Littérature scientifique sur le sujet « Prévention des attaques de confiance »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Prévention des attaques de confiance ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Prévention des attaques de confiance"
Jactel, Hervé, et Lorenzo Marini. « Libre évolution des forêts et maîtrise du risque sanitaire associé aux scolytes des conifères ». Revue forestière française 73, no 2-3 (30 mars 2022) : 383–90. http://dx.doi.org/10.20870/revforfr.2021.5477.
Texte intégralKeita, Emmanuel. « Précaution, prévention, risque, hasard : instaurer une salutaire confiance ». Archives de philosophie du droit Tome 62, no 1 (20 mai 2020) : 71–81. http://dx.doi.org/10.3917/apd.621.0086.
Texte intégralMbassi, Jean-Claude, et Richard Nkene Ndeme. « La mobilisation du « health belief model modifié » en communication publique peut-elle contribuer au changement de comportement en période de COVID-19 ? » Communication & ; management Vol. 20, no 2 (14 février 2024) : 63–80. http://dx.doi.org/10.3917/comma.202.0063.
Texte intégralLabigne, Hélène. « La confiance et le temps : outils de prévention en obstétrique ». Présence haptonomique N° 12, no 1 (1 décembre 2016) : 231–33. http://dx.doi.org/10.3917/ph.012.0231.
Texte intégralVuibert, Francis. « Délinquance, prévention, vie de la cité : une question de confiance ». Les Cahiers du Développement Social Urbain N° 52, no 2 (1 juillet 2010) : 10–11. http://dx.doi.org/10.3917/cdsu.052.0010.
Texte intégralBergeot, Julien, et Florence Jusot. « Croyances, préférences face au risque et au temps et comportements de prévention contre le COVID-19 des séniors en France ». Revue économique Vol. 74, no 3 (20 juillet 2023) : 319–44. http://dx.doi.org/10.3917/reco.743.0319.
Texte intégralBéguier, Isabelle. « Liens interinstitutionnels et psychanalyse, du bébé aux personnes âgées en psychiatrie générale de secteur ». Perspectives Psy 60, no 4 (octobre 2021) : 326–32. http://dx.doi.org/10.1051/ppsy/2021604326.
Texte intégralSchaerlig, M. Eric. « Prévention et traitement des attaques cérébrales : progrès timides, mais certains Congrès Eurostroke, Mannheim ». Revue Médicale Suisse 62, no 2490 (2004) : 1496–97. http://dx.doi.org/10.53738/revmed.2004.62.2490.1496.
Texte intégralNyman, Samuel R. « Psychosocial issues in Engaging Older People with Physical Activity Interventions for the Prevention of Falls ». Canadian Journal on Aging / La Revue canadienne du vieillissement 30, no 1 (mars 2011) : 45–55. http://dx.doi.org/10.1017/s0714980810000759.
Texte intégralFrigault, Julia S., et Audrey R. Giles. « Culturally Safe Falls Prevention Program for Inuvialuit Elders in Inuvik, Northwest Territories, Canada : Considerations for Development and Implementation ». Canadian Journal on Aging / La Revue canadienne du vieillissement 39, no 2 (25 juin 2019) : 190–205. http://dx.doi.org/10.1017/s0714980819000308.
Texte intégralThèses sur le sujet "Prévention des attaques de confiance"
Masmoudi, Mariam. « Prévention des attaques de confiance en temps réel dans l'IoT social ». Electronic Thesis or Diss., Toulouse 3, 2023. http://www.theses.fr/2023TOU30302.
Texte intégralThe social IoT is a new paradigm that enhances the navigability of IoT networks and boosts service discovery by integrating social contexts. Nonetheless, this paradigm faces several challenges that reduce its performance quality. Trust, particularly trust attacks, is one of the most significant challenges. Some users resort to malicious behaviors and launch attacks to propagate malicious services. A trust management mechanism has become a major requirement in Social IoT to prevent these attacks in real-time and ensure trustworthy experiences for end-users. However, few studies have addressed trust management issues to prevent trust attacks in Social IoT environments. Most studies have been conducted to detect offline attacks with or without specifying the type of attack performed. Moreover, they did not consider security properties, such as cryptography, transparency, and immutability, etc. In fact, we must continuously process transactions to prevent these attacks at the transaction generation level while maintaining security properties. For this, we compared the previously used techniques and technologies, whose common point is attack prevention in the SN and IoT areas. Based on these comparisons, we indicated that blockchain technology can assist in developing a trust management mechanism that can prevent trust attacks while maintaining security. For real-time prevention, we proposed the combination of a distributed stream processing engine, known as Apache Spark, with blockchain technology. Our choice is based on a comparison of open-source data-stream processing engines. As a result, we propose a new trust management mechanism, based on blockchain and Apache Spark. This mechanism permit to prevent in real-time all trust attack types performed by malicious nodes, in order to obtain a reliable environment. Experimentation made on a real data-set enable us to prove the performance of our proposition
Fernandes, Medeiros Stéphane. « Attaques par canaux auxiliaires : nouvelles attaques, contre-mesures et mises en oeuvre ». Doctoral thesis, Universite Libre de Bruxelles, 2015. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/209096.
Texte intégralDoctorat en Sciences
info:eu-repo/semantics/nonPublished
Guilley, Sylvain. « Contre-mesures géométriques aux attaques exploitant les canaux cachés ». Phd thesis, Télécom ParisTech, 2007. http://pastel.archives-ouvertes.fr/pastel-00002562.
Texte intégralTan, Heng Chuan. « Vers des communications de confiance et sécurisées dans un environnement véhiculaire ». Thesis, Paris, ENST, 2017. http://www.theses.fr/2017ENST0063/document.
Texte intégralRouting and key management are the biggest challenges in vehicular networks. Inappropriate routing behaviour may affect the effectiveness of communications and affect the delivery of safety-related applications. On the other hand, key management, especially due to the use of PKI certificate management, can lead to high latency, which may not be suitable for many time-critical applications. For this reason, we propose two trust models to assist the routing protocol in selecting a secure end-to-end path for forwarding. The first model focusses on detecting selfish nodes, including reputation-based attacks, designed to compromise the “true” reputation of a node. The second model is intended to detect forwarders that modify the contents of a packet before retransmission. In key management, we have developed a Secure and Authentication Key Management Protocol (SA-KMP) scheme that uses symmetric cryptography to protect communication, including eliminating certificates during communication to reduce PKI-related delays
Tan, Heng Chuan. « Vers des communications de confiance et sécurisées dans un environnement véhiculaire ». Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0063.
Texte intégralRouting and key management are the biggest challenges in vehicular networks. Inappropriate routing behaviour may affect the effectiveness of communications and affect the delivery of safety-related applications. On the other hand, key management, especially due to the use of PKI certificate management, can lead to high latency, which may not be suitable for many time-critical applications. For this reason, we propose two trust models to assist the routing protocol in selecting a secure end-to-end path for forwarding. The first model focusses on detecting selfish nodes, including reputation-based attacks, designed to compromise the “true” reputation of a node. The second model is intended to detect forwarders that modify the contents of a packet before retransmission. In key management, we have developed a Secure and Authentication Key Management Protocol (SA-KMP) scheme that uses symmetric cryptography to protect communication, including eliminating certificates during communication to reduce PKI-related delays
Cazal, Julien. « Prévenir la maladie cardiovasculaire : socio-éthnologie du risque et de l'incitation sanitaire ». Toulouse 3, 2012. http://thesesups.ups-tlse.fr/1727/.
Texte intégralPrevention of cardiovascular disease is a major public health issue. The aim of the management is to train the patient so that he could adopt healthy behavior to reduce the risk of serious complications. Medical institution act in this direction on the development of self-government. From an ethnographic study conducted in two devices support (detection, rehabilitation) and interviews (n = 59) with professional and patient, research shows how to build "the self-caregiver" by training in risk and promoting change in lifestyle. The first part characterizes the intervention logic specific to each device and shows that the self-government is considered as an individualized or collective approach to risk depending on whether the detection or rehabilitation. The second part is, following an interactionist perspective, the construction of the risk and self-government within the devices. It shows that detection prevails risk learning through a comprehensive, multifactorial health, while in rehabilitation it is learning to live with the risk by a physical discipline. Finally, the third part shows, following a cultural approach to risk, how the medical establishment and the patient think the risk symmetrically. Three positions are determined in relation to the social positions of patients: the "admnistered" who is in the delegation to the medical community, the "medical helper" partner device that adheres to a model of prevention, "the patient-citizen "who is critical of the medical institution
Ropaul, Maïva. « Essais sur l'analyse économique de la responsabilité civile des entreprises ». Thesis, Paris 2, 2015. http://www.theses.fr/2015PA020071/document.
Texte intégralThe accelerating pace of technological innovations and pressures from civil society provide tort law with new challenges. This thesis studies the incentive effects of tort law on corporate investment in prevention in this context. Particularly, this study deepens the traditional economic analysis of corporate civil liability and assess the effects of the combination of non legal sanctions and the legal framework. First, we highlight the evolution of the economic analysis of liability and responsibility. Then, we study the incentive effects ofcivil liability in a theoretical model, with a particular emphasis on the role of the legal notion of causality. Next, we examine to what extent the difficulties of predicting accident risks affect incentives provided by liability with both a theoretical model and with a lab experiment. In a theoretical model, we develop ananalysis of the role of non-legal sanctions, from civil society, along side the tort law. We show that the incentive effects of consumer boycott on corporate investment in prevention are limited. Finally, through an empirical study, we complete this analysis by studying the magnitude and determinants of consumer boycott in Europe
Bernier, Sandrine. « Perceptions des risques industriels et nucléaires. Enjeux, négociations et construction sociale des seuils d'acceptation des risques ». Phd thesis, Université François Rabelais - Tours, 2007. http://tel.archives-ouvertes.fr/tel-00307754.
Texte intégralL'originalité de cette recherche tient à la dimension importante de terrain local que nous apportons, qui se compose de sites classés Seveso et nucléaires implantés en Indre et Loire. Nous avons interrogé cinq catégories d'acteurs par entretien ou par questionnaire dans le but de comprendre leur position vis-à-vis des situations de risques technologiques. Leurs discours permettent de comprendre et d'affiner les seuils d'acceptation qu'ils définissent autour des risques industriels et de faire ressortir la complexité d'une situation mêlant enjeux politiques, pressions environnementales, logiques économiques et contraintes sécuritaires, vers un positionnement flou et complexe. Ce terrain éclaire une réalité faite de contrastes sur les perceptions de risques d'aujourd'hui.
Wang, Tairan. « Decision making and modelling uncertainty for the multi-criteria analysis of complex energy systems ». Thesis, Châtenay-Malabry, Ecole centrale de Paris, 2015. http://www.theses.fr/2015ECAP0036/document.
Texte intégralThis Ph. D. work addresses the vulnerability analysis of safety-critical systems (e.g., nuclear power plants) within a framework that combines the disciplines of risk analysis and multi-criteria decision-making. The scientific contribution follows four directions: (i) a quantitative hierarchical model is developed to characterize the susceptibility of safety-critical systems to multiple types of hazard, within the needed `all-hazard' view of the problem currently emerging in the risk analysis field; (ii) the quantitative assessment of vulnerability is tackled by an empirical classification framework: to this aim, a model, relying on the Majority Rule Sorting (MR-Sort) Method, typically used in the decision analysis field, is built on the basis of a (limited-size) set of data representing (a priori-known) vulnerability classification examples; (iii) three different approaches (namely, a model-retrieval-based method, the Bootstrap method and the leave-one-out cross-validation technique) are developed and applied to provide a quantitative assessment of the performance of the classification model (in terms of accuracy and confidence in the assignments), accounting for the uncertainty introduced into the analysis by the empirical construction of the vulnerability model; (iv) on the basis of the models developed, an inverse classification problem is solved to identify a set of protective actions which effectively reduce the level of vulnerability of the critical system under consideration. Two approaches are developed to this aim: the former is based on a novel sensitivity indicator, the latter on optimization.Applications on fictitious and real case studies in the nuclear power plant risk field demonstrate the effectiveness of the proposed methodology
Amari, Houda. « Smart models for security enhancement in the internet of vehicles ». Electronic Thesis or Diss., Normandie, 2023. http://www.theses.fr/2023NORMC248.
Texte intégralWith the major progress in Intelligent Transportation Systems (ITS), there has been an exponential interest in technological advancements of Internet of Vehicles (IoV), attracting the attention of numerous researchers from academia and industry. IoV technology aims to enhance transport efficiency, passenger safety, and comfort by exchanging traffic and infotainment information to connected vehicles. The multitude of network access technologies, the exceptionally high mobility of connected vehicles and their high density in urban areas, and the predominance of wireless communications make the IoV ecosystem a complex, vulnerable and heterogeneous network with very dynamic characteristics, some of which are difficult to predict and subject to scalability and threats problems. Many entities compose its architecture (connected vehicles, humans, roadside units (RSUs), ITS). Moreover, it presents different communication types to confirm its connectivity and vulnerability. However, this diversity leads to new security requirements that seem challenging to consider and enlarge the attack surface of such networks. Therefore, disseminating malicious messages/entities within the network significantly reduces the network performance and becomes a threat to passengers and vulnerable pedestrians. Accordingly, security mechanisms should be considered to secure communications in vehicular networks. This thesis aims to develop novel models to enhance the security aspects of the IoV ecosystem dealing with diverse attacks, including DDoS attacks, while preserving users' privacy
Livres sur le sujet "Prévention des attaques de confiance"
Cutting, Derrick. Stop à l'infarctus : Ménagez votre coeur : "dites non aux attaques cardiaques". Paris : Dauphin, 2004.
Trouver le texte intégralScott, Keith Vincent. The great bears of Hyder, Alaska & Stewart, B.C. : The world's greatest bear display that you can get to by car. Surrey, B.C : Hancock House, 2001.
Trouver le texte intégralScott, Keith. The bear man. Surrey, B.C : Hancock House, 2010.
Trouver le texte intégralMcCloskey, Erin. Bear Attacks. Lone Pine Publishing, 2009.
Trouver le texte intégralScott, Keith, et Nat03700. Great Bears of Hyder Ak & Stewart Bc : The World's Greatest Bear Display That You Can Get to by Car. Hancock House Pub Ltd, 2001.
Trouver le texte intégralSalas-Auvert, Jesus A., et Frank M. Dattilio. Panic Disorder : Assessment and Treatment Through a Wide-Angle Lens. Zeig, Tucker & Theisen, 1999.
Trouver le texte intégralWenger, Alexandre, Guillaume Linte et Christian Bonah. Maladies infectieuses sans fin. GEORG, 2022. http://dx.doi.org/10.32551/georg.12535.
Texte intégralWenger, Alexandre, Guillaume Linte et Christian Bonah. Maladies infectieuses sans fin. GEORG, 2022. http://dx.doi.org/10.32551/georg.12986.
Texte intégralChapitres de livres sur le sujet "Prévention des attaques de confiance"
FURON, Teddy. « Traçage de traîtres ». Dans Sécurité multimédia 1, 201–30. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9026.ch6.
Texte intégral