, 2019. http://hdl.handle.net/11566/263671.
Full textNewborns’ cry signals contain valuable information related to the state of the infant. Extracting this information requires a cry detection algorithm able to operate in environments with challenging acoustic conditions, since multiple noise sources, such as interferent cries, medical equipments, and persons may be present. Cry detection is an important facility in both residential and public environments, which can answer to different needs of both private and professional users. In the current dissertation the issue of cry detection in professional and acoustic noisy environments such as Neonatal Intensive care units (NICUs) will be investigate. The research, presented in this thesis, describes the developed approaches for the infant cry detection suitable for NICUs as well as an effective training methodology that does not require labeled data collected in the specific domains of use. In the described approaches the acoustic noise reduction is performed processing multiple audio channels using digital signal processing techniques as well as neural strategies. These approaches use Deep Neural Networks, whose training is conducted on a synthetic dataset created by means of a suitable Acoustic Scene Simulation procedure. The Acoustic Scene Simulation allows the creation of a synthetic dataset that, differently from a real-life dataset, can be acquired without access a NICU. The obtained detection results confirm the goodness of the developed approaches overcoming the performance achieved by the algorithms of the state of art taken as reference and proving that a synthetic dataset can be a useful replacement with respect to a real-life dataset, at least in the early design process. The proposed training methodology permits to lower the interaction with a sensitive environment such as a NICU, to the bare minimum and can be exploited to include changes to the environment as needed, without requiring additional acquisition sessions.
Legge, Bruce A. "Code division multiple access local area network communications employing fiber optic signal processing techniques." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA274897.
Full textThesis advisor(s): Powers, John Patrick. "September 1993." Includes bibliographical references. Also available online.
Balupari, Ravindra. "Real-time network-based anomaly intrusion detection." Ohio : Ohio University, 2002. http://www.ohiolink.edu/etd/view.cgi?ohiou1174579398.
Full textMei, Jonathan B. "Principal Network Analysis." Research Showcase @ CMU, 2018. http://repository.cmu.edu/dissertations/1175.
Full textBrown, Trevor Junior. "Time division multiple access/code division multiple access for the optical local access network." Thesis, Manchester Metropolitan University, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.243716.
Full textEl-Menhawy, A. El-H. "Computer Aided Design of VLSI algorithms for digital signal processing based on the Residue Number System." Thesis, University of Kent, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.376344.
Full textKohout, James. "Design and performance analysis of MPI-SHARC a high-speed network service for distributed digital signal processor systems /." [Gainesville, Fla.] : University of Florida, 2001. http://etd.fcla.edu/etd/UF/anp4297/MASTER.pdf.
Full textTitle from first page of PDF file. Document formatted into pages; contains ix, 69 p.; also contains graphics. Vita. Includes bibliographical references (p. 66-68).
Perry, Stuart William. "Adaptive image restoration perception based neural network models and algorithms /." Connect to full text, 1998. http://hdl.handle.net/2123/389.
Full textTitle from title screen (viewed Apr. 16, 2008). Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy to the School of Electrical and Information Engineering, Faculty of Engineering. Degree awarded 1999; thesis submitted 1998. Includes bibliography. Also available in print form.
Kalibjian, Jeff. "AN UPDATE ON NETWORK-BASED SECURITY TECHNOLOGIES APPLICABLE TO TELEMETRY POST-PROCESSING AND ANALYSIS ACTIVITIES." International Foundation for Telemetering, 2007. http://hdl.handle.net/10150/604578.
Full textNetworked based technologies (i.e. TCP/IP) have come to play an important role in the evolution of telemetry post processing services. A paramount issue when using networking to access/move telemetry data is security. In past years papers have focused on individual security technologies and how they could be used to secure telemetry data. This paper will review currently available network based security technologies, update readers on enhancements, and discuss their appropriate uses in the various phases of telemetry post-processing and analysis activities.
Choi, Hyunjong. "Medical Image Registration Using Artificial Neural Network." DigitalCommons@CalPoly, 2015. https://digitalcommons.calpoly.edu/theses/1523.
Full textTepvorachai, Gorn. "An Evolutionary Platform for Retargetable Image and Signal Processing Applications." Case Western Reserve University School of Graduate Studies / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=case1209504058.
Full textKalibjian, J. R. "Telemetry Post-Processing in the Clouds: A Data Security Challenge." International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595799.
Full textAs organizations move toward cloud [1] computing environments, data security challenges will begin to take precedence over network security issues. This will potentially impact telemetry post processing in a myriad of ways. After reviewing how data security tools like Enterprise Rights Management (ERM), Enterprise Key Management (EKM), Data Loss Prevention (DLP), Database Activity Monitoring (DAM), and tokenization are impacting cloud security, their effect on telemetry post-processing will also be examined. An architecture will be described detailing how these data security tools can be utilized to make telemetry post-processing environments in the cloud more robust.
Kalibjian, Jeff. "Storage Systems and Security Challenges in Telemetry Post Processing Environments." International Foundation for Telemetering, 2008. http://hdl.handle.net/10150/606206.
Full textA common concern in telemetry post-processing environments is adequate disk storage capacity to house captured and post-processed telemetry data. In today's network environments there are many storage solutions that can be deployed to address storage needs. Recent trends in storage systems reveal movement to implement security services in storage systems. After reviewing storage options appropriate for telemetry post-processing environments; the security services such systems typically offer will also be discussed and contrasted with other third party security services that might be implemented directly on top of a networked storage system.
Flowers, Bryse Austin. "Adversarial RFML: Evading Deep Learning Enabled Signal Classification." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/91987.
Full textMaster of Science
Deep learning is beginning to permeate many commercial products and is being included in prototypes for next generation wireless communications devices. This technology can provide huge breakthroughs in autonomy; however, it is not sufficient to study the effectiveness of deep learning in an idealized laboratory environment, the real world is often harsh and/or adversarial. Therefore, it is important to know how, and when, these deep learning enabled devices will fail in the presence of bad actors before they are deployed in high risk environments, such as battlefields or connected autonomous vehicle communications. This thesis studies a small subset of the security vulnerabilities of deep learning enabled wireless communications devices by attempting to evade deep learning enabled signal classification by an eavesdropper while maintaining effective wireless communications with a cooperative receiver. The primary goal of this thesis is to define the threats to, and identify the current vulnerabilities of, deep learning enabled signal classification systems, because a system can only be secured once its vulnerabilities are known.
Rochford, Matthew. "Visual Speech Recognition Using a 3D Convolutional Neural Network." DigitalCommons@CalPoly, 2019. https://digitalcommons.calpoly.edu/theses/2109.
Full textHan, Seon Yeong. "Shadowing effect on ad hoc network." Diss., Online access via UMI:, 2004. http://wwwlib.umi.com/dissertations/fullcit/1422359.
Full textRuprecht, Nathan Alexander. "Implementation of Compressive Sampling for Wireless Sensor Network Applications." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157614/.
Full textChance, Christopher P. "Designing and implementing a network authentication service for providing a secure communication channel." Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9903.
Full textBajzík, Jakub. "Rozpoznání zvukových událostí pomocí hlubokého učení." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-401993.
Full textCosta, Pascale. "Contribution à l'utilisation des réseaux de neurones à couches en traitement du signal." Cachan, Ecole normale supérieure, 1996. http://www.theses.fr/1996DENS0030.
Full textLiu, Cheng. "Advanced system design and signal processing techniques for converged high-speed optical and wireless applications." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/49058.
Full textKarunanidhi, Karthikeyan. "ARROS; distributed adaptive real-time network intrusion response." Ohio : Ohio University, 2006. http://www.ohiolink.edu/etd/view.cgi?ohiou1141074467.
Full textBjörk, Tim. "Exploring Change Point Detection in Network Equipment Logs." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-85626.
Full textMackenzie, Mark. "Correlation with the hermite series using artificial neural network technology." Access electronically, 2004. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20050202.122218/index.html.
Full textHümmer, Christian Verfasser], and Walter [Akademischer Betreuer] [Gutachter] [Kellermann. "A Bayesian Network Approach to Selected Problems in Speech Signal Processing / Christian Hümmer ; Gutachter: Walter Kellermann ; Betreuer: Walter Kellermann." Erlangen : Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), 2019. http://d-nb.info/1180028368/34.
Full textHümmer, Christian [Verfasser], and Walter [Akademischer Betreuer] [Gutachter] Kellermann. "A Bayesian Network Approach to Selected Problems in Speech Signal Processing / Christian Hümmer ; Gutachter: Walter Kellermann ; Betreuer: Walter Kellermann." Erlangen : Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), 2019. http://d-nb.info/1180028368/34.
Full text