Search results for "ATTAC"

showing 10 items of 610 documents

Legami familiari violenti e prospettive di comunità

2013

Violenza domestica coppia abuso comunità attaccamento pubblicitàSettore M-PSI/07 - Psicologia Dinamica
researchProduct

Las desvergüenzas del capitalismo

2008

WashingtonAttacVidal-Beneyto JoséCapitalismoMax WeberIdentificaciónObjetivos del MilenioPublicaciones: Obra periodística: Columnas y artículos de opiniónCapitalismo sin límitesSistema económicoSistema político-económicoOMCProtestantismoCorrupciónFMIBanco MundialDiosCAPITALISMO ILIMITADODictadura del MonetariadoTrampaRichard H. TawneyGrandes empresasDoctrina económicaEE UUPráctica religiosaAlternativasOrgía financieraRapiñaPensamientoCalvinoDesvergüenzasDineroValores
researchProduct

Data Stream Clustering for Application-Layer DDoS Detection in Encrypted Traffic

2018

Application-layer distributed denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks can be performed using legitimate requests from legitimately connected network machines that make these attacks undetectable by signature-based intrusion detection systems. Moreover, the attacks may utilize protocols that encrypt the data of network connections in the application layer, making it even harder to detect an attacker’s activity without decrypting users’ network traffic, and therefore violating their privacy. In this paper, we present a method that allows us to detect various application-l…

Web serverbusiness.industryComputer scienceNetwork packetDenial-of-service attackIntrusion detection systemEncryptioncomputer.software_genreApplication layerData stream clusteringbusinesscomputerVirtual networkComputer network
researchProduct

The impact of adult attachment style on organizational commitment and adult attachment in the workplace

2015

International audience; Adult attachment style has only recently been considered as having a role in explaining work behavior. The present research aimed to explore the impact of adult attachment style, assessed by the Adult Attachment Interview (AAI), on organizational commitment (OC) and on adult attachment in the workplace (AAW). We hypothesized that a secure attachment style would be positively related to affective and normative commitment, while preoccupied and avoidant styles would be negatively related to affective commitment; we also hypothesized that there would be a correspondence between the AAI categories and the AAW dimensions. Using the AAI categories as group variable, analys…

Work behaviorAAI[SHS.PSY]Humanities and Social Sciences/PsychologyAdult attachment styleOrganizational commitment16. Peace & justice[SHS]Humanities and Social Sciences[SHS.PSY] Humanities and Social Sciences/PsychologyAdult attachment styles8. Economic growthAttachment theorySettore M-PSI/06 - Psicologia Del Lavoro E Delle OrganizzazioniOrganizational commitmentAdult attachment in the workplace[SHS] Humanities and Social SciencesPsychologyGeneral PsychologyAttachment measuresClinical psychologyPersonality and Individual Differences
researchProduct

Les effets de la vie privée/vie au travail sur l’attachement au travail: le rôle médiateur du fonctionnement interne de l’équipe.

2011

Work groupWork-Family interactionSettore M-PSI/06 - Psicologia Del Lavoro E Delle OrganizzazioniWork attachment
researchProduct

Biometric sensors rapid prototyping on field-programmable gate arrays

2015

AbstractBiometric user authentication in large-scale distributed systems involves passive scanners and networked workstations and databases for user data acquisition, processing, and encryption. Unfortunately, traditional biometric authentication systems are prone to several attacks, such as Replay Attacks, Communication Attacks, and Database Attacks. Embedded biometric sensors overcome security limits of conventional software recognition systems, hiding its common attack points. The availability of mature reconfigurable hardware technology, such as field-programmable gate arrays, allows the developers to design and prototype the whole embedded biometric sensors. In this work, two strong an…

WorkstationBiometricsComputer sciencebusiness.industryData_MISCELLANEOUSFingerprint (computing)EncryptionBiometric Authentication Systems FPGA.Reconfigurable computinglaw.inventionSoftwareArtificial IntelligencelawEmbedded systembusinessField-programmable gate arrayReplay attackSoftwareThe Knowledge Engineering Review
researchProduct

Security Implications of Using Third-Party Resources in the World Wide Web

2018

Modern web pages have nothing in common with the static connotation coming from the word “page” - it is a dynamic unique experience created by active content and executed within browser, just-in-time assembled from various resources hosted on many different domains. Active content increases attack surface naturally exposing users to many novel threats. A popular security advice has been to deploy active content blocker plugins like NoScript, unfortunately they are not capable to effectively stop the attacks. Content Security Policy (CSP) can be effective against these attacks, but we demonstrate how poor decisions made by website administrators or external resource hosters can render CSP in…

World Wide WebScripting languageComputer scienceCross-site scriptingWeb pageMalwareAttack surfaceContent Security Policycomputer.software_genreSecurity policycomputerVulnerability (computing)2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)
researchProduct

The influence of attachment on well-being: the mediating role of emotion regulation in Spanish youth

2021

Las personas construyen y mantienen vínculos emocionales a lo largo de todo su desarrollo vital. El modo de vincularse, es decir, el estilo de apego, es consecuencia de los modelos mentales de relación construidos durante las experiencias afectivas. Los individuos con apego inseguro informan de elevada ansiedad y/o elevada evitación al establecer relaciones interpersonales. Estas personas podrían beneficiarse especialmente del aprendizaje de estrategias adecuadas para regular sus emociones, y así, aumentar su grado de bienestar. El objetivo del presente trabajo es estudiar la relación entre el apego y el bienestar subjetivo en jóvenes españoles, contemplando la regulación emocional como var…

YouthApegoEmotion regulationRegulación emocionalWell-being:1 - Filosofía y psicología::159.9 - Psicología [CDU]Well-beingAttachmentJóvenesPsychologyBienestarHumanitiesGeneral PsychologyAnales de Psicología
researchProduct

Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127

2014

International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…

[ INFO ] Computer Science [cs]security protocolsComputer sciencedata acquisition[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]020209 energy[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Cryptography02 engineering and technologysemantic security blockLibrary and Information SciencesComputer securitycomputer.software_genreSOAP protocolSecurity information and event management[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]SCADAModbus protocolECC cryptography0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]SCADAcontrol systemsCloud computing securityvulnerabilitiesTOMSONbusiness.industryencryption technologyembedded applicationscyber securitysupervisory controlsemantic attacksCryptographic protocolComputer security modelsecurity ontologyComputer Science ApplicationsOSI modellow latencySecurity service020201 artificial intelligence & image processingbusinesscomputerInformation SystemsComputer network
researchProduct

Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks

2023

Deploying Connected and Automated Vehicles (CAVs) on top of 5G and Beyond networks (5GB) makes them vulnerable to increasing vectors of security and privacy attacks. In this context, a wide range of advanced machine/deep learning-based solutions have been designed to accurately detect security attacks. Specifically, supervised learning techniques have been widely applied to train attack detection models. However, the main limitation of such solutions is their inability to detect attacks different from those seen during the training phase, or new attacks, also called zero-day attacks. Moreover, training the detection model requires significant data collection and labeling, which increases th…

[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI]5GBIoV[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Zero-day attacksSécurité5G V2X IoV Sécurité Attaques Détection Apprentissage Fédéré[INFO] Computer Science [cs]Intrusion DetectionDétectionAttaquesSecurityV2XApprentissage FédéréFederated Learning5GConnected and Automated Vehicles[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct