Search results for " vulnerabilities"

showing 4 items of 4 documents

Childhood maltreatment, personality vulnerability profiles, and borderline personality disorder symptoms in adolescents.

2021

AbstractAdverse childhood experiences are significant risk factors in the development of adolescent borderline personality disorder symptoms (BPDs). Theorists have posited that two personality vulnerabilities factors, self-criticism and dependency, may inform our understanding of this relationship. However, no research has examined the associations between early negative experiences, personality vulnerabilities, and adolescent BPDs. The current study aimed to identify profiles of dependency and self-criticism to examine the associations of these profiles with cumulative forms of childhood maltreatment (CM) and BPDs as well as to explore the mediating and moderating role of vulnerable person…

050103 clinical psychologyMediation (statistics)Vulnerable personalityAdolescentPersonality Inventorymedia_common.quotation_subjectVulnerabilityPersonality DisordersSettore M-PSI/04 - Psicologia Dello Sviluppo E Psicologia Dell'Educazione03 medical and health sciencesborderline personality disorder cumulative childhood maltreatment dependency personality vulnerabilities self-criticism0302 clinical medicineBorderline Personality DisorderSettore M-PSI/08 - Psicologia ClinicaDevelopmental and Educational PsychologymedicinePersonalityHumans0501 psychology and cognitive sciencesSignificant riskChild AbuseAdverse Childhood ExperiencesChildBorderline personality disordermedia_common05 social sciencesmedicine.disease030227 psychiatryPsychiatry and Mental healthPsychologyClinical psychologyPersonalityDevelopment and psychopathology
researchProduct

Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall

2016

Algorithmic complexity vulnerabilities are an opportunity for an ad-versary to conduct a sophisticated kind of attack i.e. on network infrastructure services. Such attacks take advantage of worst case time or space complexity of algorithms implemented on devices in their software. In this paper we address potential risks introduced by such algorithmic behavior in computer networks in particular on a stateful firewall. First we introduce the idea and theoretical background for the attack. We then describe in full detail a successfully con-ducted attack which takes advantage of the worst case computational complexi-ty of O(n2) of a hash table data structure used to store active sessions. The …

RouterComputer sciencenetwork vulnerabilitiesDenial-of-service attack02 engineering and technologyNetwork topologyComputer securitycomputer.software_genreFirewall (construction)Stateful firewall0202 electrical engineering electronic engineering information engineeringDenial of Servicecomplexity attackcomputational complexitybusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsHash tablese-curitycomputer networksDoSbusinessSegmentation faultcomputerRebootComputer network
researchProduct

Città, diritti e pratiche di mutualismo: riflessioni a partire dalle istanze comunitarie ai tempi della pandemia

2022

During the pandemic crisis, the “community” practices of mutualism have characterized the urban space by operating in a subsidiary, if not a substitute, manner with respect to public institutions. Their actions have been political in the sense in which Hannah Arendt defined this concept. Starting from a reflection on vulnerabilities, taking a case study as the object, and dialoguing with Orsetta Giolo’s essay, The rights against the city. Urban space, subjectivity and the public sphere, published in 2021, the potential and limits of these practices will be analyzed, along with their relationship with established power, with respect to the renewed tension between rights and territoriality, w…

Settore IUS/20 - Filosofia Del DirittoPractices of mutualism rights for/against the city Hannah Arendt vulnerabilities
researchProduct

Trabajo Social en Italia: una profesión en constante desarrollo

2022

The current landscape of Social Work has certainly changed since the 1980s: the profession enjoys general recognition, an established professional status and a university career that goes as far as a doctorate. The question raised by the profession no longer refers to the search for theoretical models of reference: the current challenges refer to the professional identity of the social worker in a postmodern social and labor context (Folgheriter, 2004) and to the climate of deprivation due to the redefinition of Well-being. In addition, social workers have to reckon with the transformations of social services and the drastic cutback in planning and innovation, due to the reduction in public…

Trabajo social vulnerabilidades desarrollo profesionalSettore SPS/07 - Sociologia GeneraleSocial work vulnerabilities professional development
researchProduct