Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Computer network defense through rad...
~
Malloy, Ian J.
Linked to FindBook
Google Book
Amazon
博客來
Computer network defense through radial wave functions.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Computer network defense through radial wave functions./
Author:
Malloy, Ian J.
Description:
78 p.
Notes:
Source: Masters Abstracts International, Volume: 55-03.
Contained By:
Masters Abstracts International55-03(E).
Subject:
Computer science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=1605735
ISBN:
9781339339146
Computer network defense through radial wave functions.
Malloy, Ian J.
Computer network defense through radial wave functions.
- 78 p.
Source: Masters Abstracts International, Volume: 55-03.
Thesis (M.S.)--Utica College, 2016.
The purpose of this research is to synthesize basic and fundamental findings in quantum computing, as applied to the attack and defense of conventional computer networks. The concept focuses on uses of radio waves as a shield for, and attack against traditional computers. A logic bomb is analogous to a landmine in a computer network, and if one was to implement it as non-trivial mitigation, it will aid computer network defense. As has been seen in kinetic warfare, the use of landmines has been devastating to geopolitical regions in that they are severely difficult for a civilian to avoid triggering given the unknown position of a landmine. Thus, the importance of understanding a logic bomb is relevant and has corollaries to quantum mechanics as well. The research synthesizes quantum logic phase shifts in certain respects using the Dynamic Data Exchange protocol in software written for this work, as well as a C-NOT gate applied to a virtual quantum circuit environment by implementing a Quantum Fourier Transform. The research focus applies the principles of coherence and entanglement from quantum physics, the concept of expert systems in artificial intelligence, principles of prime number based cryptography with trapdoor functions, and modeling radio wave propagation against an event from unknown parameters. This comes as a program relying on the artificial intelligence concept of an expert system in conjunction with trigger events for a trapdoor function relying on infinite recursion, as well as system mechanics for elliptic curve cryptography along orbital angular momenta. Here trapdoor both denotes the form of cipher, as well as the implied relationship to logic bombs.
ISBN: 9781339339146Subjects--Topical Terms:
523869
Computer science.
Computer network defense through radial wave functions.
LDR
:02533nmm a2200289 4500
001
2069478
005
20160513093954.5
008
170521s2016 ||||||||||||||||| ||eng d
020
$a
9781339339146
035
$a
(MiAaPQ)AAI1605735
035
$a
AAI1605735
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Malloy, Ian J.
$3
3184499
245
1 0
$a
Computer network defense through radial wave functions.
300
$a
78 p.
500
$a
Source: Masters Abstracts International, Volume: 55-03.
500
$a
Adviser: Cynthia Gonnella.
502
$a
Thesis (M.S.)--Utica College, 2016.
520
$a
The purpose of this research is to synthesize basic and fundamental findings in quantum computing, as applied to the attack and defense of conventional computer networks. The concept focuses on uses of radio waves as a shield for, and attack against traditional computers. A logic bomb is analogous to a landmine in a computer network, and if one was to implement it as non-trivial mitigation, it will aid computer network defense. As has been seen in kinetic warfare, the use of landmines has been devastating to geopolitical regions in that they are severely difficult for a civilian to avoid triggering given the unknown position of a landmine. Thus, the importance of understanding a logic bomb is relevant and has corollaries to quantum mechanics as well. The research synthesizes quantum logic phase shifts in certain respects using the Dynamic Data Exchange protocol in software written for this work, as well as a C-NOT gate applied to a virtual quantum circuit environment by implementing a Quantum Fourier Transform. The research focus applies the principles of coherence and entanglement from quantum physics, the concept of expert systems in artificial intelligence, principles of prime number based cryptography with trapdoor functions, and modeling radio wave propagation against an event from unknown parameters. This comes as a program relying on the artificial intelligence concept of an expert system in conjunction with trigger events for a trapdoor function relying on infinite recursion, as well as system mechanics for elliptic curve cryptography along orbital angular momenta. Here trapdoor both denotes the form of cipher, as well as the implied relationship to logic bombs.
590
$a
School code: 1754.
650
4
$a
Computer science.
$3
523869
650
4
$a
Quantum physics.
$3
726746
650
4
$a
Artificial intelligence.
$3
516317
690
$a
0984
690
$a
0599
690
$a
0800
710
2
$a
Utica College.
$b
Cybersecurity.
$3
2098218
773
0
$t
Masters Abstracts International
$g
55-03(E).
790
$a
1754
791
$a
M.S.
792
$a
2016
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=1605735
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9302346
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login