Gotowa bibliografia na temat „Prévention des attaques de confiance”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Prévention des attaques de confiance”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Prévention des attaques de confiance"
Jactel, Hervé, i Lorenzo Marini. "Libre évolution des forêts et maîtrise du risque sanitaire associé aux scolytes des conifères". Revue forestière française 73, nr 2-3 (30.03.2022): 383–90. http://dx.doi.org/10.20870/revforfr.2021.5477.
Pełny tekst źródłaKeita, Emmanuel. "Précaution, prévention, risque, hasard : instaurer une salutaire confiance". Archives de philosophie du droit Tome 62, nr 1 (20.05.2020): 71–81. http://dx.doi.org/10.3917/apd.621.0086.
Pełny tekst źródłaMbassi, Jean-Claude, i Richard Nkene Ndeme. "La mobilisation du « health belief model modifié » en communication publique peut-elle contribuer au changement de comportement en période de COVID-19 ?" Communication & management Vol. 20, nr 2 (14.02.2024): 63–80. http://dx.doi.org/10.3917/comma.202.0063.
Pełny tekst źródłaLabigne, Hélène. "La confiance et le temps : outils de prévention en obstétrique". Présence haptonomique N° 12, nr 1 (1.12.2016): 231–33. http://dx.doi.org/10.3917/ph.012.0231.
Pełny tekst źródłaVuibert, Francis. "Délinquance, prévention, vie de la cité : une question de confiance". Les Cahiers du Développement Social Urbain N° 52, nr 2 (1.07.2010): 10–11. http://dx.doi.org/10.3917/cdsu.052.0010.
Pełny tekst źródłaBergeot, Julien, i Florence Jusot. "Croyances, préférences face au risque et au temps et comportements de prévention contre le COVID-19 des séniors en France". Revue économique Vol. 74, nr 3 (20.07.2023): 319–44. http://dx.doi.org/10.3917/reco.743.0319.
Pełny tekst źródłaBéguier, Isabelle. "Liens interinstitutionnels et psychanalyse, du bébé aux personnes âgées en psychiatrie générale de secteur". Perspectives Psy 60, nr 4 (październik 2021): 326–32. http://dx.doi.org/10.1051/ppsy/2021604326.
Pełny tekst źródłaSchaerlig, M. Eric. "Prévention et traitement des attaques cérébrales : progrès timides, mais certains Congrès Eurostroke, Mannheim". Revue Médicale Suisse 62, nr 2490 (2004): 1496–97. http://dx.doi.org/10.53738/revmed.2004.62.2490.1496.
Pełny tekst źródłaNyman, Samuel R. "Psychosocial issues in Engaging Older People with Physical Activity Interventions for the Prevention of Falls". Canadian Journal on Aging / La Revue canadienne du vieillissement 30, nr 1 (marzec 2011): 45–55. http://dx.doi.org/10.1017/s0714980810000759.
Pełny tekst źródłaFrigault, Julia S., i Audrey R. Giles. "Culturally Safe Falls Prevention Program for Inuvialuit Elders in Inuvik, Northwest Territories, Canada: Considerations for Development and Implementation". Canadian Journal on Aging / La Revue canadienne du vieillissement 39, nr 2 (25.06.2019): 190–205. http://dx.doi.org/10.1017/s0714980819000308.
Pełny tekst źródłaRozprawy doktorskie na temat "Prévention des attaques de confiance"
Masmoudi, Mariam. "Prévention des attaques de confiance en temps réel dans l'IoT social". Electronic Thesis or Diss., Toulouse 3, 2023. http://www.theses.fr/2023TOU30302.
Pełny tekst źródłaThe social IoT is a new paradigm that enhances the navigability of IoT networks and boosts service discovery by integrating social contexts. Nonetheless, this paradigm faces several challenges that reduce its performance quality. Trust, particularly trust attacks, is one of the most significant challenges. Some users resort to malicious behaviors and launch attacks to propagate malicious services. A trust management mechanism has become a major requirement in Social IoT to prevent these attacks in real-time and ensure trustworthy experiences for end-users. However, few studies have addressed trust management issues to prevent trust attacks in Social IoT environments. Most studies have been conducted to detect offline attacks with or without specifying the type of attack performed. Moreover, they did not consider security properties, such as cryptography, transparency, and immutability, etc. In fact, we must continuously process transactions to prevent these attacks at the transaction generation level while maintaining security properties. For this, we compared the previously used techniques and technologies, whose common point is attack prevention in the SN and IoT areas. Based on these comparisons, we indicated that blockchain technology can assist in developing a trust management mechanism that can prevent trust attacks while maintaining security. For real-time prevention, we proposed the combination of a distributed stream processing engine, known as Apache Spark, with blockchain technology. Our choice is based on a comparison of open-source data-stream processing engines. As a result, we propose a new trust management mechanism, based on blockchain and Apache Spark. This mechanism permit to prevent in real-time all trust attack types performed by malicious nodes, in order to obtain a reliable environment. Experimentation made on a real data-set enable us to prove the performance of our proposition
Fernandes, Medeiros Stéphane. "Attaques par canaux auxiliaires: nouvelles attaques, contre-mesures et mises en oeuvre". Doctoral thesis, Universite Libre de Bruxelles, 2015. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/209096.
Pełny tekst źródłaDoctorat en Sciences
info:eu-repo/semantics/nonPublished
Guilley, Sylvain. "Contre-mesures géométriques aux attaques exploitant les canaux cachés". Phd thesis, Télécom ParisTech, 2007. http://pastel.archives-ouvertes.fr/pastel-00002562.
Pełny tekst źródłaTan, Heng Chuan. "Vers des communications de confiance et sécurisées dans un environnement véhiculaire". Thesis, Paris, ENST, 2017. http://www.theses.fr/2017ENST0063/document.
Pełny tekst źródłaRouting and key management are the biggest challenges in vehicular networks. Inappropriate routing behaviour may affect the effectiveness of communications and affect the delivery of safety-related applications. On the other hand, key management, especially due to the use of PKI certificate management, can lead to high latency, which may not be suitable for many time-critical applications. For this reason, we propose two trust models to assist the routing protocol in selecting a secure end-to-end path for forwarding. The first model focusses on detecting selfish nodes, including reputation-based attacks, designed to compromise the “true” reputation of a node. The second model is intended to detect forwarders that modify the contents of a packet before retransmission. In key management, we have developed a Secure and Authentication Key Management Protocol (SA-KMP) scheme that uses symmetric cryptography to protect communication, including eliminating certificates during communication to reduce PKI-related delays
Tan, Heng Chuan. "Vers des communications de confiance et sécurisées dans un environnement véhiculaire". Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0063.
Pełny tekst źródłaRouting and key management are the biggest challenges in vehicular networks. Inappropriate routing behaviour may affect the effectiveness of communications and affect the delivery of safety-related applications. On the other hand, key management, especially due to the use of PKI certificate management, can lead to high latency, which may not be suitable for many time-critical applications. For this reason, we propose two trust models to assist the routing protocol in selecting a secure end-to-end path for forwarding. The first model focusses on detecting selfish nodes, including reputation-based attacks, designed to compromise the “true” reputation of a node. The second model is intended to detect forwarders that modify the contents of a packet before retransmission. In key management, we have developed a Secure and Authentication Key Management Protocol (SA-KMP) scheme that uses symmetric cryptography to protect communication, including eliminating certificates during communication to reduce PKI-related delays
Cazal, Julien. "Prévenir la maladie cardiovasculaire : socio-éthnologie du risque et de l'incitation sanitaire". Toulouse 3, 2012. http://thesesups.ups-tlse.fr/1727/.
Pełny tekst źródłaPrevention of cardiovascular disease is a major public health issue. The aim of the management is to train the patient so that he could adopt healthy behavior to reduce the risk of serious complications. Medical institution act in this direction on the development of self-government. From an ethnographic study conducted in two devices support (detection, rehabilitation) and interviews (n = 59) with professional and patient, research shows how to build "the self-caregiver" by training in risk and promoting change in lifestyle. The first part characterizes the intervention logic specific to each device and shows that the self-government is considered as an individualized or collective approach to risk depending on whether the detection or rehabilitation. The second part is, following an interactionist perspective, the construction of the risk and self-government within the devices. It shows that detection prevails risk learning through a comprehensive, multifactorial health, while in rehabilitation it is learning to live with the risk by a physical discipline. Finally, the third part shows, following a cultural approach to risk, how the medical establishment and the patient think the risk symmetrically. Three positions are determined in relation to the social positions of patients: the "admnistered" who is in the delegation to the medical community, the "medical helper" partner device that adheres to a model of prevention, "the patient-citizen "who is critical of the medical institution
Ropaul, Maïva. "Essais sur l'analyse économique de la responsabilité civile des entreprises". Thesis, Paris 2, 2015. http://www.theses.fr/2015PA020071/document.
Pełny tekst źródłaThe accelerating pace of technological innovations and pressures from civil society provide tort law with new challenges. This thesis studies the incentive effects of tort law on corporate investment in prevention in this context. Particularly, this study deepens the traditional economic analysis of corporate civil liability and assess the effects of the combination of non legal sanctions and the legal framework. First, we highlight the evolution of the economic analysis of liability and responsibility. Then, we study the incentive effects ofcivil liability in a theoretical model, with a particular emphasis on the role of the legal notion of causality. Next, we examine to what extent the difficulties of predicting accident risks affect incentives provided by liability with both a theoretical model and with a lab experiment. In a theoretical model, we develop ananalysis of the role of non-legal sanctions, from civil society, along side the tort law. We show that the incentive effects of consumer boycott on corporate investment in prevention are limited. Finally, through an empirical study, we complete this analysis by studying the magnitude and determinants of consumer boycott in Europe
Bernier, Sandrine. "Perceptions des risques industriels et nucléaires. Enjeux, négociations et construction sociale des seuils d'acceptation des risques". Phd thesis, Université François Rabelais - Tours, 2007. http://tel.archives-ouvertes.fr/tel-00307754.
Pełny tekst źródłaL'originalité de cette recherche tient à la dimension importante de terrain local que nous apportons, qui se compose de sites classés Seveso et nucléaires implantés en Indre et Loire. Nous avons interrogé cinq catégories d'acteurs par entretien ou par questionnaire dans le but de comprendre leur position vis-à-vis des situations de risques technologiques. Leurs discours permettent de comprendre et d'affiner les seuils d'acceptation qu'ils définissent autour des risques industriels et de faire ressortir la complexité d'une situation mêlant enjeux politiques, pressions environnementales, logiques économiques et contraintes sécuritaires, vers un positionnement flou et complexe. Ce terrain éclaire une réalité faite de contrastes sur les perceptions de risques d'aujourd'hui.
Wang, Tairan. "Decision making and modelling uncertainty for the multi-criteria analysis of complex energy systems". Thesis, Châtenay-Malabry, Ecole centrale de Paris, 2015. http://www.theses.fr/2015ECAP0036/document.
Pełny tekst źródłaThis Ph. D. work addresses the vulnerability analysis of safety-critical systems (e.g., nuclear power plants) within a framework that combines the disciplines of risk analysis and multi-criteria decision-making. The scientific contribution follows four directions: (i) a quantitative hierarchical model is developed to characterize the susceptibility of safety-critical systems to multiple types of hazard, within the needed `all-hazard' view of the problem currently emerging in the risk analysis field; (ii) the quantitative assessment of vulnerability is tackled by an empirical classification framework: to this aim, a model, relying on the Majority Rule Sorting (MR-Sort) Method, typically used in the decision analysis field, is built on the basis of a (limited-size) set of data representing (a priori-known) vulnerability classification examples; (iii) three different approaches (namely, a model-retrieval-based method, the Bootstrap method and the leave-one-out cross-validation technique) are developed and applied to provide a quantitative assessment of the performance of the classification model (in terms of accuracy and confidence in the assignments), accounting for the uncertainty introduced into the analysis by the empirical construction of the vulnerability model; (iv) on the basis of the models developed, an inverse classification problem is solved to identify a set of protective actions which effectively reduce the level of vulnerability of the critical system under consideration. Two approaches are developed to this aim: the former is based on a novel sensitivity indicator, the latter on optimization.Applications on fictitious and real case studies in the nuclear power plant risk field demonstrate the effectiveness of the proposed methodology
Amari, Houda. "Smart models for security enhancement in the internet of vehicles". Electronic Thesis or Diss., Normandie, 2023. http://www.theses.fr/2023NORMC248.
Pełny tekst źródłaWith the major progress in Intelligent Transportation Systems (ITS), there has been an exponential interest in technological advancements of Internet of Vehicles (IoV), attracting the attention of numerous researchers from academia and industry. IoV technology aims to enhance transport efficiency, passenger safety, and comfort by exchanging traffic and infotainment information to connected vehicles. The multitude of network access technologies, the exceptionally high mobility of connected vehicles and their high density in urban areas, and the predominance of wireless communications make the IoV ecosystem a complex, vulnerable and heterogeneous network with very dynamic characteristics, some of which are difficult to predict and subject to scalability and threats problems. Many entities compose its architecture (connected vehicles, humans, roadside units (RSUs), ITS). Moreover, it presents different communication types to confirm its connectivity and vulnerability. However, this diversity leads to new security requirements that seem challenging to consider and enlarge the attack surface of such networks. Therefore, disseminating malicious messages/entities within the network significantly reduces the network performance and becomes a threat to passengers and vulnerable pedestrians. Accordingly, security mechanisms should be considered to secure communications in vehicular networks. This thesis aims to develop novel models to enhance the security aspects of the IoV ecosystem dealing with diverse attacks, including DDoS attacks, while preserving users' privacy
Książki na temat "Prévention des attaques de confiance"
Cutting, Derrick. Stop à l'infarctus: Ménagez votre coeur : "dites non aux attaques cardiaques". Paris: Dauphin, 2004.
Znajdź pełny tekst źródłaScott, Keith Vincent. The great bears of Hyder, Alaska & Stewart, B.C.: The world's greatest bear display that you can get to by car. Surrey, B.C: Hancock House, 2001.
Znajdź pełny tekst źródłaScott, Keith. The bear man. Surrey, B.C: Hancock House, 2010.
Znajdź pełny tekst źródłaMcCloskey, Erin. Bear Attacks. Lone Pine Publishing, 2009.
Znajdź pełny tekst źródłaScott, Keith, i Nat03700. Great Bears of Hyder Ak & Stewart Bc: The World's Greatest Bear Display That You Can Get to by Car. Hancock House Pub Ltd, 2001.
Znajdź pełny tekst źródłaSalas-Auvert, Jesus A., i Frank M. Dattilio. Panic Disorder: Assessment and Treatment Through a Wide-Angle Lens. Zeig, Tucker & Theisen, 1999.
Znajdź pełny tekst źródłaWenger, Alexandre, Guillaume Linte i Christian Bonah. Maladies infectieuses sans fin. GEORG, 2022. http://dx.doi.org/10.32551/georg.12535.
Pełny tekst źródłaWenger, Alexandre, Guillaume Linte i Christian Bonah. Maladies infectieuses sans fin. GEORG, 2022. http://dx.doi.org/10.32551/georg.12986.
Pełny tekst źródłaCzęści książek na temat "Prévention des attaques de confiance"
FURON, Teddy. "Traçage de traîtres". W Sécurité multimédia 1, 201–30. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9026.ch6.
Pełny tekst źródła