語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Computer network defense through rad...
~
Malloy, Ian J.
FindBook
Google Book
Amazon
博客來
Computer network defense through radial wave functions.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Computer network defense through radial wave functions./
作者:
Malloy, Ian J.
面頁冊數:
78 p.
附註:
Source: Masters Abstracts International, Volume: 55-03.
Contained By:
Masters Abstracts International55-03(E).
標題:
Computer science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=1605735
ISBN:
9781339339146
Computer network defense through radial wave functions.
Malloy, Ian J.
Computer network defense through radial wave functions.
- 78 p.
Source: Masters Abstracts International, Volume: 55-03.
Thesis (M.S.)--Utica College, 2016.
The purpose of this research is to synthesize basic and fundamental findings in quantum computing, as applied to the attack and defense of conventional computer networks. The concept focuses on uses of radio waves as a shield for, and attack against traditional computers. A logic bomb is analogous to a landmine in a computer network, and if one was to implement it as non-trivial mitigation, it will aid computer network defense. As has been seen in kinetic warfare, the use of landmines has been devastating to geopolitical regions in that they are severely difficult for a civilian to avoid triggering given the unknown position of a landmine. Thus, the importance of understanding a logic bomb is relevant and has corollaries to quantum mechanics as well. The research synthesizes quantum logic phase shifts in certain respects using the Dynamic Data Exchange protocol in software written for this work, as well as a C-NOT gate applied to a virtual quantum circuit environment by implementing a Quantum Fourier Transform. The research focus applies the principles of coherence and entanglement from quantum physics, the concept of expert systems in artificial intelligence, principles of prime number based cryptography with trapdoor functions, and modeling radio wave propagation against an event from unknown parameters. This comes as a program relying on the artificial intelligence concept of an expert system in conjunction with trigger events for a trapdoor function relying on infinite recursion, as well as system mechanics for elliptic curve cryptography along orbital angular momenta. Here trapdoor both denotes the form of cipher, as well as the implied relationship to logic bombs.
ISBN: 9781339339146Subjects--Topical Terms:
523869
Computer science.
Computer network defense through radial wave functions.
LDR
:02533nmm a2200289 4500
001
2069478
005
20160513093954.5
008
170521s2016 ||||||||||||||||| ||eng d
020
$a
9781339339146
035
$a
(MiAaPQ)AAI1605735
035
$a
AAI1605735
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Malloy, Ian J.
$3
3184499
245
1 0
$a
Computer network defense through radial wave functions.
300
$a
78 p.
500
$a
Source: Masters Abstracts International, Volume: 55-03.
500
$a
Adviser: Cynthia Gonnella.
502
$a
Thesis (M.S.)--Utica College, 2016.
520
$a
The purpose of this research is to synthesize basic and fundamental findings in quantum computing, as applied to the attack and defense of conventional computer networks. The concept focuses on uses of radio waves as a shield for, and attack against traditional computers. A logic bomb is analogous to a landmine in a computer network, and if one was to implement it as non-trivial mitigation, it will aid computer network defense. As has been seen in kinetic warfare, the use of landmines has been devastating to geopolitical regions in that they are severely difficult for a civilian to avoid triggering given the unknown position of a landmine. Thus, the importance of understanding a logic bomb is relevant and has corollaries to quantum mechanics as well. The research synthesizes quantum logic phase shifts in certain respects using the Dynamic Data Exchange protocol in software written for this work, as well as a C-NOT gate applied to a virtual quantum circuit environment by implementing a Quantum Fourier Transform. The research focus applies the principles of coherence and entanglement from quantum physics, the concept of expert systems in artificial intelligence, principles of prime number based cryptography with trapdoor functions, and modeling radio wave propagation against an event from unknown parameters. This comes as a program relying on the artificial intelligence concept of an expert system in conjunction with trigger events for a trapdoor function relying on infinite recursion, as well as system mechanics for elliptic curve cryptography along orbital angular momenta. Here trapdoor both denotes the form of cipher, as well as the implied relationship to logic bombs.
590
$a
School code: 1754.
650
4
$a
Computer science.
$3
523869
650
4
$a
Quantum physics.
$3
726746
650
4
$a
Artificial intelligence.
$3
516317
690
$a
0984
690
$a
0599
690
$a
0800
710
2
$a
Utica College.
$b
Cybersecurity.
$3
2098218
773
0
$t
Masters Abstracts International
$g
55-03(E).
790
$a
1754
791
$a
M.S.
792
$a
2016
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=1605735
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9302346
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入