Gotowa bibliografia na temat „Sécurité intégrée”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Sécurité intégrée”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Sécurité intégrée"
Martel, Claude. "Qu’en est-il de l’intervention psychosociale en sécurité civile au Québec?" Santé mentale au Québec 25, nr 1 (5.06.2006): 45–73. http://dx.doi.org/10.7202/013024ar.
Pełny tekst źródłaLevitan, Sar A., i Lorne Huston. "Critique de la position conservatrice contre les programmes de création d’emplois". II. La critique néo-libérale contemporaine et les limites d’intervention étatique, nr 16 (12.01.2016): 107–12. http://dx.doi.org/10.7202/1034401ar.
Pełny tekst źródłaROUSSEAUX, Patrick, Michel LICHOU i Osama ALKOSHAK. "Analyse des risques du cycle de vie : application à deux filières énergétiques en france". Revue Française de Gestion Industrielle 34, nr 2 (1.06.2015): 7–23. http://dx.doi.org/10.53102/2015.34.02.609.
Pełny tekst źródłaHéry, Michel. "Les impacts de l’automatisation du travail". Études Septembre, nr 9 (22.08.2018): 43–54. http://dx.doi.org/10.3917/etu.4252.0043.
Pełny tekst źródłaBabio, Soumanou, Alexis Hougni i Jacob Afouda Yabi. "Sécurité Alimentaire au Bénin: Les Grandes Familles de Pratiques Agro-écologiques Adoptées dans les Zones Cotonnières". European Scientific Journal, ESJ 19, nr 12 (29.04.2023): 32. http://dx.doi.org/10.19044/esj.2023.v19n12p32.
Pełny tekst źródłaDeblock, Christian, i Gérald Cadet. "La politique commerciale des États-Unis et le régionalisme dans les Amériques". Études internationales 32, nr 4 (12.04.2005): 653–92. http://dx.doi.org/10.7202/704344ar.
Pełny tekst źródłaOuoba, Joël, Sougrimani Lankoandé-Haro, Souleymane Fofana, Aminata P. Nacoulma, Lassané Kaboré, Issiaka Sombié, Toussaint Rouamba i Fati Kirakoya-Samadoulougou. "Surveillance des effets indésirables lors des campagnes de la chimioprévention du paludisme saisonnier chez les enfants de 3-59 mois au Burkina Faso". Santé Publique Vol. 35, nr 5 (22.12.2023): 121–32. http://dx.doi.org/10.3917/spub.235.0121.
Pełny tekst źródłaBarmaki, Loubna, i Otmane Mokhtari. "Management Qualité – Sécurité - Environnement (QSE) et Performance Globale de l’Entreprise : Enjeux d’une Démarche Intégrée, Cas de Dix Entreprises Marocaines". المنارة للدراسات القانونية و الإدارية, nr 34 (czerwiec 2021): 37–62. http://dx.doi.org/10.12816/0058597.
Pełny tekst źródłaDury, Sandrine, Arlène Alpha, Nadine Zakhia-Rozis i Thierry Giordano. "Les systèmes alimentaires aux défis de la crise de la Covid-19 en Afrique : enseignements et incertitudes". Cahiers Agricultures 30 (2021): 12. http://dx.doi.org/10.1051/cagri/2020052.
Pełny tekst źródłaLapierre, Judith, Sylvain Croteau, Marie-Pierre Gagnon, Jacques Caillouette, Fanny Robichaud, Suzanne Bouchard, José Côté i in. "Télésanté en contexte de pandémie et de déconfinement : pratiques infirmières innovantes et partenariats pour des communautés équitables, sécuritaires et durables". Global Health Promotion 28, nr 1 (18.02.2021): 89–97. http://dx.doi.org/10.1177/1757975920980720.
Pełny tekst źródłaRozprawy doktorskie na temat "Sécurité intégrée"
Schellekens-Gaiffe, Marie-Ange. "La sécurité environnementale dans les relations extérieures de l’Union européenne : vers une approche intégrée de la prévention des conflits et crises externes". Thesis, La Rochelle, 2017. http://www.theses.fr/2017LAROD004/document.
Pełny tekst źródłaThe link between environmental problems and risks to security is progressively gaining ground, even though diverging opinions still prevail as to the exact nature and challenges of this interaction. The increasingly visible impacts of climate change have indirectly strengthened the prominence of this issue on the international agenda. Can the European Union, born itself from a successful approach to conflict prevention and international leader for environmental protection contribute to this aim ? Beyond the immediate urgency of environmental problems, environmental security carries several elements which could turn it into a driving force for the European Union's foreign policy by an improved understanding of the actual roots and multifaceted nature of numerous conflicts. This would allow the EU to support global stability and to strengthen its role on the international scene
Métivier, Virginie. "Méthode d'application d'un système de management de l'environnement, de la sécurité et de la santé : cas du site industriel de production pharmaceutique Abbott". Orléans, 2002. http://www.theses.fr/2002ORLE1045.
Pełny tekst źródłaThe purpose of this report is to promote the implementation of a general method in respect of the environmental, safety and management systems for the pharmaceutical industry and more specifically for the industrial site for the Abbott laboratory. After giving an outline of the already existing environment, safety and hygiene management systems, we would develop the method and tools chosen to implement the management system for the Abbott site. Based on numerous examples we would also evaluate the results achieved by the new system. Eventually, we would analyse all sociological constraints and limits that held back the implementation of this environment, safety and hygiene management system that was chosen for the industrial site
Hirschhorn, Damien. "Haïti : une intervention exemplaire ? La Réforme du Secteur de Sécurité en Haïti". Thesis, Lyon 3, 2014. http://www.theses.fr/2014LYO30053/document.
Pełny tekst źródłaFirst of all, this thesis aims at understanding, while using the example of Haiti, if Security Sector Reforms carried out within international interventions in crisis or post-conflict countries are effective at accomplishing their objectives and providing the best support for sustainable changes to host States. Finally this document's objective is also to serve as a support in finding new solutions and new practices to successfully achieve Security Sector Reforms
Farre-Malaval, Margerie. "Les rapports juridiques entre sécurité maritime et protection du milieu marin : essai sur l'émergence d'une sécurité maritime environnementale en droit international et de l'union européenne". Thesis, Lyon 3, 2011. http://www.theses.fr/2011LYO30070.
Pełny tekst źródłaBegun with the study of the European Union rules engendered by the wreck of Erika, the present research was refined around the relation between marine safety and marine environment protection while growing rich of the observation of the international rules. From then on, the idea was to study the collision between two elements neither equivalents, nor completely different and to see what this legal "big-bang" had provoke.The first part will envisage the renewal of the function of marine safety around the purpose of marine environment protection. Indeed, by the middle of the XXth century, the appearance of the environmental concerns comes to destabilize the classic distribution of the skills between the flag State and the coastal State. The freedom, founding principle of the order of seas, has been transformed to adapt itself to the realities of the marine environment protection. It becomes then the principle of sustainable use of the sea, the new key of the distribution of sovereignties on the sea. A shape of environmental governance of the maritime safety appears to establish around the International Maritime Organization and the European Union.The second part will allow to bring to light the redefining of the normative space of maritime safety in the prism of the objective of prevention of the pollutions. Originally, the regulations of marine safety aimed at protecting the sailormen against the dangers of the sea. Henceforth, it is today a question of protecting the biosphere, the humanity and its future generations. That is why the classic marine safety, become insufficient, evolves towards a more modern, " environmental " notion
Abdalla, Iskandar Boctor Christine. "Le développement durable et le droit de l'environnement : La sécurité nationale hydraulique au Moyen-Orient". Thesis, Artois, 2012. http://www.theses.fr/2012ARTO0301/document.
Pełny tekst źródłaThe concept of National Hydraulic Security (NHS) is the result of changing the concept ofsecurity from military security to multi-faceted security. The traditional method of managing thisnational hydraulic security is a way hydraulic unsustainable. The National Hydraulic Securityneeds to know a new hydraulic evolution that takes into account not only the qualitatif andquantitatif challenges but also the environmental challenges. A version of this sustainablenational hydraulic security interest to the hydraulic common interests of all riparian countries ofthe three rivers: Nile, Jordan, Tigris and Euphrates. In addition, the concept of SustainableDevelopment must grow significantly to obtain a hydraulic sustainable management of theNational Hydraulic Security
Germain, Fabien. "Sécurité cryptographique par la conception spécifique de circuits intégrés". Phd thesis, Ecole Polytechnique X, 2006. http://pastel.archives-ouvertes.fr/pastel-00001858.
Pełny tekst źródłaJoaquim, da Rolt Jean. "Testabilité versus Sécurité : Nouvelles attaques par chaîne de scan & contremesures". Thesis, Montpellier 2, 2012. http://www.theses.fr/2012MON20168.
Pełny tekst źródłaIn this thesis, we firstly analyze the vulnerabilities induced by test infrastructures onto embedded secrecy in digital integrated circuits dedicated to cryptography. Then we propose new scan-based attacks and effective countermeasures. Scan chains insertion is the most used technique to ensure the testability of digital cores, providing high-fault coverage. However, for ICs dealing with secret information, scan chains can be used as back doors for accessing secret data, thus becominga threat to device's security. We start by describing a series of new attacks that exploit information leakage out of advanced Design-for-Testability structures such as response compaction, X-Masking and partial scan. Conversely to some previous works that proposed that these structures are immune to scan-based attacks, we show that our new attacks can reveal secret information that is embedded inside the chip boundaries. Regarding the countermeasures, we propose three new solutions. The first one moves the comparison between test responses and expected responses from the AutomaticTest Equipment to the chip. This solution has a negligible area overhead, no effect on fault coverage. The second countermeasure aims to protect the circuit against unauthorized access, for instance to the test mode, and also ensure the authentication of the circuit. For thatpurpose, mutual-authentication using Schnorr protocol on Elliptic Curves is implemented. As the last countermeasure, we propose that Differential Analysis Attacks algorithm-level countermeasures, suchas point-blinding and scalar-blinding can be reused to protect the circuit against scan-based attacks
Porquet, Joël. "Architecture de sécurité dynamique pour systèmes multiprocesseurs intégrés sur puce". Phd thesis, Université Pierre et Marie Curie - Paris VI, 2010. http://tel.archives-ouvertes.fr/tel-00574088.
Pełny tekst źródłaBeringuier-Boher, Noémie. "Evaluation et amélioration de la sécurité des circuits intégrés analogiques". Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAT007.
Pełny tekst źródłaWith the development of the Internet of things, the number of connected devices is in constant increase. These objects use a large amount of data including personal credentials. Therefore, security has become a major constraint for System on Chips (SoCs) designers. Moreover, in a context more and more aggressive in terms of performances and time to market, it is important to find low cost security solutions. Although the hardware security is often treated from a digital point of view, almost every SoCs is also using analog and mixed IP. Thus, this work presents different steps to improve the security of analog IPs, from vulnerability analysis to countermeasures design validation, and behavioral modeling in the context of mixed signals and low cost applications. To protect any system, the first requirement is to know its vulnerabilities. To do so, a vulnerability analysis methodology dedicated to analog circuit has been developed. Using the results of this analysis, countermeasures can be designed during the development of the circuit and not at the end. The circuit security is thus improved without dramatically increasing its cost in terms of design time. The analysis of a clock system generator, an analog IP widely used in current SoCs and composed with various sub-circuits, has shown fault attacks using Laser Photoelectric Stimulation (LPS) or supply voltage glitches as important threats. After having identified the 2 previous attacks types as major threats, their effects on analog circuits are analyzed. Existing countermeasures are then compared and evaluated for the protection of analog IPs. To complete these solutions, two analog detectors have been designed to detect laser and supply voltage glitch attacks considering SoCs level constraints. Electrical test of these detectors processed on CMOS 28nm FD-SOI technology proved their efficiency. Theoretical vulnerability analysis has shown some difficulties. Indeed, analog circuits are sensitive to numerous parametrical faults. Also, the high interconnection of various sub-circuits makes the faults propagation analysis quite difficult. To help this analysis, electrical simulations at transistor level are necessary. These simulations are quite long and, so the behavioral modeling of analog circuits to help the analysis of supply voltage glitch attack effects has been studied. To do so, the developed models must be developed according different constraints presented in this report and applied to the behavioral modeling of a real analog circuit. This illustration proved that behavioral models can be used to help to identify which attack shapes are the most likely to induce faults in the circuit
Porquet, Joël. "Architecture de sécurité dynamique pour systèmes multiprocesseurs intégrés sur puces". Paris 6, 2010. http://www.theses.fr/2010PA066511.
Pełny tekst źródłaKsiążki na temat "Sécurité intégrée"
A, Bolmen Richard, red. Semiconductor safety handbook: Safety and health in the semiconductor industry. Westwood, N.J: Noyes Publications, 1998.
Znajdź pełny tekst źródłaFroman, Bernard, Jean-Marc Gey i Fabrice Bonnifet. Qualité - Sécurité - Environnement : Construire un système de management intégré. Afnor, 2002.
Znajdź pełny tekst źródłaFood and Agriculture Organization of the United Nations. Note d'orientation: Intégrer le Droit à une Alimentation Adéquate Aux Programmes de Sécurité Alimentaire et Nutritionnelle. Food & Agriculture Organization of the United Nations, 2014.
Znajdź pełny tekst źródłaBolmen, Richard A. Semiconductor Safety Handbook: Safety and Health in the Semiconductor Industry. Elsevier Science & Technology Books, 1998.
Znajdź pełny tekst źródłaBolmen, Richard A. Semiconductor Safety Handbook: Safety and Health in the Semiconductor Industry (Semiconductor Safety Series). Wyd. 2. Noyes Publications, 1998.
Znajdź pełny tekst źródłaEditions, Qhse. Mon Kit Documentaire ISO 9001- ISO 14001 - ISO 45001: Toute la Documentation du Système de Management Intégré, Qualité, Environnement et Santé et Sécurité Au Travail Pour débutants, étudiants, Stagiaire et Professionnels Contient des Procédures Processus. Independently Published, 2021.
Znajdź pełny tekst źródłaEditions, Qhse. Mon Kit Documentaire ISO 9001- ISO 14001 - ISO 45001: Toute la Documentation du Système de Management Intégré, Qualité, Environnement et Santé et Sécurité Au Travail Pour débutants, étudiants, Stagiaire et Professionnels Contient des Procédures Processus. Independently Published, 2021.
Znajdź pełny tekst źródłaSecurity and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations. CRC Press, 2016.
Znajdź pełny tekst źródłaHardware Security: Design, Threats, and Safeguards. Taylor & Francis Group, 2014.
Znajdź pełny tekst źródłaHardware Security. Taylor & Francis Group, 2014.
Znajdź pełny tekst źródłaCzęści książek na temat "Sécurité intégrée"
"Élaboration et mise en oeuvre d'une stratégie de sécurité routière intégrée pour les deux-roues motorisés". W Les rapports de recherche du FIT, 195–218. OECD, 2017. http://dx.doi.org/10.1787/9789282107966-11-fr.
Pełny tekst źródłaJANAC, K. Charles. "NoC, la technologie de communication des MPSoC". W Systèmes multiprocesseurs sur puce 1, 243–75. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9021.ch9.
Pełny tekst źródłaAL AGHA, Khaldoun, Pauline LOYGUE i Guy PUJOLLE. "Les architectures de l’Edge". W Edge Networking, 11–29. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9068.ch1.
Pełny tekst źródłaSCHMITT, Corinna, i Marvin WEBER. "Solution domotique pour SecureWSN". W Cybersécurité des maisons intelligentes, 1–79. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9086.ch1.
Pełny tekst źródłaMARSAA, H., M. JEANTEU, X. ATTRAIT, J. GONZVA, O. BON, N. JACQUIER, S. DURANTON i in. "Médicalisation des unités de sauvetage-déblaiement dans le cadre de la certification International Search and Rescue Advisory Group (INSARAG)". W Médecine et Armées Vol. 46 No.3, 279–88. Editions des archives contemporaines, 2018. http://dx.doi.org/10.17184/eac.7344.
Pełny tekst źródłaFOUCHER, S., J. B. LE-LOCH, A. DESBREST, L. GABILLY, H. LEFORT i K. TAZAROURTE. "Catastrophe avec nombreuses victimes en milieu urbain". W Médecine et Armées Vol. 46 No.3, 213–24. Editions des archives contemporaines, 2018. http://dx.doi.org/10.17184/eac.7336.
Pełny tekst źródłaStreszczenia konferencji na temat "Sécurité intégrée"
Coïa, N. "Architecture électronique à sécurité intégrée d’un onduleur/chargeur pour machine électrique à aimants permanents". W Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56141.
Pełny tekst źródłaRaporty organizacyjne na temat "Sécurité intégrée"
Kamaté, Caroline. La sécurité, une affaire de professionnels? Intégrer la sécurité aux compétences professionnelles. Fondation pour une culture de sécurité industrielle, październik 2018. http://dx.doi.org/10.57071/wpt841.
Pełny tekst źródłaDaniellou, François, Marcel Simard i Ivan Boissières. Les facteurs humains et organisationnels de la sécurité industrielle: un état de l’art. Fondation pour une culture de sécurité industrielle, marzec 2010. http://dx.doi.org/10.57071/820qjv.
Pełny tekst źródłaDudoit, Alain. Les espaces européens communs de données : une initiative structurante nécessaire et adaptable au Canada. CIRANO, październik 2023. http://dx.doi.org/10.54932/ryht5065.
Pełny tekst źródłaGiles Álvarez, Laura, Juan Carlos Vargas-Moreno, Alejandra Mejía, Aastha Patel i Nerlyne Jean-Baptiste. Une approche spatiale pour analyser l’insécurité alimentaire dans le département du Nord-Ouest d’Haïti. Inter-American Development Bank, grudzień 2022. http://dx.doi.org/10.18235/0004589.
Pełny tekst źródłaÀ qui appartiennent les terres du monde ? État mondial de la reconnaissance des droits fonciers des communautés autochtones, afro-descendantes et locales de 2015 à 2020. Rights and Resources Initiative, styczeń 2024. http://dx.doi.org/10.53892/uvqg1004.
Pełny tekst źródła