Dissertations / Theses on the topic 'Sûreté de comportement'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 21 dissertations / theses for your research on the topic 'Sûreté de comportement.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Deborne, Renaud. "Modélisation de l'adaptation des conducteurs au comportement du véhicule et expérimentations sur simulateur." Phd thesis, Ecole Centrale Paris, 2009. http://tel.archives-ouvertes.fr/tel-00453301.
Full textLericolais, Marine. "Terrorisme international et mesures de sûreté : analyse économique du comportement du voyageur sur le réseau de transport aérien mondial." Phd thesis, Université Lumière - Lyon II, 2011. http://tel.archives-ouvertes.fr/tel-00816114.
Full textLi, Letitia. "Approche orientée modèles pour la sûreté et la sécurité des systèmes embarqués." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLT002/document.
Full textThe presence of communicating embedded systems/IoTs in our daily lives have brought a myriad of benefits, from adding conveniences and entertainment, to improving the safety of our commutes and health care. However, the flaws and vulnerabilities in these devices expose their users to risks of property damage, monetary losses, and personal injury. For example, consumer vehicles, both connected and conventional, have succumbed to a variety of design flaws resulting in injuries and death. At the same time, as vehicles are increasingly connected (and in the near future, autonomous), researchers have demonstrated possible hacks on their sensors or internal control systems, including direct injection of messages on the CAN bus.Ensuring the safety of users or bystanders involves considering multiple factors. Conventional safety suggests that a system should not contain software and hardware flaws which can prevent it from correct function. `Safety of the Intended Function' involves avoiding the situations which the system or its components cannot handle, such as adverse extreme environmental conditions. Timing can be critical for certain real-time systems, as the system will need to respond to certain events, such as obstacle avoidance, within a set period to avoid dangerous situations. Finally, the safety of a system depends on its security. An attacker who can send custom commands or modify the software of the system may change its behavior and send it into various unsafe situations. Various safety and security countermeasures for embedded systems, especially connected vehicles, have been proposed. To place these countermeasures correctly requires methods of analyzing and verifying that the system meets all safety, security, and performance requirements, preferably at the early design phases to minimize costly re-work after production. This thesis discusses the safety and security considerations for embedded systems, in the context of Institut Vedecom's autonomous vehicle. Among the proposed approaches to ensure safety and security in embedded systems, Model-Driven Engineering is one such approach that covers the full design process, from elicitation of requirements, design of hardware and software, simulation/formal verification, and final code generation. This thesis proposes a modeling-based methodology for safe and secure design, based on the SysML-Sec Methodology, which involve new modeling and verification methods. Security modeling is generally performed in the last phases of design. However, security impacts the early architecture/mapping and HW/SW partitioning decisions should be made based on the ability of the architecture to satisfy security requirements. This thesis proposes how to model the security mechanisms and the impact of an attacker as relevant to the HW/SW Partitioning phase. As security protocols negatively impact performance, it becomes important to measure both the usage of hardware components and response times of the system. Overcharged components can result in unpredictable performance and undesired delays. This thesis also discusses latency measurements of safety-critical events, focusing on one critical to autonomous vehicles: braking as after obstacle detection. Together, these additions support the safe and secure design of embedded systems
Depigny, Marine. "Terrorisme international et mesures de sûreté : analyse économique du comportement du voyageur sur le réseau de transport aérien mondial." Thesis, Lyon 2, 2011. http://www.theses.fr/2011LYO22020/document.
Full textIn our dissertation, we question the impact of both international terrorism and security measures on the behavior of the users of the global air transportation network. Using an econometric model, we analyze a new database, AirNetTerror, which contains data on all international passenger flows toward the U.S. from 1990 to 2006 as well as the events of international terrorism by country for the same period. The relevance of our research is twofold. On the one hand, our investigation regarding air travelers’ behavior and their possibilities of modifying their itinerary in light of international terrorism has – so far as we know – never been studied. On the other hand, as we analyze passenger flows from the perspective of the network, we propose a dynamic representation of the impact of travelers’ behavior changes related to terrorist threats and security measures. In particular, taking into account the interdependent security that rules the global air transport network, allows us to question the existence of failures in security measures. Our results underline a significant impact of both international terrorist events and security measures. Furthermore, we locally observe itinerary modifications of travelers that are linked to the previous phenomena. Thus, the combined effect of terrorist threats and security measures seems to lead to equilibrium breaks – that are limited but real – in passenger flows of the global air network. Our thesis offers a different representation of the impact of international terrorism on air transport by placing the traveler’s behavior at the center of the strategic interactions between security actors and terrorists
Ferry, Laura. "Contribution à l'étude du comportement du tritium dans le béryllium (contexte ITER)." Thesis, Aix-Marseille, 2017. http://www.theses.fr/2017AIXM0355.
Full textBeryllium will be used as a plasma-facing material for the ITER vacuum vessel. Due to high plasma fluxes, significant amounts of hydrogen isotopes could be retained in the beryllium walls. From the safety point of view, it is important to assess the capability of devices which will be used to limit the tritium inventory in the tokamak in nominal conditions and secondly, to predict the behaviour of tritium in case of accident. The objective of this work is to evaluate within the framework of the Density Functional Theory the behaviour of tritium in beryllium in terms of retention and desorption mechanisms. Firstly, the stability of point defects in beryllium has been evaluated and compared to experiments. Vacancies are shown to be the dominant defect in beryllium. Then, the most stable interstitial sites for tritium atoms and the most favorable migration pathways have been determined. This study has been extended to multiple-trapping phenomenon in monovacancy, in which up to five atoms can be trapped. These data have been used in a kinetic Monte-Carlo code to calculate the diffusion coefficient of tritium and a reaction-diffusion based model, which provides a good agreement with experimental thermal desorption spectra made at IEK-4 (Jülich -- Germany). The emergence of desorption peak at low temperature under high fluence could be explained by the hydride formation
Ferry, Laura. "Contribution à l'étude du comportement du tritium dans le béryllium (contexte ITER)." Electronic Thesis or Diss., Aix-Marseille, 2017. http://www.theses.fr/2017AIXM0355.
Full textBeryllium will be used as a plasma-facing material for the ITER vacuum vessel. Due to high plasma fluxes, significant amounts of hydrogen isotopes could be retained in the beryllium walls. From the safety point of view, it is important to assess the capability of devices which will be used to limit the tritium inventory in the tokamak in nominal conditions and secondly, to predict the behaviour of tritium in case of accident. The objective of this work is to evaluate within the framework of the Density Functional Theory the behaviour of tritium in beryllium in terms of retention and desorption mechanisms. Firstly, the stability of point defects in beryllium has been evaluated and compared to experiments. Vacancies are shown to be the dominant defect in beryllium. Then, the most stable interstitial sites for tritium atoms and the most favorable migration pathways have been determined. This study has been extended to multiple-trapping phenomenon in monovacancy, in which up to five atoms can be trapped. These data have been used in a kinetic Monte-Carlo code to calculate the diffusion coefficient of tritium and a reaction-diffusion based model, which provides a good agreement with experimental thermal desorption spectra made at IEK-4 (Jülich -- Germany). The emergence of desorption peak at low temperature under high fluence could be explained by the hydride formation
Beylat, Delphine. "Contribution à l'étude du comportement dynamique aléatoire de structures libres et empilées sous séïsme." Thesis, Université Clermont Auvergne (2017-2020), 2020. http://www.theses.fr/2020CLFAC041.
Full textA free-standing (i.e. placed on the ground and not anchored) structure can be found in severalindustrial facilities during maintenance operations, in storage halls, etc. During an earthquake,these stacks are likely to rock, slide or overturn. Thus, one of the main concerns regarding theseismic risk studies is to assess and limit, as the case may be, their excessive movements (due tosliding or overturning) to avoid impacts with the surroundings. In this work the earthquake responsesof a free standing stacked structure composed of three pallets intended to store packagesare investigated.The study of the seismic behavior of free-standing structures is known to be a quite challengingtask. Indeed, this problem involves several difficulties due to the large displacements, largerotations and also impact and friction nonlinearities. This implies an extreme sensitivity of theirseismic responses to small perturbations, both experimentally and numerically. Therefore, to analyzeand to predict how they respond under seismic excitation, probabilistic approaches are necessary.First of all, in order to have a quick estimate of the seismic response of the stack taking intoaccount the predominant physical phenomena that take place under unidirectional excitation, asimplified four degrees of freedom analyticalmodel, inspired fromliterature, has been developed.Then, different finite element models, more or less refined, have also been implemented. At thesame time, a comprehensive experimental campaign has been performed on an unidirectionalshaking table of the CEA / Saclay. These experimental results allow us to (i) validate the numericalmodel and (ii) identify the sensitivity of seismic responses (both experimental and numerical).Both approaches - numerical and experimental - combined with probabilistic approacheswere carried out simultaneously during this work and highlight several phenomena. A deterministicapproach identified the consequences of the uplift of the structure on the global behavior :the « fundamental » frequency mode is higher in the rocking phase than in the full contact phase.This work also showed that the adjustment of the dynamic properties of the models is an essential,but delicate task, to obtain an adequate nonlinear response. This means that it will be difficultto know a priori what will be the dynamic properties of the structure. Nevertheless, the simplifiedanalytical model can be used to quickly evaluate the models’sensitivity in relation to the mainphysical parameters, although the sensitivity is not necessarily comparable from one model toanother. In addition, as it is often noted with industrial structures, the seismic tests have shownthat the motion of the stacking was not purely 2D even under an unidirectional excitation. Consequently,defects have been introduced in the models and the numerical results showed an overallsatisfactory agreement by comparison with experimental results. A probabilistic analysis of thedynamic behavior of stacking, entirely conducted in a reliability context and based on the calculationof three usual reliability indicators (the failure probability and the Cornell and Hasofer-Lindreliability index), confirms the deterministic results obtained for each of the seismic excitationsconsidered (uni, bi and tridirectional). However, this effect is less marked for bi and tridirectional excitations
Collong, Sophie. "Conception des systèmes mécaniques complexes en comportement dynamique. Contribution à une démarche physico-fiabiliste à partir d'un système à pile à combustible pour véhicule électrique à hydrogène." Thesis, Belfort-Montbéliard, 2016. http://www.theses.fr/2016BELF0283/document.
Full textThe integration of complex mechanical systems subject to stringent vibration environments requiresconsideration of the real conditions of use from the beginning of the design phase.The thesis shows that the vibration environment and the duration of exposure to this environmentdepend on the use of the system throughout its life cycle. The evaluation of its use is based on thejoint evolution of both the user behavior and the system technology development.The dependability analysis of a complex mechanical system leads to consider the system as a wholeand thus to investigate in depth the dynamic behavior of critical components. A basic modeling ofthe mechanical system allows to qualitatively and quantitatively identify key dynamic behaviors anddetermines the vibration loads to which selected critical components are subjected. On this basis,modeling the behavior of a mechanical component leads to assess its fatigue damage. This indicatorhelps the designer in his choice of component geometry.Finally, the climatic environment as well as effects related to the internal functioning of the system,have been taken into account by performing vibro-climatic tests of on an operating systems, i.e. a fuelcell system integrated into a hydrogen electric vehicle. This helped to develop a procedure to supportthe design of complex mechanical systems
Ongagna, Philippe. "L'état dangereux délictuel et post-délictuel des majeurs délinquants en droit pénal français." Grenoble 2, 2003. http://www.theses.fr/2003GRE21035.
Full textWith the eyes of the whole of the doctrines, the penal responsibility was always regarded as the only base for the French criminal law. The concept of dangerous statute, often presented primarily under its pre-criminal aspect, reduced to categories of infringements (infringements obstacles), and to certain types of delinquent (alcoholic dangerous, mental lunatics etc) thus does not seem a base of the French repressive system. With looking there closely however, this thesis does not resist the analysis. Indeed, the study of the concept of dangerous statute approached under its criminal and post-criminal aspect makes it possible to check with which point this concept seems one of the essential bases of the French criminal law. Implicit base certainly, because of the silence of the legislator on this subject, but undeniable base. Contrary to the thesis more revenue, the role of the dangerous statute appears not only at the stage of the choice and the execution of the sorrow, but also at the time of the research of the culpability. Far from being opposed or being excluded, the dangerous statute and the penal responsibility are as complementary as the sorrow and the measurement of safety
Djahel, Soufiene. "Secure routing and medium access protocols in wireless multi-hop networks." Thesis, Lille 1, 2010. http://www.theses.fr/2010LIL10094/document.
Full textWhile the rapid proliferation of mobile devices along with the tremendous growth of various applications using wireless multi-hop networks have significantly facilitate our human life, securing and ensuring high quality services of these networks are still a primary concern. In particular, anomalous protocol operation in wireless multi-hop networks has recently received considerable attention in the research community. These relevant security issues are fundamentally different from those of wireline networks due to the special characteristics of wireless multi-hop networks, such as the limited energy resources and the lack of centralized control. These issues are extremely hard to cope with due to the absence of trust relationships between the nodes.To enhance security in wireless multi-hop networks, this dissertation addresses both MAC and routing layers misbehaviors issues, with main focuses on thwarting black hole attack in proactive routing protocols like OLSR, and greedy behavior in IEEE 802.11 MAC protocol. Our contributions are briefly summarized as follows. As for black hole attack, we analyze two types of attack scenarios: one is launched at routing layer, and the other is cross layer. We then provide comprehensive analysis on the consequences of this attack and propose effective countermeasures. As for MAC layer misbehavior, we particularly study the adaptive greedy behavior in the context of Wireless Mesh Networks (WMNs) and propose FLSAC (Fuzzy Logic based scheme to Struggle against Adaptive Cheaters) to cope with it. A new characterization of the greedy behavior in Mobile Ad Hoc Networks (MANETs) is also introduced. Finally, we design a new backoff scheme to quickly detect the greedy nodes that do not comply with IEEE 802.11 MAC protocol, together with a reaction scheme that encourages the greedy nodes to become honest rather than punishing them
Lecerf, Ugo. "Robust learning for autonomous agents in stochastic environments." Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS253.
Full textIn this work we explore data-driven deep reinforcement learning (RL) approaches for an autonomous agent to be robust to a navigation task, and act correctly in the face of risk and uncertainty. We investigate the effects that sudden changes to environment conditions have on autonomous agents and explore methods which allow an agent to have a high degree of generalization to unforeseen, sudden modifications to its environment it was not explicitly trained to handle. Inspired by the human dopamine circuit, the performance of an RL agent is measured and optimized in terms of rewards and penalties it receives for desirable or undesirable behaviour. Our initial approach is to learn to estimate the distribution of expected rewards from the agent, and use information about modes in this distribution to gain nuanced information about how an agent can act in a high-risk situation. Later, we show that we are able to achieve the same robustness objective with respect to uncertainties in the environment by attempting to learn the most effective contingency policies in a `divide and conquer' approach, where the computational complexity of the learning task is shared between multiple policy models. We then combine this approach with a hierarchical planning module which is used to effectively schedule the different policy models in such a way that the collection of contingency plans is able to be highly robust to unanticipated environment changes. This combination of learning and planning enables us to make the most of the adaptability of deep learning models, as well as the stricter and more explicit constraints that can be implemented and measured by means of a hierarchical planner
Ndong, Joseph. "Détection de comportements anormaux dans les applications réseaux." Paris 6, 2011. http://www.theses.fr/2011PA066670.
Full textReynaud, Daniel. "Analyse de codes auto-modifiants pour la sécurité logicielle." Thesis, Vandoeuvre-les-Nancy, INPL, 2010. http://www.theses.fr/2010INPL049N/document.
Full textSelf-modifying programs run in a very specific way: they are capable to rewrite their own code at runtime. Remarkably absent from theoretical computation models, they are present in every modern computer and operating system. Indeed, they are used by bootloaders, for just-in-time compilation or dynamic optimizations. They are also massively used by malware authors in order to bypass antivirus signatures and to delay analysis. Finally, they are unintentionally present in every program, since we can model code injection vulnerabilities (such as buffer overflows) as the ability for a program to accidentally execute data.In this thesis, we propose a formal framework in order to characterize advanced self-modifying behaviors and code armoring techniques. A prototype, TraceSurfer, allows us to detect these behaviors by using fine-grained execution traces and to visualize them as self-reference graphs. Finally, we assess the performance and efficiency of the tool by running it on a large corpus of malware samples
Chen, Lin. "Comportements malveillants et égoïstes dans les réseaux sans fils : une approche basée sur la théorie des jeux non-coopératifs." Paris, ENST, 2008. https://pastel.hal.science/pastel-00005356.
Full textThe last two decades have witnessed an unprecedented success of wireless networks due to the proliferation of inexpensive, widely available wireless devices. With such an explosive growth, the traditional paradigm of centralized, fixed networks can no longer satisfy the dramatically increasing demand for wireless services and connections, which poses imminent challenges on network management and control, among which security is a primary concern. The thesis introduces an axis of research where non-cooperative game theory is applied as a systematical framework to model and analyze selfish and malicious behaviors in wireless networks. The major contribution of the thesis lies in the modeling of selfish and malicious behaviors in wireless networks as well as the design of efficient protocols based on the modeling results to cope with them. The thesis is divided into two parts, respectively dedicated to selfish and malicious behaviors. More specifically, the thesis provides a comprehensive study on the following selfish and malicious behaviors under the non-cooperative game theoretic framework : - Selfish behaviors - MAC layer selfish behaviors in IEEE 802. 11 wireless networks - Non-cooperative power and rate control in IEEE 802. 11 wireless networks - Cooperative relaying in wireless networks with selfish users - Malicious behaviors - Intrusion detection in heterogeneous networks - Jamming attack in wireless networks and defense strategy - Multihop routing amid malicious attackers in wireless networks
Pometko, Serguei͏̈. "Modélisation, dans un logiciel de sûrete, du comportement d'un bain liquide de matériaux fondus au cours d'un accident grave dans un coeur de réacteur." Aix-Marseille 1, 1996. http://www.theses.fr/1996AIX11004.
Full textWagener, Gérard. "Self-Adaptive Honeypots Coercing and Assessing Attacker Behaviour." Phd thesis, Institut National Polytechnique de Lorraine - INPL, 2011. http://tel.archives-ouvertes.fr/tel-00627981.
Full textAyachi, Mohamed Ali. "Contributions à la détection des comportements malhonnêtes dans les réseaux ad hoc AODV par analyse de la confiance implicite." Phd thesis, Université Rennes 1, 2011. http://tel.archives-ouvertes.fr/tel-00660467.
Full textHaiman, George. "Comparaison en probabilité et presque sûre du comportement des extrêmes de certaines suites stationnaires à celui de la suite des variables aléatoires equidistribuée de même loi marginale." Paris 6, 1986. http://www.theses.fr/1986PA066091.
Full textGomes, Valéria. "L’organisation des comportements d’attachement chez l’enfant avec des troubles spécifiques du développement du langage." Thesis, Lyon 2, 2015. http://www.theses.fr/2015LYO20003/document.
Full textThis study aims to characterize the linguistic and developmental profile of a population of Portuguese-speaking children with specific language impairment (SLI) and analyze, within the context of attachment theory, how the SLI child uses his mother as a secure base, compared to children without language disorders. In the other eAs a final point, we tried to study the predictive value of attachment and developmental variables in the language skills of children. The participants of our study were 83 mother-child dyads (children aged 4-5 years), divided into two groups. Through various measures of language and AQS (Waters, 1995), we found that these children: 1) present, in pre-school age, severe alterations of language, though their profiles are very heterogeneous; 2) are mostly boys, with a ratio of 3:1; 3) show a lower quality of attachment security, when compared with their peers without language alterations, as well as less attachment behaviors, such as smooth interaction, proximity and physical contact with the mother. It was also found that attachment and tobacco use, relationship with friends and family background are predictors of the linguistic difficulties of these children, as well as of language acquisition timing, explaining 7% to 21% of the variance
François, Jérôme. "Robustesse et Identification des Applications Communicantes." Phd thesis, Université Henri Poincaré - Nancy I, 2009. http://tel.archives-ouvertes.fr/tel-00442008.
Full textMirebrahimi, Seyedmeghdad. "Interacting stochastic systems with individual and collective reinforcement." Thesis, Poitiers, 2019. http://www.theses.fr/2019POIT2274/document.
Full textThe Polya urn is the paradigmatic example of a reinforced stochastic process. It leads to a random (non degenerated) almost sure (a.s.) time-limit.The Friedman urn is a natural generalization whose a.s. time-limit is not random anymore. Many stochastic models for applications are based on reinforced processes, like urns with their use in adaptive design for clinical trials or economy, stochastic algorithms with their use in non parametric estimation or optimisation. In this work, in the stream of previous recent works, we introduce a new family of (finite) systems of reinforced stochastic processes, interacting through an additional collective reinforcement of mean field type. The two reinforcement rules strengths (one componentwise, one collective) are tuned through (possibly) different rates. In the case the reinforcement rates are like 1/n, these reinforcements are of Polya or Friedman type as in urn contexts and may thus lead to limits which may be random or not. We state two kind of mathematical results. Different parameter regimes needs to be considered: type of reinforcement rule (Polya/Friedman), strength of the reinforcement. We study the time-asymptotics and prove that a.s. convergence always holds. Moreover all the components share the same time-limit (synchronization). The nature of the limit (random/deterministic) according to the parameters' regime is considered. We then study fluctuations by proving central limit theorems. Scaling coefficients vary according to the regime considered. This gives insights into the different rates of convergence