Siga este enlace para ver otros tipos de publicaciones sobre el tema: 3D security.

Tesis sobre el tema "3D security"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 21 mejores tesis para su investigación sobre el tema "3D security".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Rolland-Nevière, Xavier. "Tatouage 3D robuste." Thesis, Nice, 2014. http://www.theses.fr/2014NICE4083/document.

Texto completo
Resumen
Les modèles 3D sont des contenus précieux très utilisés dans l'industrie, et donc la cible potentielle de piratages. Le tatouage robuste pour les maillages 3D apporte une réponse au problème du traçage de traître. Dans l'état de l'art du domaine, la couche d'adaptation du contenu en particulier est testée face des attaques standards. Une approche robuste à la pose est alors étudiée. Elle utilise une estimation robuste de l'épaisseur, définie comme la distance un nuage de points construits à partir de mesures du diamètre. Les performances expérimentales montrent qu'elle forme un point de départ
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Musa, Shahrulniza. "Visualising network security attacks with multiple 3D visualisation and false alert classification." Thesis, Loughborough University, 2008. https://dspace.lboro.ac.uk/2134/14241.

Texto completo
Resumen
Increasing numbers of alerts produced by network intrusion detection systems (NIDS) have burdened the job of security analysts especially in identifying and responding to them. The tasks of exploring and analysing large quantities of communication network security data are also difficult. This thesis studied the application of visualisation in combination with alerts classifier to make the exploring and understanding of network security alerts data faster and easier. The prototype software, NSAViz, has been developed to visualise and to provide an intuitive presentation of the network security
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Nunnally, Troy J. "Advanced visualizations for network security." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52993.

Texto completo
Resumen
Monitoring volumes of malicious network data for across multiple sources can potentially be overwhelming. As a result, vital data is at a greater risk of being overlooked and the time span for analyzing it could be too lengthy. One way to address this issue is to employ network security visualization techniques to evaluate security risks and identify malicious activity to help mitigate compromised nodes on a network. The purpose of this thesis is to introduce a visualization framework to help reduce task-completion time, enhance situational awareness, and decrease user error of complex visua
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Bishop, Craig, Ian Armstrong, and Rolando Navarette. "A Novel Method for 3D Printing High Conductivity Alloys for UHF Applications." International Foundation for Telemetering, 2014. http://hdl.handle.net/10150/577400.

Texto completo
Resumen
ITC/USA 2014 Conference Proceedings / The Fiftieth Annual International Telemetering Conference and Technical Exhibition / October 20-23, 2014 / Town and Country Resort & Convention Center, San Diego, CA<br>Traditional approaches to constructing 3D structural electronics with conductive and dielectric materials include ink-jet printed, silver-bearing ink and fine copper wire meshes. One approach combines stereo-lithographic 3D-printed photo-polymers with direct-printed silver-bearing conductive inks. Results have shown 3D conductive structures with conductivities in the range 2x10⁶ to 1x10⁷ S/
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Thomas, Andrew Scott. "Exploring the Efficiency of Software-Defined Radios in 3D Heat Mapping." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/7754.

Texto completo
Resumen
A common method of connecting to the internet is a wireless network. These networks can be monitored to discover the area of their coverage, but commercial receivers don't always provide the most accurate results. A software-defined radio was programmed to sniff wireless signals and tested against a commercial receiver and the results were compared. The results suggest that the software-defined radio performs at least as well as the commercial receiver in distance measurements and significantly better in samples taken per minute. It was determined that the software-defined radio is a viable re
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Mouton, Andre. "On artefact reduction, segmentation and classification of 3D computed tomography imagery in baggage security screening." Thesis, Cranfield University, 2014. http://dspace.lib.cranfield.ac.uk/handle/1826/8501.

Texto completo
Resumen
This work considers novel image-processing and computer-vision techniques to advance the automated analysis of low-resolution, complex 3D volumetric Computed Tomography (CT) imagery obtained in the aviation-security-screening domain. Novel research is conducted in three key areas: image quality improvement, segmentation and classification. A sinogram-completion Metal Artefact Reduction (MAR) technique is presented. The presence of multiple metal objects in the scanning Field of View (FoV) is accounted for via a distance-driven weighting scheme. The technique is shown to perform comparably to t
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Norwood, Charles Ellis. "Demonstration of Vulnerabilities in Globally Distributed Additive Manufacturing." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/99104.

Texto completo
Resumen
Globally distributed additive manufacturing is a relatively new frontier in the field of product lifecycle management. Designers are independent of additive manufacturing services, often thousands of miles apart. Manufacturing data must be transmitted electronically from designer to manufacturer to realize the benefits of such a system. Unalterable blockchain legers can record transactions between customers, designers, and manufacturers allowing each to trust the other two without needing to be familiar with each other. Although trust can be established, malicious printers or customers sti
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Peña, Guevara Javier Nilo, Acuña Leslie Dueñas, and Lynch Oscar Dupuy. "Distribuidores exclusivos de la marca MADPAX en el Perú." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2018. http://hdl.handle.net/10757/626040.

Texto completo
Resumen
Esta investigación plantea un escenario de negocio de importación de ventas minorista, dónde la idea del negocio es distribuir de manera exclusiva una marca de mochilas con modelos innovadores líder en el mercado extranjero al mercado nacional, a fin de poder construir una identidad que sitúe la marca en el top of mind de nuestro mercado objetivo. Este trabajo está estructurado con los siguientes temas que representan cada uno un capítulo de esta investigación los cuales son: los aspectos generales del negocio con visión global, planeamiento estratégico analizando los factores internos y
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Beugnon, Sébastien. "Sécurisation des maillages 3D pour l'industrie de la chaussure et la maroquinerie." Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS097.

Texto completo
Resumen
Avec l'augmentation des échanges de données et les évolutions technologiques et sociales récentes, les contenus multimédias prennent une place importante dans le trafic mondial. Aujourd'hui, les objets 3D sont utilisés dans un large nombre d'applications, par exemple, les applications médicales, les simulations, les jeux vidéo, l'animation et les effets spéciaux. La consommation d'objets 3D par le grand public est devenue un marché lucratif pouvant prendre la forme de plateformes de téléchargement d'objets 3D dans différents formats.Cette thèse, en collaboration avec la société STRATEGIES, con
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Itier, Vincent. "Nouvelles méthodes de synchronisation de nuages de points 3D pour l'insertion de données cachées." Thesis, Montpellier, 2015. http://www.theses.fr/2015MONTS017/document.

Texto completo
Resumen
Cette thèse aborde les problèmes liés à la protection de maillages d'objets 3D. Ces objets peuvent, par exemple, être créés à l'aide d'outil de CAD développés par la société STRATEGIES. Dans un cadre industriel, les créateurs de maillages 3D ont besoin de disposer d'outils leur permettant de vérifier l'intégrité des maillages, ou de vérifier des autorisations pour l'impression 3D par exemple. Dans ce contexte nous étudions l'insertion de données cachées dans des maillages 3D. Cette approche permet d'insérer de façon imperceptible et sécurisée de l'information dans un maillage. Il peut s'agir d
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Mehdi, Ali. "Developing a Computer System for the Generation of Unique Wrinkle Maps for Human Faces. Generating 2D Wrinkle Maps using Various Image Processing Techniques and the Design of 3D Facial Ageing System using 3D Modelling Tools." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5144.

Texto completo
Resumen
Facial Ageing (FA) is a very fundamental issue, as ageing in general, is part of our daily life process. FA is used in security, finding missing children and other applications. It is also a form of Facial Recognition (FR) that helps identifying suspects. FA affects several parts of the human face under the influence of different biological and environmental factors. One of the major facial feature changes that occur as a result of ageing is the appearance and development of wrinkles. Facial wrinkles are skin folds; their shapes and numbers differ from one person to another, therefore, an adva
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Jansen, van rensburg Bianca. "Sécurisation des données 3D par insertion de données cachées et par chiffrement pour l'industrie de la mode." Electronic Thesis or Diss., Université de Montpellier (2022-....), 2023. http://www.theses.fr/2023UMONS044.

Texto completo
Resumen
Au cours des dernières décennies, les objets 3D sont devenus un élément essentiel de la vie quotidienne, tant dans le contexte privé que professionnel. Ces objets 3D sont souvent stockés sur le cloud et transférés sur des réseaux plusieurs fois au cours de leur existence, où ils sont susceptibles de faire l'objet d'attaques malveillantes. Par conséquent, des méthodes de sécurisation des objets 3D, comme le chiffrement ou l'insertion des données cachées, sont essentielles. Le chiffrement est utilisé pour protéger la confidentialité visuelle du contenu d’un objet 3D. Il est également possible d'
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Uddman, Lindh Carl, and Johan Norberg. "Augmented reality with holograms for combat management systems : Performance limitations for sonar tracks in a 3D map, presented with Microsoft HoloLens." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209412.

Texto completo
Resumen
Technical advancements in 3D projection has recently made presentation of holographic images possible by using self-contained devices. Instead of using a screen to present objects, glasses like Microsoft HoloLens can render objects that appear as holograms around the user. SAAB Defence and Security are evaluating if this new technology can complement their command and control system 9LV Combat Management System. This degree project is a study of the technical possibilities and limitations of introducing holographic display of sonar tracks used for detecting submarines or sea mines. The project
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Brandman, Joshua Erich. "A Physical Hash for Preventing and Detecting Cyber-Physical Attacks in Additive Manufacturing Systems." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/86412.

Texto completo
Resumen
This thesis proposes a new method for detecting malicious cyber-physical attacks on additive manufacturing (AM) systems. The method makes use of a physical hash, which links digital data to the manufactured part via a disconnected side-channel measurement system. The disconnection ensures that if the network and/or AM system become compromised, the manufacturer can still rely on the measurement system for attack detection. The physical hash takes the form of a QR code that contains a hash string of the nominal process parameters and toolpath. It is manufactured alongside the original geometry
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Song, Qiang. "Design of synthetic diffractive structures for 3D visualization applications and their fabrication by a novel parallel-write two-photon polymerization process." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0199.

Texto completo
Resumen
Les éléments optiques diffractifs (EOD) sont maintenant largement utilisés dans les applications universitaires et industrielles grâce à leurs caractéristiques ultra-minces et compactes et à leur très flexible manipulation des fronts d'ondes lumineuses. Malgré ces excellentes propriétés, la portée d'application des EOD est souvent limitée par le fait que la plupart des DOE sont conçus pour générer uniquement des motifs projetés en 2D, et plus important encore, pour être utilisés uniquement avec des sources laser monochromatiques, cohérentes, souvent collimatées. Les contraintes de coût et de s
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Mursalin, Md. "Human identification using ear biometrics: A complete pipeline from detection to recognition." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2023. https://ro.ecu.edu.au/theses/2622.

Texto completo
Resumen
Biometrics is a critical component of cybersecurity that identifies persons by verifying their behavioral and physical traits. It is the most precise and powerful physical security solution for identity verification presently in use. In biometric-based authentication, each individual can be correctly recognized based on their intrinsic behavioral or physical features. The human ear is an important biometric with highly discriminating features such that even identical twins have different ear shapes. Owing to the easy acquisition, invariance to expression, and stable structure over a long perio
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Resler, Tomáš. "Návrh domácí brány pro zařízení IoT využívající technologii Z-Wave." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400940.

Texto completo
Resumen
This dissertation deals with the platform Z-Wave. This platform tries to create an universal system for smart home. The theoretical part of the work describes in details the platform itself as well as the applicable libraries for programming of applications and the available equipments. The practical part presents the new custom gateway. The hardware of this gateway is designed with utilization of the Z-Wave module, Raspberry Pi 3 microcomputer, touchscreen, powerbank and the body of the system. The body has been designed in the Solid Works CAD system and printed on a 3D printer. The needed fi
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Langin, Chester Louis. "A SOM+ Diagnostic System for Network Intrusion Detection." OpenSIUC, 2011. https://opensiuc.lib.siu.edu/dissertations/389.

Texto completo
Resumen
This research created a new theoretical Soft Computing (SC) hybridized network intrusion detection diagnostic system including complex hybridization of a 3D full color Self-Organizing Map (SOM), Artificial Immune System Danger Theory (AISDT), and a Fuzzy Inference System (FIS). This SOM+ diagnostic archetype includes newly defined intrusion types to facilitate diagnostic analysis, a descriptive computational model, and an Invisible Mobile Network Bridge (IMNB) to collect data, while maintaining compatibility with traditional packet analysis. This system is modular, multitaskable, scalable, i
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Gaw, Tyler J. "ARL-VIDS visualization techniques : 3D information visualization of network security events." 2014. http://liblink.bsu.edu/uhtbin/catkey/1745749.

Texto completo
Resumen
Government agencies and corporations are growing increasingly reliant on networks for day-to-day operations including communication, data processing, and data storage. As a result, these networks are in a constant state of growth. These burgeoning networks cause the number of network security events requiring investigation to grow exceptionally, creating new problems for network security analysts. The increasing number of attacks propagated against high-value networks only increases the gravity. Therefore, security analysts need assistance to be able to continue to monitor network events at an
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Moein, Samer. "Systematic Analysis and Methodologies for Hardware Security." Thesis, 2015. http://hdl.handle.net/1828/6954.

Texto completo
Resumen
With the increase in globalization of Integrated Circuit (IC) design and production, hardware trojans have become a serious threat to manufacturers as well as consumers. These trojans could be intensionally or accidentally embedded in ICs to make a system vulnerable to hardware attacks. The implementation of critical applications using ICs makes the effect of trojans an even more serious problem. Moreover, the presence of untrusted foundries and designs cannot be eliminated since the need for ICs is growing exponentially and the use of third party software tools to design the circuits i
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Chen, Kuan-Chieh, and 陳冠傑. "A Study on Autonomous Vehicle Navigation by 2D Object Image Matching and 3D Computer Vision Analysis for Indoor Security Patrolling Applications." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/34337662999305229023.

Texto completo
Resumen
碩士<br>國立交通大學<br>多媒體工程研究所<br>96<br>A vision-based vehicle system for security patrolling in indoor environments using an autonomous vehicle is proposed. A small vehicle with wireless control and a web camera which has the capabilities of panning, tilting, and zooming is used as a test bed. At first, an easy-to-use learning technique is proposed, which has the capability of extracting specific features, including navigation path, floor color, monitored object, and vehicle location with respect to monitored objects. Next, a security patrolling method by vehicle navigation with obstacle avoidance
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!