Rozprawy doktorskie na temat „Automatisation de la détection d'attaques”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 45 najlepszych rozpraw doktorskich naukowych na temat „Automatisation de la détection d'attaques”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Toure, Almamy. "Collection, analysis and harnessing of communication flows for cyber-attack detection". Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. http://www.theses.fr/2024UPHF0023.
Pełny tekst źródłaThe increasing complexity of cyberattacks, characterized by a diversification of attack techniques, an expansion of attack surfaces, and growing interconnectivity of applications with the Internet, makes network traffic management in a professional environment imperative. Companies of all types collect and analyze network flows and logs to ensure the security of exchanged data and prevent the compromise of information systems. However, techniques for collecting and processing network traffic data vary from one dataset to another, and static attack detection approaches have limitations in terms of efficiency and precision, execution time, and scalability. This thesis proposes dynamic approaches for detecting cyberattacks related to network traffic, using feature engineering based on the different communication phases of a network flow, coupled with convolutional neural networks (1D-CNN) and their feature detector. This double extraction allows for better classification of network flows, a reduction in the number of attributes and model execution times, and thus effective attack detection. Companies also face constantly evolving cyber threats, and "zero-day" attacks that exploit previously unknown vulnerabilities are becoming increasingly frequent. Detecting these zero-day attacks requires constant technological monitoring and thorough but time-consuming analysis of the exploitation of these vulnerabilities. The proposed solutions guarantee the detection of certain attack techniques. Therefore, we propose a detection framework for these attacks that covers the entire attack chain, from the data collection phase to the identification of any type of zero-day, even in a constantly evolving environment. Finally, given the obsolescence of existing datasets and data generation techniques for intrusion detection, and the fixed, non-evolving, and non-exhaustive nature of recent attack scenarios, the study of an adapted synthetic data generator while ensuring data confidentiality is addressed. The solutions proposed in this thesis optimize the detection of known and zero-day attack techniques on network flows, improve the accuracy of models, while ensuring the confidentiality and high availability of data and models, with particular attention to the applicability of the solutions in a company network
Deneault, Sébastien. "Infrastructure distribuée permettant la détection d'attaques logicielles". Mémoire, Université de Sherbrooke, 2013. http://hdl.handle.net/11143/6170.
Pełny tekst źródłaRoudiere, Gilles. "Détection d'attaques sur les équipements d'accès à Internet". Thesis, Toulouse, INSA, 2018. http://www.theses.fr/2018ISAT0017/document.
Pełny tekst źródłaNetwork anomalies, and specifically distributed denial of services attacks, are still an important threat to the Internet stakeholders. Detecting such anomalies requires dedicated tools, not only able to perform an accurate detection but also to meet the several constraints due to an industrial operation. Such constraints include, amongst others, the ability to run autonomously or to operate on sampled traffic. Unlike supervised or signature-based approaches, unsupervised detection do not require any kind of knowledge database on the monitored traffic. Such approaches rely on an autonomous characterization of the traffic in production. They require the intervention of the network administrator a posteriori, when it detects a deviation from the usual shape of the traffic. The main problem with unsupervised detection relies on the fact that building such characterization is complex, which might require significant amounts of computing resources. This requirement might be deterrent, especially when the detection should run on network devices that already have a significant workload. As a consequence, we propose a new unsupervised detection algorithm that aims at reducing the computing power required to run the detection. Its detection focuses on distributed denial of service attacks. Its processing is based upon the creation, at a regular interval, of traffic snapshots, which helps the diagnosis of detected anomalies. We evaluate the performances of the detector over two datasets to check its ability to accurately detect anomalies and to operate, in real time, with limited computing power resources. We also evaluate its performances over sampled traffic. The results we obtained are compared with those obtained with FastNetMon and UNADA
Bréjon, Jean-Baptiste. "Quantification de la sécurité des applications en présence d'attaques physiques et détection de chemins d'attaques". Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS275.
Pełny tekst źródłaEmbedded systems are processing and handling more and more sensitive data. The security of these systems is now a prime concern for those who designs them. Fault attacks are indented to disrupt the execution of programs through the manipulation of physical quantities in the system environment and enable an attacker to bypass security mechanisms or achieve privilege escalation. Software counter-measures are deployed to address this threat. Various analyses are now being used to assess the efficiency of the counter-measures once deployed but they are little or not automated, costly and limited in terms of code coverage of the possible behaviour and of faults types that can be analysed. We propose a method to analyse the robustness of binary code combining formal methods and symbolic execution. Performing the analysis at the binary positions the analysis after compilation which can affect the counter-measures and allows it to take into account information which is only visible at the binary level and which can be exploited to perform an attack. Formal methods are capable of exhaustiveness and thus allow the analysis to consider all possible configurations of inputs. The proposed analysis is nevertheless carried out with respect to a symbolic context, extracted by symbolic execution, which confines it to a realistic set of inputs and thus limits false positives. We have implemented this method in a tool called \texttt{RobustB}. It is automated from the source code. We propose three metrics synthesising the analysis results and helping the designer of counter-measures to assess the sensitivity of the code as a whole and at the granularity of an instruction
Lespérance, Pierre-Luc. "Détection des variations d'attaques à l'aide d'une logique temporelle". Thesis, Université Laval, 2006. http://www.theses.ulaval.ca/2006/23481/23481.pdf.
Pełny tekst źródłaAmoordon, Andy. "Méthodes de détection d'attaques cybernétiques par une surveillance multicouches de communication". Electronic Thesis or Diss., Université de Lille (2022-....), 2022. http://www.theses.fr/2022ULILN042.
Pełny tekst źródłaWireless networks are nowadays indispensable components of telecommunication infrastructures. They offer flexibility, mobility and rapid expansion of telecommunication infrastructures. They are also particularly needed to connect mobile devices such as connected cars, watches and drones. Wireless networks are also used in the transport and security sector to connect trains and cameras to monitoring systems. However, in contrary to wired networks in which transmission are isolated in wires, in wireless networks, transmissions are emitted using omnidirectional antennas. This makes wireless networks more vulnerable to unauthorised listening, emission and some specific attacks. In this thesis, we have worked on the detection of three different types of attacks on IEEE 802.11 (Wi-Fi) networks. The three attacks are fake access points and two denial of service attacks namely, deauthentication and jamming attacks. In scientific literature, these three attacks are detected independently and using one or two indicators.We propose a method that uses classification algorithms to create a model that can detect the three attacks by analysing four indicators simultaneously. The model can detect the attacks when they are perpetuated independently and also when they are combined. Concerning data used to create the model, among the three different types of frames that can be transmitted on Wi-Fi networks, we have considered only management frames and more particularly, beacon frames. Beacon frames are sent at regular interval and even in the absence of user traffic. Therefore, basing the detection on the analysis of beacon frames leads to a more efficient detection. In this thesis, we have also considered variations in data rates (absence of user traffic, light, moderate and intense user traffic) and in jamming power (low, moderate and high jamming power). Results show that the model can detect fake access points, deauthentication and jamming attacks (low and moderate power) with high precision. The jamming attack with intense power is detected with satisfying precision. By considering the beacon frames of a farther second access point of the network, we have been able to increase detection precision in the latter case. Finally, we have considered special cases such as Wi-Fi transmissions in the 5 GHz band and the phantom fake access point attack
Makke, Ali. "Détection d'attaques dans un système WBAN de surveillance médicale à distance". Thesis, Paris 5, 2014. http://www.theses.fr/2014PA05S006/document.
Pełny tekst źródłaOne of the major challenges of the world in recent decades is the continued increase in the elderly population in developed countries. Hence the need to provide quality care to a rapidly growing population while reducing the costs of health care is becoming a strategic challenge. In this context, many researches focus on the use of wireless sensor networks in WBAN (Wireless Body Area Network) systems to facilitate and improve the quality of medical care and remote monitoring. These WBAN systems pose new technological challenges in terms of security and protection against faults and attacks. The wireless communication mode used between the sensors and the collection node accentuates these vulnerabilities. Indeed vulnerabilities in a WBAN system are divided into two main parts. The first part consists of the possible attacks on the network of medical sensors and on the wireless communications medium between the sensors and the processing unit. The second part consists of possible attacks on high-speed communications between the WBAN system and the medical server. The objective of this thesis is to meet some of the problems of detecting attacks in a WBAN system for remote medical monitoring. To achieve this goal, we propose an algorithm to detect the jamming attacks targeting the wireless communications medium between the sensors and the processing unit. In addition we propose a method of measuring divergence to detect the flooding attacks targeting the high-speed communications between the WBAN system and the medical server
Makke, Ali. "Détection d'attaques dans un système WBAN de surveillance médicale à distance". Electronic Thesis or Diss., Paris 5, 2014. http://www.theses.fr/2014PA05S006.
Pełny tekst źródłaOne of the major challenges of the world in recent decades is the continued increase in the elderly population in developed countries. Hence the need to provide quality care to a rapidly growing population while reducing the costs of health care is becoming a strategic challenge. In this context, many researches focus on the use of wireless sensor networks in WBAN (Wireless Body Area Network) systems to facilitate and improve the quality of medical care and remote monitoring. These WBAN systems pose new technological challenges in terms of security and protection against faults and attacks. The wireless communication mode used between the sensors and the collection node accentuates these vulnerabilities. Indeed vulnerabilities in a WBAN system are divided into two main parts. The first part consists of the possible attacks on the network of medical sensors and on the wireless communications medium between the sensors and the processing unit. The second part consists of possible attacks on high-speed communications between the WBAN system and the medical server. The objective of this thesis is to meet some of the problems of detecting attacks in a WBAN system for remote medical monitoring. To achieve this goal, we propose an algorithm to detect the jamming attacks targeting the wireless communications medium between the sensors and the processing unit. In addition we propose a method of measuring divergence to detect the flooding attacks targeting the high-speed communications between the WBAN system and the medical server
Mao, Yuxiao. "Détection dynamique d'attaques logicielles et matérielles basée sur l'analyse de signaux microarchitecturaux". Thesis, Toulouse, INSA, 2022. http://www.theses.fr/2022ISAT0015.
Pełny tekst źródłaIn recent years, computer systems have evolved quickly. This evolution concerns different layers of the system, both software (operating systems and user programs) and hardware (microarchitecture design and chip technology). While this evolution allows to enrich the functionalities and improve the performance, it has also increased the complexity of the systems. It is difficult, if not impossible, to fully understand a particular modern computer system, and a greater complexity also stands for a larger attack surface for hackers. While most of the attacks target software vulnerabilities, over the past two decades, attacks exploiting hardware vulnerabilities have emerged and demonstrated their serious impact. For example, in 2018, the Spectre and Meltdown attacks have been disclosed, that exploited vulnerabilities in the microarchitecture layer to allow powerful arbitrary reads, and highlighted the security issues that can arise from certain optimizations of system microarchitecture. Detecting and preventing such attacks is not intuitive and there are many challenges to deal with: (1) the great difficulty in identifying sources of vulnerability implied by the high level of complexity and variability of different microarchitectures; (2) the significant impact of countermeasures on overall performance and on modifications to the system's hardware microarchitecture generally not desired; and (3) the necessity to design countermeasures able to adapt to the evolution of the attack after deployment of the system. To face these challenges, this thesis focuses on the use of information available at the microarchitecture level to build efficient attack detection methods.In particular, we describe a framework allowing the dynamic detection of attacks that leave fingerprints at the system's microarchitecture layer. This framework proposes: (1) the use microarchitectural information for attack detection, which can effectively cover attacks targeting microarchitectural vulnerabilities; (2) a methodology that assists designers in selecting relevant microarchitectural information to extract; (3) the use of dedicated connections for the transmission of information extracted, in order to ensure high transmission bandwidth and prevent data loss; and (4) the use of reconfigurable hardware in conjunction with software to implement attack detection logic. This combination (composing to the so-called detection module) reduces the performance overhead through hardware acceleration, and allows updating detection logic during the system lifetime with reconfiguration in order to adapt to the evolution of attacks. We present in detail the proposed architecture and modification needed on the operating system, the methodology for selecting appropriate microarchitectural information and for integrating this framework into a specific computer system, and we describe how the final system integrating our detection module is able to detect attacks and adapt to attack evolution. This thesis also provides two use-case studies implemented on a prototype (based on a RISC-V core with a Linux operating system) on an FPGA. It shows that, thanks to the analysis of microarchitectural information, relatively simple logic implemented in the detection module is sufficient to detect different classes of attacks (cache side-channel attack and ROP attack)
Zaidi, Abdelhalim. "Recherche et détection des patterns d'attaques dans les réseaux IP à hauts débits". Phd thesis, Université d'Evry-Val d'Essonne, 2011. http://tel.archives-ouvertes.fr/tel-00878783.
Pełny tekst źródłaBajan, Pierre-Marie. "Simulation d'activités et d'attaques : application à la cyberdéfense". Electronic Thesis or Diss., Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLL014.
Pełny tekst źródłaThe concern over the security of the infrastructure of a company is only growing deeper and became a source of worries for companies. They use different systems to detect and deal with attack but those systems are usually made to detect one type only of the two main type of attack: attacks made to target the largest amount of people possible. Targeted attacks are rarer but more dangerous as it penetrates deep into a system and are very specifics. However the systems used to deal with it are proved of limited efficiency. Even when they send alerts and news to the operator, there is just to much information going along with it making the often ill-trained operators unable to react and overwhelm by massive information. The goal of this thesis is to create a tool that would help to form operator but also help to test more efficiently security systems. We'll approach the problem by first emulating the infrastructure and services of a small company with its different users and services. It will be use to create the data of the regular operations and interactions of a company during normal activity but also under attack. Once the system is emulated and we collected the necessary data, we will start to simulate the system according to what we need the simulation for. This simulation would need less resources than the emulation and will be scalable and capable to be dynamically change according to the needs. The aim is to have a light tool capable to simulate different behaviors and different type of realist simulation of a system to help improve the formation of operators and also test security devices more fully. The whole would be supervised by a console of control of the simulation who will receive the information of the simulated elements and the simulated operator console. It would have the capacity to create incidents and problems into the systems along with attacks
Ghennam, El-Hannachi. "Contribution à l'étude d'une méthode électrochimique automatisable pour la détection d'escherichia coli dans l'eau". Nancy 1, 1990. http://www.theses.fr/1990NAN10105.
Pełny tekst źródłaMichel, Cedric. "Langage de description d'attaques pour la détection d'intrusions par corrélation d'évènements ou d'alertes en environnement réseau hétérogène". Rennes 1, 2003. https://tel.archives-ouvertes.fr/tel-01271855.
Pełny tekst źródłaBajan, Pierre-Marie. "Simulation d'activités et d'attaques : application à la cyberdéfense". Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLL014/document.
Pełny tekst źródłaThe concern over the security of the infrastructure of a company is only growing deeper and became a source of worries for companies. They use different systems to detect and deal with attack but those systems are usually made to detect one type only of the two main type of attack: attacks made to target the largest amount of people possible. Targeted attacks are rarer but more dangerous as it penetrates deep into a system and are very specifics. However the systems used to deal with it are proved of limited efficiency. Even when they send alerts and news to the operator, there is just to much information going along with it making the often ill-trained operators unable to react and overwhelm by massive information. The goal of this thesis is to create a tool that would help to form operator but also help to test more efficiently security systems. We'll approach the problem by first emulating the infrastructure and services of a small company with its different users and services. It will be use to create the data of the regular operations and interactions of a company during normal activity but also under attack. Once the system is emulated and we collected the necessary data, we will start to simulate the system according to what we need the simulation for. This simulation would need less resources than the emulation and will be scalable and capable to be dynamically change according to the needs. The aim is to have a light tool capable to simulate different behaviors and different type of realist simulation of a system to help improve the formation of operators and also test security devices more fully. The whole would be supervised by a console of control of the simulation who will receive the information of the simulated elements and the simulated operator console. It would have the capacity to create incidents and problems into the systems along with attacks
Audhuy, Stéphane. "Développement et automatisation de coffrets de détection d'immunoglobulines G et M toxoplasmiques". Université Louis Pasteur (Strasbourg) (1971-2008), 1996. http://www.theses.fr/1996STR13292.
Pełny tekst źródłaKhatoun, Rida. "Système multi-agents et architecture pair à pair pour la détection d'attaques de déni de service distribuées". Troyes, 2008. http://www.theses.fr/2008TROY0015.
Pełny tekst źródłaThe Internet has ultimately become, the support for all types of network services which are numerously increasing, interacting and thereby introducing an important dimension of complexity. In addition, they introduce vulnerabilities due to their location and implementation. Indeed, it promotes more covetousness and attacks. In this context, denial of service attacks are among the most popular ones and they are relatively easy to implement. Attack streams are simultaneously generated from several attack machines that are spread all over the Internet and, therefore, making cooperation among a large number of equipment. Such attacks have important economic consequences due to their effects. Many solutions have been proposed to solve this problem, but they are still incomplete because of economical and technical reasons and also for cooperation between different operators of the Internet. Our objective, in this context, is to respond by a solution that is based a distributed architecture of cooperative agents in order to detect intrusions and attacks. The agents are implemented on all the edge routers in an ISP domain. The attack detection is carried out by sharing agents' knowledge about traffic. For an efficient routing algorithm among agents we used a peer-to-peer architecture. This solution has been validated concretely over a real network, integrating the well-known Snort sensor in our intelligent agents and using Pastry as a peer-to-peer protocol for routing information among agents
Radhouani, Amira. "Méthodes formelles pour l'extraction d'attaques internes des Systèmes d'Information". Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM025/document.
Pełny tekst źródłaThe early detection of potential threats during the modelling phase of a Secure Information System (IS) is required because it favours the design of a robust access control policy and the prevention of malicious behaviours during the system execution. This involves studying the validation of access control rules and performing vulnerabilities automated checks before the IS operationalization. We are particularly interested in detecting vulnerabilities that can be exploited by internal trusted users to commit attacks, called insider attacks, by taking advantage of their legitimate access to the system. To do so, we use formal B specifications which are generated by the B4MSecure platform from UML functional models and a SecureUML modelling of role-based access control rules. Since these vulnerabilities are due to the dynamic evolution of the functional state, we propose to study the reachability of someundesirable states starting from a normal state of the system. The proposed techniques are an alternative to model-checking techniques. Indeed, they implement symbolic backward search algorithm based on complementary approaches: proof and constraint solving. This rich technical background allowed the development of the GenISIS tool which automates our approach and which was successfully experimented on several case studies available in the literature. These experiments showed its capability to extract already published attacks but also new attacks
Delmaire, Gilles. "Comparaison des méthodes d'identification paramétrique et de l'espace de parité pour la détection et la localisation de défaillances dans les systèmes automatisés". Lille 1, 1996. http://www.theses.fr/1996LIL10023.
Pełny tekst źródłaAbdi, Hadi Ibrahim. "Détection et prédiction des collisions en environnement non structuré". Amiens, 2014. http://www.theses.fr/2014AMIE0114.
Pełny tekst źródłaThe objective of this thesis is to introduce a System for predicting vehicle collision in an unstructured environment. The device is designed for high traffic areas located on ports or civil engineering projects, environments in which traffic moves without lane actually materialized. While many studies have been made on the detection of collision risk in structured environment (traffic lanes, roads, intersection, urban, etc. . . ), very few open areas concemed. The proposed system is static, positioned at critical points. From the images acquired by cameras wide field of view, the estimated position and velocity of the moving parts in order to be able to avoid collisions. We have developed in this thesis, methods for predicting and tracking trajectories of a set of moving vehicles in a scene monitoring. These vehicles have no specific sensors. The identification of critical situations is carried out in a first time from a busy grid of the treated area. And in a second step, the prediction of collisions is performed using a geometric approach, the exploitation of intersections of ellipses uncertainties to justify the risk of danger existing between the objects involved in the collision
Subirats, Peggy. "Conception et validation de méthodes de traitement d'images appliquées à la détection de fissures sur les images de surface de chaussées". Nantes, 2006. http://www.theses.fr/2006NANT2083.
Pełny tekst źródłaIn this thesis, we propose a new method for automation of emergent crack detection by image processing. We principally focus on crack identification and localization using the continuous wavelet transform applied to pavement surface images. The analysis is done at several scales chosen by taking into account crack width and image characteristics. The mother wavelet is determined by using a matched filtering approach. It allows to generate automatically the mother wavelet, which is the most appropriate to the texture of pavement surface analysed. At this step of our method, the use of 1D or 2D matched continuous wavelet transform is also analysed. From the set of wavelet coefficients obtained, local research of wavelet coefficient maxima is performed for each scale and a fusion process by chaining through scales produce a binary image that indicates for each pixel the presence or not of cracks. At the last step, global extraction is performed by image projections to identify the nature of the crack. In the second part of this work, a high level segmentation method is proposed. It is based on a statistical analysis of the wavelet coefficient sets. The cracks are localised using a markovian model defined by an irregular grid composed of linear segments. Two approaches are proposed for multi-scale data fusion. Finally, extraction of the rectilinear structures (cracks) is obtained using the Hough transform
Lévesque, Olivier. "Détection, reconstruction 3D et identification des êtres vivants du règne animal". Master's thesis, Université Laval, 2016. http://hdl.handle.net/20.500.11794/26985.
Pełny tekst źródłaAutomating the detection and identification of animals is a task that has an interest in many biological research fields and in the development of electronic security systems. The author present a detection and identification system based on computer stereo vision to achieve this task. A number of criteria are being used to identify the animals, but the emphasis is on the harmonic analysis of the animal real time reconstructed 3D shape. The result of the analysis is compared with others stored in an evolutive knowledge base.
Pouget, Fabien. ""Système distribué de capteurs pots de miel: discrimination et analyse corrélative des processus d'attaques"". Phd thesis, Télécom ParisTech, 2006. http://pastel.archives-ouvertes.fr/pastel-00001751.
Pełny tekst źródłaRoth, Sandrine. "Diagnostic d'une installation sidérurgique complexe : analyse de la ligne et proposition d'une architecture pour un système de diagnostic-supervision dédié". Nancy 1, 1995. http://www.theses.fr/1995NAN10430.
Pełny tekst źródłaThe subject of this study is about a continuous galvanising line. The general objective of this work is the realisation of a default detection, diagnosis and operators assistance system. That kind of system is intended to the control and to the maintenance of the Sollac complex plant, in order to improve the production and the product quality and the productivity. At first, we have searched any interesting information about the galvanising line, to understand the functioning of each processes which are involved in the production of galvanised iron sheet. Then, the bibliographical analysis of knowledged based diagnosis methods (neural networks, expert systems, fuzzy logic, qualitative physics) is writen to find a strategy to supervise such a non linear multi-variable system. The model based methods are useless because of the lack of available models. The next stage concerned the mesurements collections. The measurements analysis results allow us to build a knowledge base with some defaults trees (defaults, causes and effects) and treatment rules. Then the supervision system architecture is defined. A multi-agent system is described to realise the whole monitoring system and a structure based on an object model is proposed to implement that system
Qin, Hao. "Sécurité pratique de systèmes de cryptographie quantique : étude d'attaques et développement de contre-mesures". Electronic Thesis or Diss., Paris, ENST, 2015. http://www.theses.fr/2015ENST0040.
Pełny tekst źródłaIn this thesis, I study a cryptographic primitive called quantum key distribution which allows two remote parties to share a secret key, in the presence of an eavesdropper, whose power is only limited by the laws of quantum physics. I focus my study on the implementation and the practical security of continuousvariable protocols. For the first time, I have proposed and studied a detector-based side channel attack on a continuous-variable system : saturation attack. This attack opens a new security loophole that we have characterized experimentally in our laboratory, on a real continuous-variable system. Finally, we have demonstrated experimentally for the first time the feasibility of a continuous-variable system deployment in a Dense Wavelength Division Multiplexing network, where quantum signals coexist with intense classical signals in a same fiber
Huet, Denis. "Approche physico-chimique de l'automatisation d'un dosage immunoenzymatique associé à une détection électrochimique". Compiègne, 1991. http://www.theses.fr/1991COMPD401.
Pełny tekst źródłaEl, Yamani Hayat. "Mesure de la toxicité de polluants par biocapteur. Réalisation d'une électrode à butyrylcholinestérase. Automatisation de la détection de pesticides". Phd thesis, Ecole Nationale Supérieure des Mines de Paris, 1987. http://tel.archives-ouvertes.fr/tel-01066089.
Pełny tekst źródłaYamani, Hayat el. "Mesure de la toxicité de polluants par biocapteur. Réalisation d'une électrode à butyrylcholinestérase. Automatisation de la détection de pesticides". Paris, ENMP, 1987. http://tel.archives-ouvertes.fr/tel-01066089.
Pełny tekst źródłaLaperrière, David. "Automatisation des tests symptomatiques liés au comportement oculaire pour la détection de facultés affaiblies par l'alcool ou les drogues". Thèse, Université du Québec à Trois-Rivières, 2009. http://depot-e.uqtr.ca/1219/1/030114412.pdf.
Pełny tekst źródłaKopp, Nathalie. "Contribution à la caractérisation en contrôle non-destructif ultrasonore de défauts de soudures bout-à-bout en acier carbone : élaboration d'une procédure complète automatisée au diagnostic". Metz, 1999. http://docnum.univ-lorraine.fr/public/UPV-M/Theses/1999/Kopp.Nathalie.SMZ9904.pdf.
Pełny tekst źródłaThe second edition of the guideline IS. US. 319,21 has been issued in 1995. The Part B of this document (“Cascade” procedure) has been proposed as a draft for european standard and issued as the EN 1713 european standard without main modifications. This document defines a method of characterization for ultrasonic manual weld testing, in which the “Cascade” procedure is described as succession of five steps allowing to classify the detected flaws in volumetric or non-volumetric flaws. In order to ensure the repeatability and to decrease significantly the time of interpretation, nowadays the researchers try to develop an automated flaw classification based on the “Cascade” procedure. The aim of our study is to realize an interactive help to sentence the type of flaw automated as for as possible. Our work has been divided in two phases : the first one concerns the four first steps of the “Cascade” procedure. For the three first steps, we have found significative graphics, whereas for the fourth step, we have studied the flaw echo “roughness” in comparison with the reference echo “roughness”. The twenty-seven studied flaws have been classified successfully. The fifth last step concerns the discrimination between the rough cracks (corresponding to the VARIAL pattern), generally unacceptable, and the clustered porosities (corresponding to the VAROUL patter). This automated discrimination had not already been realized. We have searched for an efficient algorithm and found two features which have allowed to classify the real studied flaws without any ambiguity
Declerck, Philippe. "Analyse structurale et fonctionnelle des grands systèmes : applications à une centrale PWR 900 MW". Lille 1, 1991. http://www.theses.fr/1991LIL10153.
Pełny tekst źródłaAdam, Dominic. "Automatisation et analyse des résultats de tests symptomatiques liées au comportement oculaire pour la détection de facultés affaiblies par l'alcool ou les drogues". Thèse, Université du Québec à Trois-Rivières, 2012. http://depot-e.uqtr.ca/6133/1/030404085.pdf.
Pełny tekst źródłaDuvieubourg, Luc. "Analyse de séquences d'images linéaires stéréoscopiques : application à la réalisation d'un système de détection d'intrusions intelligent pour les transports guidés". Lille 1, 1991. http://www.theses.fr/1991LIL10015.
Pełny tekst źródłaQendro, Fatos. "Automatisation du contrôle non destructif par courants de Foucault, amélioration du rapport signal sur bruit". Compiègne, 1989. http://www.theses.fr/1989COMPD183.
Pełny tekst źródłaBazart, Loïc. "Détection de changement de mode de fonctionnement : application à la coulée continue de l'acier". Electronic Thesis or Diss., Université de Lorraine, 2014. http://www.theses.fr/2014LORR0055.
Pełny tekst źródłaMost of time a system is characterized by few operating modes, each of them could be describe by a model. In the case of the commutation between each operating mode is due to unknown process (fault, changing in condition,) it could be difficult to operate with this system and used the appropriate commands. With a partially supervised system (knowing of number of operating mode and model structure that represent each mode), a method is developed to detect the active operating mode at each time. Indeed, the analyses of the residual gradient, that obtain by product each local model together, permit to characterize the operating mode. Application of this method is presented with simulated data and industrial data of continuous casting to detect a particular phenomenon: the sticker. Finally, a rejection mode method is used on industrial thermal data in the same aim (detection of stickers in continuous casting)
Diamanti, Alessio. "Une nouvelle architecture d'automatisation des réseaux : de la détection d'anomalie à la reconfiguration dynamique". Thesis, Paris, HESAM, 2021. http://www.theses.fr/2021HESAC036.
Pełny tekst źródłaLegacy and novel network services are expected to be migrated and designedto be deployed in fully virtualized environments which lead to novel network architecturesthat challenge legacy fault management systems and resilience characterization. Indeed, thecoordination among the different software components for, e.g., orchestration, switching, andvirtual machine and container management creates different monitoring points, besides novelsources of faults and bugs. In this thesis, we propose a network automation framework thatdetects anomalies and characterizes the resiliency state of a virtualized network service. ALong-Short-Term-Memory-Autoencoder-based algorithm analyzes a multidimensional timeseriesbuilt from hundreds of metrics collected at the physical, virtual, and service layers.It learns the nominal working conditions of both the infrastructure and the service, and foreach type of resource (i.e., CPU, network, memory, and disk); it then detects and analyzesdeviations (anomalies) from the learned reference. The produced deviations characterizationis finally used to generate both the transition state graph and the innovative radiographyvisualization. The latter compactly visualizes the propagation of anomalies across all thelayers down from the physical and up to the service, highlighting the temporal evolutionas well. The former aims at establishing the virtualized platform state as the basis for are-orchestration algorithm that leverages a novel reputation-based resiliency managementtechnique. We implement and validate the proposed framework through experimental tests onthe Kubernetes platform hosting a containerized, open-source, and virtualized network core service
Belabbess, Badre. "Automatisation de détections d'anomalies en temps réel par combinaison de traitements numériques et sémantiques". Thesis, Paris Est, 2018. http://www.theses.fr/2018PESC2180/document.
Pełny tekst źródłaComputer systems involving anomaly detection are emerging in both research and industry. Thus, fields as varied as medicine (identification of malignant tumors), finance (detection of fraudulent transactions), information technologies (network intrusion detection) and environment (pollution situation detection) are widely impacted. Machine learning offers a powerful set of approaches that can help solve these use cases effectively. However, it is a cumbersome process with strict rules that involve a long list of tasks such as data analysis and cleaning, dimension reduction, sampling, algorithm selection, optimization of hyper-parameters. etc. It also involves several experts who will work together to find the right approaches. In addition, the possibilities opened today by the world of semantics show that it is possible to take advantage of web technologies to reason intelligently on raw data to extract information with high added value. The lack of systems combining numeric approaches to machine learning and semantic techniques of the web of data is the main motivation behind the various works proposed in this thesis. Finally, the anomalies detected do not necessarily mean abnormal situations in reality. Indeed, the presence of external information could help decision-making by contextualizing the environment as a whole. Exploiting the space domain and social networks makes it possible to build contexts enriched with sensor data. These spatio-temporal contexts thus become an integral part of anomaly detection and must be processed using a Big Data approach.In this thesis, we present three systems with different architectures, each focused on an essential element of big data, real-time, semantic web and machine learning ecosystems:WAVES: Big Data platform for real-time analysis of RDF data streams captured from dense networks of IoT sensors. Its originality lies in its ability to reason intelligently on raw data in order to infer implicit information from explicit information and assist in decision-making. This platform was developed as part of a FUI project whose main use case is the detection of anomalies in a drinking water network. RAMSSES: Hybrid machine learning system whose originality is to combine advanced numerical approaches as well as proven semantic techniques. It has been specifically designed to remove the heavy burden of machine learning that is time-consuming, complex, error-prone, and often requires a multi-disciplinary team. SCOUTER: Intelligent system of "web scrapping" allowing the contextualization of singularities related to the Internet of Things by exploiting both spatial information and the web of data
Bazart, Loïc. "Détection de changement de mode de fonctionnement : application à la coulée continue de l'acier". Thesis, Université de Lorraine, 2014. http://www.theses.fr/2014LORR0055/document.
Pełny tekst źródłaMost of time a system is characterized by few operating modes, each of them could be describe by a model. In the case of the commutation between each operating mode is due to unknown process (fault, changing in condition,) it could be difficult to operate with this system and used the appropriate commands. With a partially supervised system (knowing of number of operating mode and model structure that represent each mode), a method is developed to detect the active operating mode at each time. Indeed, the analyses of the residual gradient, that obtain by product each local model together, permit to characterize the operating mode. Application of this method is presented with simulated data and industrial data of continuous casting to detect a particular phenomenon: the sticker. Finally, a rejection mode method is used on industrial thermal data in the same aim (detection of stickers in continuous casting)
Clarhaut, Joffrey. "Prise en compte des séquences de défaillances pour la conception de systèmes d’automatisation : Application au ferroutage". Electronic Thesis or Diss., Lille 1, 2009. http://www.theses.fr/2009LIL10009.
Pełny tekst źródłaThis thesis deals with a design problem of dependable automated systems using scenarios. In order to determine an optimal system, having fast tools for modelling and evaluating dependability is important. These tools allow the set of possible architectures to be evaluated, and the impact of failures to be studied. The main considered questions include the determination of an equipment architecture, its optimization according to such criteria as the minimal length of scenarios, and its number of combinations. A new graphical model, called improved multi fault tree, which is enough accurate to model component organizations and scenarios, is proposed for this problem. This model uses temporal operators and failure relationships to model system’s behaviour in presence of multiple failures. Application of this method to the railroad piggybacking transportation system is also presented. Results obtained for a fire detection and a stowing protection system are presented. A comparison between the proposed approach and the classical dependability approach shows the benefits of this new methodology. The integration of this research in a software for designing dependable automated systems (ALoCSyS) is described
Jas, Mainak. "Contributions pour l'analyse automatique de signaux neuronaux". Electronic Thesis or Diss., Paris, ENST, 2018. http://www.theses.fr/2018ENST0021.
Pełny tekst źródłaElectrophysiology experiments has for long relied upon small cohorts of subjects to uncover statistically significant effects of interest. However, the low sample size translates into a low power which leads to a high false discovery rate, and hence a low rate of reproducibility. To address this issue means solving two related problems: first, how do we facilitate data sharing and reusability to build large datasets; and second, once big datasets are available, what tools can we build to analyze them ? In the first part of the thesis, we introduce a new data standard for sharing data known as the Brain Imaging Data Structure (BIDS), and its extension MEG-BIDS. Next, we introduce the reader to a typical electrophysiological pipeline analyzed with the MNE software package. We consider the different choices that users have to deal with at each stage of the pipeline and provide standard recommendations. Next, we focus our attention on tools to automate analysis of large datasets. We propose an automated tool to remove segments of data corrupted by artifacts. We develop an outlier detection algorithm based on tuning rejection thresholds. More importantly, we use the HCP data, which is manually annotated, to benchmark our algorithm against existing state-of-the-art methods. Finally, we use convolutional sparse coding to uncover structures in neural time series. We reformulate the existing approach in computer vision as a maximuma posteriori (MAP) inference problem to deal with heavy tailed distributions and high amplitude artifacts. Taken together, this thesis represents an attempt to shift from slow and manual methods of analysis to automated, reproducible analysis
Aguiar, Cota Braulio Norberto. "Pilotage automatique robuste de train sous contrainte d'enrayage-patinage". Thesis, Valenciennes, 2019. http://www.theses.fr/2019VALE0022.
Pełny tekst źródłaMillions of people use the trains every day. Therefore, rail transport and infrastructure efficiency and safety is critical, for customers and companies. A major challenge nowadays is to climb automation levels for trains, from Grade of Automation (GoA) “0” which is basically on-sight train operation all the way to GoA “4” where train operations are unattended. GoA levels are defined by the International Association of Public Transport (UITP—French acronym), and aim to provide a roadmap for the development and the integration of the so-called automatic train operation (ATO) systems. ATO are operational safety enhancement devices that help the driver by automating some operations on the train, helping him/her to be more attentive and to focus on possible safety issues or unexpected situations. Currently, the level of automation that is reached for commercial rolling stock is GoA “2”, semi-automatic train operation, when starting and stopping operations are automated. Most of the existing ATO systems are GoA 2. As within any modern vehicle, on-board systems on a train are linked, and the ATO is working together with automatic train protection (ATP) and automatic train supervision (ATS), to ensure the respect of the speed restrictions and stop the train at the station with accuracy and within an acceptable tolerance of its timetable. The stopping task is carried out by automatic train stop control (ATSC), and all of the devices together form a package called automatic train control (ATC) (Dong et al. 2010). All automatic systems rely on two main functions: perception and decision. The ATO device will rely heavily on the available information to ensure an accurate perception of its environment and of the operational situation, in order to carry out the right decisions. This information acquired by sensors of different technologies and made available through the communication network (bus) of the train. Obviously, sensors are limited by technology, the communication bandwidth is not infinite; and all technical systems can experience faults and failures. Those are major challenges to design efficient and robust ATO devices, because the usual way to deal with these issues is to use sensors of different technologies for each information of interest. This makes such a system more complex, possibly costly, and it increases the amount heavily of transmitted data and its supporting infrastructure. There is a promising solution to this challenge, and it is called virtual sensors, or observers that are developed by automatic control researchers to supplement the sensors at a fraction of the cost, and embeds knowledge of the system in the automated device through analytical models of the environment. The design of a particular type of observer, and its practical exploitation for automatic train operations is the main contribution of this PhD work
Cholez, Thibault. "Supervision des réseaux pair à pair structurés appliquée à la sécurité des contenus". Phd thesis, Université Henri Poincaré - Nancy I, 2011. http://tel.archives-ouvertes.fr/tel-00608907.
Pełny tekst źródłaCholez, Thibault. "Supervision des réseaux pair à pair structurés appliquée à la sécurité des contenus". Electronic Thesis or Diss., Nancy 1, 2011. http://www.theses.fr/2011NAN10036.
Pełny tekst źródłaThe purpose of this thesis is to design and implement new monitoring solutions which are able to deal with the security issues affecting data stored in large structured P2P networks (DHT). There are two major types of issues. First, P2P networks are used to spread illegal contents whose activity is difficult to monitor accurately. Second, the indexation of regular contents can be corrupted (Sybil attack).We first designed a new approach to monitor contents based on the insertion of distributed probes in the network to take control of the indexation mechanism. The probes can attract all the related requests for a given content and assess the peers intent to access it by generating very attractive honeypots. We describe the weaknesses of the network allowing our solution to be effective despite recent protection mechanisms. We then present the services offered by our monitoring architecture and we evaluate its efficiency on KAD. We also present a real deployment whose purpose is to study pedophile contents on this network.Then, we focus on data integrity in distributed hash tables. We performed large scale monitoring campaigns on the KAD network. Our observations show that it suffers from a very harmful pollution of its indexation mechanism affecting 2/3 of the shared files and from a large number of localized attacks targeting contents. To mitigate these threats, we propose a new efficient way to detect attacks by analysing the distribution of the peers' ID found around an entry after a DHT lookup and a counter-measure which can protect the peers at a negligible cost. Finally, we evaluate our solution in real P2P networks
Clarhaut, Joffrey. "Prise en compte des séquences de défaillances pour la conception de systèmes d’automatisation : Application au ferroutage". Thesis, Lille 1, 2009. http://www.theses.fr/2009LIL10009/document.
Pełny tekst źródłaThis thesis deals with a design problem of dependable automated systems using scenarios. In order to determine an optimal system, having fast tools for modelling and evaluating dependability is important. These tools allow the set of possible architectures to be evaluated, and the impact of failures to be studied. The main considered questions include the determination of an equipment architecture, its optimization according to such criteria as the minimal length of scenarios, and its number of combinations. A new graphical model, called improved multi fault tree, which is enough accurate to model component organizations and scenarios, is proposed for this problem. This model uses temporal operators and failure relationships to model system’s behaviour in presence of multiple failures. Application of this method to the railroad piggybacking transportation system is also presented. Results obtained for a fire detection and a stowing protection system are presented. A comparison between the proposed approach and the classical dependability approach shows the benefits of this new methodology. The integration of this research in a software for designing dependable automated systems (ALoCSyS) is described
Karray, Khaled. "Cyber-security of connected vehicles : contributions to enhance the risk analysis and security of in-vehicle communications". Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLT023.
Pełny tekst źródłaDuring the last decade, technological advances have made the car more and more connected to the outside world. On the flip side, thistechnological transformation has made modern vehicles subject to advanced cyber attacks. The cyber-physical architectures of automotive systems were not designed with security in mind. With the integration of connected platforms into these cyberphysical systems, the threat landscape has radically changed. Lately, multiple security breaches targeting different car manufacturers have been reported mainly by the scientific community. This makes security a critical concern, with a high impact especially on future autonomous driving. In order to address this gap, rigorous security engineering needs to be integrated into the design process of an automotive system and new protection methods adapted to the specificities of the vehicle systems must be introduced. Threat modeling and risk analysis are essential building blocks of this process. In this context, attack trees proved to be a reasonably good way to model attack steps. Nevertheless, given the diversity of architectures, it can quickly become a burden to draw attack trees for all architectures. This thesis tackles the issues of security of connected vehicles. The proposed approach allows enhancing the threat analysis with the automated generation of attack tree used to assist in the risk assessment step. We also propose novel and efficient protection mechanisms for in-vehicle communication networks capable of coping with existing cyber-physical attacks
Benabdallah, Mohammed. "Spéciation de l'étain en traces dans l'environnement aquatique par spectrophotométrie d'absorption atomique électrothermique". Pau, 1987. http://www.theses.fr/1987PAUU3026.
Pełny tekst źródła