Дисертації з теми "Incidents réseaux"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-23 дисертацій для дослідження на тему "Incidents réseaux".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Guerid, Hachem. "Systèmes coopératifs décentralisés de détection et de contre-mesures des incidents et attaques sur les réseaux IP." Thesis, Paris, ENST, 2014. http://www.theses.fr/2014ENST0079/document.
Повний текст джерелаThe problem of botnets, networks of infected hosts controlled remotely by attackers, is a major concern because of the number of infected hosts and associated threats, like distributed denial of service (DDoS), spams, and data theft. State of the art solutions to fight against botnets have major limitations in a context of a network operator (scalability of the solution, confidentiality and privacy of users). In this thesis, we propose four network-based contributions to fight against botnets. Each solution address a different and complementary issue in this area: the first contribution tracebacks the source of denial of service attacks which threaten the network availability, allowing by that way to identify infected devices used to perpetrate these attacks. The second contribution detects the communications between infected computers and their command and control server (C&C) in a large scale network and offers the opportunity to block these servers to minimize the risk of future attacks. The third contribution enables collaborative detection of botnets in an inter-domain and inter-operator context in order to fight against the highly distributed aspect of these botnets. Finally, the last contribution mitigates botnets by slowing down the communication between infected hosts and their C&C server, providing a countermeasure against evasion techniques developed by cybercriminals to make their botnets more resilient
Guerid, Hachem. "Systèmes coopératifs décentralisés de détection et de contre-mesures des incidents et attaques sur les réseaux IP." Electronic Thesis or Diss., Paris, ENST, 2014. http://www.theses.fr/2014ENST0079.
Повний текст джерелаThe problem of botnets, networks of infected hosts controlled remotely by attackers, is a major concern because of the number of infected hosts and associated threats, like distributed denial of service (DDoS), spams, and data theft. State of the art solutions to fight against botnets have major limitations in a context of a network operator (scalability of the solution, confidentiality and privacy of users). In this thesis, we propose four network-based contributions to fight against botnets. Each solution address a different and complementary issue in this area: the first contribution tracebacks the source of denial of service attacks which threaten the network availability, allowing by that way to identify infected devices used to perpetrate these attacks. The second contribution detects the communications between infected computers and their command and control server (C&C) in a large scale network and offers the opportunity to block these servers to minimize the risk of future attacks. The third contribution enables collaborative detection of botnets in an inter-domain and inter-operator context in order to fight against the highly distributed aspect of these botnets. Finally, the last contribution mitigates botnets by slowing down the communication between infected hosts and their C&C server, providing a countermeasure against evasion techniques developed by cybercriminals to make their botnets more resilient
Murphy, Killian. "Predictive maintenance of network equipment using machine learning methods." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS013.
Повний текст джерелаWith the improvement of computation power necessary for advanced applications of Machine Learning (ML), Network Fault Prediction (NFP) experiences a renewed scientific interest. The ability to predict network equipment failure is increasingly identified as an effective means to improve network reliability. This predictive capability can be used, to mitigate or to enact predictive maintenance on incoming network failures. This could contribute to establishing zero-failure networks and allow safety-critical applications to run over higher dimension and heterogeneous networks.In this PhD thesis, we propose to contribute to the NFP field by focusing on network alarm prediction. First, we present a comprehensive survey on NFP using Machine Learning (ML) methods entirely dedicated to telecommunication networks, and determine new directions for research in the field. Second, we propose and study a set of Machine Learning performance metrics (maintenance cost reduction and Quality of Service improvement) adapted to NFP in the context of network maintenance. Third, we describe the complete data processing architecture, including the network and software infrastructure, and the necessary data preprocessing pipeline that was implemented at SPIE ICS, Networks and Systems Integrator. We also describe the alarm or failure prediction problem model precisely. Fourth, we establish a benchmark of the different ML solutions applied to our dataset. We consider Decision Tree-based methods, Multi-Layer Perceptron and Support Vector Machines. We test the generalization of performance prediction across equipment types as well as normal ML generalization of the proposed models and parameters.Then, we apply sequential - Convolutional Neural Networks (CNN) and Long Short Term Memory (LSTM) - ML architectures with success on our sequential SNMP dataset. Finally, we study the impact of the definition of the prediction horizon (and associated arbitrary timeframes) on the ML model prediction performance
Ketabi, Abbas. "Nouvelle approche pour la restauration d'un réseau électrique après un incident généralisé." Grenoble INPG, 2001. http://www.theses.fr/2001INPG0137.
Повний текст джерелаDuflo, Hugues. "Diffraction de l'onde de Scholte : dièdre sous incidence oblique : étude de réseaux de stries." Le Havre, 1994. http://www.theses.fr/1994LEHA0011.
Повний текст джерелаNgo, Quang Minh. "Système expert d'aide à la reprise de service d'un réseau électrique après un incident généralisé." Grenoble INPG, 1994. http://www.theses.fr/1994INPG0145.
Повний текст джерелаBouffaron, Renaud. "Modélisation et Réalisation de Réseaux Sub-Longueur d'Onde :Application au Contrôle de la Réflectivité Large Bande, Large Incidence." Phd thesis, Université Paul Cézanne - Aix-Marseille III, 2008. http://tel.archives-ouvertes.fr/tel-00353626.
Повний текст джерелаNouvel, Maguelone. "Les idées sociales de Frédéric Le Play : réseaux de diffusion, réception critique et incidences politiques sous le Second Empire." Montpellier 3, 2006. http://www.theses.fr/2006MON30020.
Повний текст джерелаThe first years of the Third republic threw disrepute onto the Imperial Regime and onto the thinkers who were associated to it. From then on and after so many vicissitudes Frédéric Le Play’s work and career are still partially unknown. Nevertheless, this engineer, original thinker and relentless investigator knew an exceptional public and intellectual vivid life under the reign of Napoleon 3rd. Graduated from Polytechnique High School, State Counsellor then Senator, he gained the Emperor’s confidence and saw a good deal of the élite of his time. As a methodical observer and a committed theorist he published The European Workers in 1855 and The Social Reform in France in 1864, two scientific works that aimed at reforms and made a stir at that time. Frédéric Le Play, a pioneer in terms of empirical studies, made up an original social theory that aimed at launching France onto of a path reforms. Gathering all the facets of the social and political life his stands raised his contemporaries’ attention and urged the leaders of the main streams of thought to take a stand. As an advocate of moral standards, of patronage, of devolution, of the traditional family and of the freedom to make a will, the author was first seen as conservative. Though, he was in favor of an economical liberalism and fundamental liberties and as such seems to have intended to have himself registered as a modern thinker. And so controversies as to the relevance and originality of his work have been far and numerous. How did his contemporaries react to his social ideas ? What was their scope at that time ? Which network did the author benefit from as to his publication ? How far did his contemporaries’ reactions underline the originality of his social thought ? These are the fundamental questions that this work aims at answering to with the help of many and original sources
Volpe, Sophie. "La protection des réseaux internes des immeubles contre le phénomène de retour d'eau : incidence sanitaire potentielle de ce type d'incident." Paris 5, 1996. http://www.theses.fr/1996PA05P194.
Повний текст джерелаLahmadi, Abdelkader. "Performances des fonctions et architectures de supervision de réseaux et de services." Phd thesis, Université Nancy II, 2007. http://tel.archives-ouvertes.fr/tel-00208049.
Повний текст джерелаEtant donné ce cadre, nous avons travaillé sur la définition d'un ensemble de métriques primaires et secondaires pour mesurer la performance d'une approche de gestion. Les métriques primaires sont regroupées en trois familles : rapidité, coût et qualité. Les métriques secondaires proposées reposent sur ces dernières et permettent de quantifier l'efficacité, le passage à l'échelle et l'incidence de la gestion. Nous avons élaboré une méthodologie pour mesurer ces métriques primaires. Afin de valider cette proposition, nous avons conçu et implanté un banc de mesure dédié à l'évaluation de performances de l'approche de gestion JMX.
La seconde partie de notre travail a porté sur l'élaboration de fines campagnes de mesures de performances de JMX. Les résultats de ces mesures, nous ont permis de caractériser le passage à l'échelle, l'incidence de la gestion sur la performance d'un système géré et les délais de l'approche JMX sous différents scénarios. Nous avons trouvé que les délais que subissent les opérations JMX suivent approximativement une distribution statistique de Weibull. Grâce à ce rapprochement, nous avons pu identifier l'effet des délais sur le comportement d'un algorithme de supervision, notamment la distorsion temporelle de la vue observée par le gestionnaire par rapport à la vue réelle du système géré.
Mounaud, Mathieu. "Contribution à l’analyse des défauts géométriques dans le routage d’un réseau hydraulique en aéronautique : incidences sur la conception." Cachan, Ecole normale supérieure, 2009. http://www.theses.fr/2009DENS0024.
Повний текст джерелаThis work focuses on the conception stage of pipe routing in aeronautics. The purpose is to suggest and validate geometrical models to control the influence of geometrical deviations on the functional requirements of a hydraulic routing. The research undertaken has led to a realistic model of pipe mechanical behaviour, which allows to : 1) check the assemblability of pipes according to the characteristics of their joints, such as stiffness or geometrical deviations for instance. 2) understand the influence of the assembly sequence on the functional requirements in terms of displacements and residual stresses in the studied joints of the routing. 3) choose and position adjustment solutions such as adjusted brackets and swages in-situ. 4) conduct comparative analyses of routing to minimize the following criteria : weight of the routing, number of brackets, residual stresses in joints and geometrical gaps. An experiment has been developed to validate the realistic model of mechanical behaviour used in the work. This model was then applied to the restitution of geometry in weightlessness. As a result, it was possible to use the results of pipe measurement to apply a robust correction of the bending process. Last, a graphical and statistical approach based on the main results of the simulation was achieved to underline the functional requirements of the routing. This summary representation is meant to help engineers choose among different technical solutions in the design stage
Barthélémy, Pierre. "Etude de la géométrie des réseaux de fractures naturelles à différentes échelles : reconnaissance de structures hiérarchisées et incidence sur les propriétés hydrauliques." Paris 11, 1992. http://www.theses.fr/1992PA112440.
Повний текст джерелаHobeika, Janine. "Les bénéfices relationnels attendus expliqués par le stéréotype du personnel en contact, l'attitude du client, ses valeurs et les incidents critiques : une application à la gestion de patrimoine et à la banque de réseau." Thesis, Paris Sciences et Lettres (ComUE), 2017. http://www.theses.fr/2017PSLED041/document.
Повний текст джерелаThe success of relationship marketing depends on individual preferences, knowing that clients are not all equally receptive to relational approaches. It appears necessary for this purpose to improve knowledge about client’s expected relational benefits. Within a sequential mixed design, non-directive interviews conducted with wealth management clients, then with retail bank clients, show and confirm the existence of three distinct types of relational profiles : transactional, psychological relational and socio-valuable relational. A matrix combining the money attitude and the banker stereotype reveals desirable vs undesirable hybrid profiles. The quantitative study creates a scale to measure the banker stereotype, enriches the money attitude scale with the taboo dimension, and produces a scale for the expected relational benefits. The test of hypotheses in a structural equations model shows the role of the banker stereotype, the money attitude, the cultural values and critical incidents, in the formation of expected relational benefits
Gotzig, Bernhard. "Recherche du schéma optimal d'exploitation d'un réseau de distribution électrique." Grenoble INPG, 1997. http://www.theses.fr/1997INPG0209.
Повний текст джерелаThe aim of this thesis is the exploration of the do main of the optimisation of the radial topology of a distribution system for different operation states on a real time basis. We have therefore developed several powerful computation utilities, especially a unified approach which may be used both for the optimisation in the normal state and for finding a restoration plan for the isolated llnfalllted areas in the case of an OLltage of an element in the network. In arder to satisfy the real time constraint, we have L1sed heuristic methods which permit the global optimum to be approached effeciently within a very short computation time. The verification of the results obtained by the heuristic methods is done using optimisation methods which are more dedicated for the research of the global optimum. In validating the proposed method with reallarge scale distribution networks, we have shown the efficiency of our approach in both computation time and the quality of the results
Tranchot-Diallo, Juliette. "Implication du réseau des cytokines et des chimiokines au cours de la grossesse et incidence sur la transmission materno-fœtale du vih-1." Tours, 1998. http://www.theses.fr/1998TOUR3804.
Повний текст джерелаLefebvre, Annick. "Enjeux de la qualité microbiologique de l'eau à l'hôpital : impact sur les colonisations et infections nosocomiales à pseudomonas aeruginosa." Thesis, Dijon, 2016. http://www.theses.fr/2016DIJOMU01/document.
Повний текст джерелаScientific literature allows suspecting but does not clearly indicate a link between water network contamination and Pseudomonas aeruginosa healthcare-associated infections. Guidelines for water samples vary across countries.Our work is based on water samples and P. aeruginosa patients’ samples (healthcare-associated colonizations or infections) in Dijon University hospital between 2005 and 2013.Water outlets contaminations were frequent (17%, CI95% 15.5-18.2). Mixed models on units that moved from a building to another did not show a lower incidence of P. aeruginosa cases in the new building than in the others, although it was less contaminated. Kulldorff’s method allowed detecting few temporal clusters of cases. GEE (Generalized Estimated Equations) models showed a positive association between the proportions of positive water samples in the building in the quarter and the incidence of healthcare-associated cases. This association was still observed in subgroup analyses of intensive care units but was no more observed in the database excluding hematology and intensive care units. Few arguments for an association between water network contamination and P. aeruginosa healthcare-associated colonizations or infections are provided, except in hematology and intensive care units. Given the costs associated with the samples and correctives measures, it could be proposed to limit the samples to these units at risk. Prospective studies with molecular typing methods should be conducted in order to better understand the association between hospital water network microbiologic quality and healthcare-associated infections
Pausé, Marie-Sophie. "Structure lexico-syntaxique des locutions du français et incidence sur le combinatoire." Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0185/document.
Повний текст джерелаAs semantically non-compositional phrases, idioms are lexical units. Consequently, they must have their own entries in a lexical resource, with a lexicographic definition and grammatical characteristics. Furthermore, because of their phrasal signifier, idioms show – to varying degrees – a formal flexibility (passivization, attachment of modifiers, substitution of components,etc.)Our thesis defends the view that a description of idioms that combine identification of their lexical components and identification of dependency links between these components will permit to predict their formal variations. Such a description is possible only in a model of lexicon that describes precisely combinatorial proprieties of lexical units. Our thesis, based on the Explanatory Combinatorial Lexicology’s framework, exploits and enhances the data of the French Lexical Network (fr-LN). This resource is being developed at the laboratory ATILF (Nancy, France).The thesis makes two principal contributions to the study of phraseology. The first contribution is the development of a precise description of idioms’ lexico-syntactic structures. The second contribution is the indentification and the study of structural, syntactic and lexical variations linked to idioms’ formal flexibility. Idioms’ formal variations are correlated with their lexico-syntactic structures, but also with their lexicographic definitions. This work leads us to introduce the notion of structural projection, that plays a central role in the continuum of idiom’s formal flexibility
Saad, Soha. "Méthodologie de réorganisation du trafic ferroviaire par analyse de sensibilité régionale : application à un incident sur infrastructure électrique." Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAI057/document.
Повний текст джерелаThe power supply quality of a railway network can be strongly affected by the unavailability of electrical equipment, whether due to a technical incident or a maintenance operation. It is then necessary to reduce the expected traffic by adjusting the time schedules and speed profiles, while maintaining optimal operating performance. The purpose of the work presented in this thesis is to develop a decision support tool to assist the agents in charge of the reorganization of traffic during an incident on electrical infrastructure. The studied system is complex and its analysis is based on costly simulations. We therefore proposed a two-phase approach. As a first step, a sensitivity analysis can effectively detect the most influential traffic adjustment variables. After a comparative analysis between different techniques, we selected the regional sensitivity analysis by Monte Carlo filtering and KS test, because it allows us to take into account the operational constraints, like the tension levels in line. The second phase consists in optimizing the solution by working in a small research area. A set of Pareto-Optimal solutions are generated to evaluate the best trade-off between the main criterion "traffic density" and other criteria such as losses or overheating. The techniques implemented led to the production of a prototype. The tool allows the engineer to define traffic adjustment variables and traffic performance criteria. Then it analyzes the influence of the various adjustment variables and optimizes the traffic according to the defined criteria. The tool was tested on four case studies proposed by SNCF Réseau and corresponding to network segments and actual rail traffic
Paquereau, Delphine. "Gestion de procédures et prise en compte du danger lors de l'occurrence d'incidents combinés : Application à la supervision d'une ligne de métro." Thesis, Lyon, INSA, 2015. http://www.theses.fr/2015ISAL0024/document.
Повний текст джерелаDuring metro line operations, the supervision operator is responsible for the procedures’ execution when referring to incidents management. However, when combined incidents occur, procedures may be competing. In this particular case, situations which do not ensure people’s safety exist and an accident might happen. Firstly, the approach of studying these procedures integrates their graphical representation with the BPMN notation. These procedures’ models, understandable and accessible, provide a significant amount of knowledge for industrials in this area. Secondly, these models are performed as Petri nets to add dynamic to the system of interest. That is why, the notion of controllability and the influence of the execution context are introduced in the study of incidents management procedures. To ensure people’s safety, forbidden states are defined and identified among the states space with the supervisory control theory. These states are characterized in an original way : depending on their inclusion in a set of states but also depending on the controllability of their outgoing transitions. In addition to this innovative characterization, algorithms allow to determine and to avoid forbidden states. Criteria distinguish the admissible sequences which avoid forbidden states. These differentiation criteria are defined to steer the supervision operator through the actions he has to execute when combined incidents occur. Results allow us to provide assistance to the supervision operator with warnings and advice. This study is based on ATS supervision system developed by Thales and one of their customers’ incidents management procedures, the RATP. A prototype of operator support functionality for incidents management based on customer know-how has been implemented into Thales software
Legrand, Véronique. "Confiance et risque pour engager un échange en milieu hostile." Thesis, Lyon, INSA, 2013. http://www.theses.fr/2013ISAL0041.
Повний текст джерелаNowadays, the electronic form of exchanges offers a new media able to make easy all information access, ubiquitous access, everywhere and everytime. But, at the same time, such a media - new, opened and complex - introduces unknown threats and breaches. So, how can we start up trust exchanges? From the system theory point of view, the cybernetic regulation maintains the sys-tems equilibrium with negative feedback loops. In this way, the defense line is based on a set of defense components still named Demilitarized Zone (DMZ) in order to block flow, to control anomalies and give out alerts messages if deviances are detected. Nev-ertheless, most of these messages concern only anomalies of machines and very little of human. So, messages do not take into account neither psychological behavior nor the dynamic of the context. Furthermore, messages suffer of the "big data" problem and become confused due to too much velocity, volume and variety. Finally, we can limit this problem to the understanding difficulty during the access to the specific knowledge in connection with the message. For example, the identity theft with the XSS attack is an illustration of this unfriendly environment. On the contrary, the living sciences show that organisms follow a positive regulation by where each one itself adapts according to his complexity. For that, they deploy adapted and continuous environment monitoring process still named "homeostasis". During this cycle, inputs capture information, then outputs adjust in response corre-sponding actions : this is the feedback. The strength of such a mechanism lies on the information meaning and in particular on the clues they include. In fact, some of these information include clues by which organisms can explain situations. For example, the information « attention" alludes to dangerous situation. This faculty comes from ad-vanced knowledge having first explicit relationship with this information: this relation forms what we call the "cognitive loop". To illustrate this phenomenon, the cognitive sciences often evoke "a friend immediately recognized by her friend" despite he is swal-lowed up in the crowd. But, the cognitive loop should not be broken. Like the living beings functioning, our work propose a cognitive model named Diag-nostic And Incident Model (DIM). The main idea lies on the context-aware model in order to adapt itself like "homeostasis". DIM has been founded on the principle of the "cognitive loop" where the inputs are the "logs" of numerics systems. So, in order to make easier the comparison between contextual and known situation, we will design "logs" and advanced knowledge by a common model. DIM proposes a conceptual struc-ture to extract clues from massive and various "logs” issued from environment based on advanced knowledge acquisition. Then, we propose the cognitive structure will be applied to the anomaly detection, incident management and diagnosis process
Besanger, Yvon. "VERS L'AMELIORATION DE LA SECURITE DESRESEAUX ELECTRIQUES DE PUISSANCE." Habilitation à diriger des recherches, 2006. http://tel.archives-ouvertes.fr/tel-00172945.
Повний текст джерелаKetabi, Abbas. "NOUVELLE APPROCHES POUR LA RESTAURATION D'UN RESEAU ELECTRIQUE APRES UN INCIDENT GENERALISE." Phd thesis, 2001. http://tel.archives-ouvertes.fr/tel-00598543.
Повний текст джерелаAllard, Audrey. "Incidence d'ateliers d'écriture appuyés d'un réseau virtuel de soutien sur l'émergence de comportements et de stratégies de révision chez des élèves de quatrième secondaire faibles en écriture." Mémoire, 2009. http://www.archipel.uqam.ca/2536/1/M11067.pdf.
Повний текст джерела