Computational Security
Mostrando 1-12 de 48 artigos, teses e dissertações.
-
1. Computational algorithm for stability analysis of distribution networks with distributed generation
Abstract With the insertion of distributed generation in distribution networks, security analysis becomes crucial, in islanded operation or when the system is connected to the grid. Dynamic stability analyses are necessary in order to achieve minimum levels of security and reliability. Such analyses are obtained through the solution of the algebraic-differen
Braz. arch. biol. technol.. Publicado em: 25/11/2019
-
2. Picosatellites for Maritime Security Applications - the Lambdasat Case
ABSTRACT: This study explores the potential deployment of small satellites for maritime interdiction and security applications by investigating the available solutions and formulating a generic proposal to optimize the use of those short-lived space assets in support of these operations. The operational background is analyzed with respect to the potential us
J. Aerosp. Technol. Manag.. Publicado em: 2015-12
-
3. Evaluation of the seat fastening in the frame of a road bus submitted to frontal impact
The collective intercity transportation by bus is currently a mean of locomotion much sought after by people. Security in accidents is a very important factor that must be taken into account in design of bus body structure, being the evaluation of passenger safety of this type of vehicle is an important subject that should be checked, because in many acciden
Lat. Am. j. solids struct.. Publicado em: 2014
-
4. Grid anywhere: an extensible desktop grid computing middleware / Grid Anywhere: Um middleware extensível para grades computacionais desktop
This PhD thesis presents investigations, models and implementations of a computational grid middleware named Grid Anywhere. This platform aims at allowing the build of computational grid systems, which enable the increase of the number of participants as consumers and resource providers. In order to do this, new solutions are presented to manage security pol
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 01/06/2012
-
5. Uma metodologia para caracterização do tráfego de redes de computadores: uma aplicação em detecção de anomalias / Methodology for traffic characterization of computer networks: an application in anomaly detection
The methods of intrusion detection based on anomalies model the default behavior of network traffic and identify anomalies as deviations from the behavior model mapped. The modeling of traffic behavior requires the analysis of large datasets to extract knowledge about the particularities of each network environment, considering the services provided, number
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 24/02/2011
-
6. Comparação analítica dos esquemas de autenticação em sistemas P2P de live streaming / Comparative analisys of authentication schemes in P2P live streaming
P2P live streaming applications have great potential for improvements in terms of popularity as well as quality. However, they are subject to pollution attacks, in which a malicious user tampers with audio/video of streams in order to trick other users. The authentication of blocks in a stream allows the detection of pollution in received content and can lea
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 2011
-
7. Identificando padrões comportamentais do tipo avoidance em trajetórias de objetos móveis / Identifying avoidance behavior patterns in moving objects trajectories
With the increasing availability and considerable price reduction of technologies that allow the collection of moving object data, the offering of trajectory data becomes abundant. The study of these trajectories has the objective to allow a better understanding of the data, as well as the extraction of new knowledge using computational techniques. One of th
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 2011
-
8. Desenvolvimento de uma ferramenta computacional para análise de segurança dinâmica, no contexto da estabilidade transitória, de sistemas elétricos de potência via métodos diretos / Design of a computational tool for dynamic security analysis, in the context of transient stability, of electrical power systems based on direct methods
O presente trabalho tem como objetivo desenvolver um programa computacional para análise de contingências, no contexto da estabilidade transitória, capaz de identificar as contingências críticas do sistema elétrico de potência via métodos diretos. A análise de estabilidade é realizada em diversas etapas, onde serão aplicados diversos filtros, base
Publicado em: 2010
-
9. WAVELET-BASED ANOMALY DETECTION IN NETWORK TRAFFIC / UM DETECTOR DE ANOMALIAS DE TRÁFEGO DE REDE BASEADO EM WAVELETS
Attacks on computer networks compromises the security of the system and degrade the performance of the network causing problems to users and organizations. Networkbased Intrusion Detection Systems are used to detect attacks or malicious activity by analyzing the network traffic. The anomaly-based detection approach is used for intrusion detection. It is assu
Publicado em: 2010
-
10. Middleware seguro para redes de sensores sem fio
There is a variety of application scenarios in wireless sensor networks such as medical monitoring, military, home and office security, agriculture and so on. These applications deal with Wireless Sensor Networks (WSNs) odd particularities such as limited power and computational capacities, hardware heterogeneity, low bandwidth, dynamic topology and scalabil
Publicado em: 2009
-
11. AvaliaÃÃo e modelagem de desempenho para planejamento de capacidade de sistema de transferÃncia eletrÃnica de fundos utilizando trÃfego em rajada
Over the last years, reliability and availability have become a crucial factor in designing computer systems, especially fault-tolerant ones. In such systems, redundant components are added to the system that continues to function uninterruptedly despite the occurrence of failures. Some well-known techniques to operate spare modules include hot standby, cold
Publicado em: 2009
-
12. Sistema de suporte a decisão para analise e previsão de carga por barramento / Decision support system to the analysis and bus load forecasting
In a power operation system there are many variables that can Influence the execution of t ho control routines. The attendance of these variables is very important to aid the processes in the safe operation of the system. In the electric system the bus load level is an important variable in operation planning step. Accurate Information on the load level In e
Publicado em: 2009