Search results for "ATTAC"
showing 10 items of 610 documents
Legami familiari violenti e prospettive di comunità
2013
Las desvergüenzas del capitalismo
2008
Data Stream Clustering for Application-Layer DDoS Detection in Encrypted Traffic
2018
Application-layer distributed denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks can be performed using legitimate requests from legitimately connected network machines that make these attacks undetectable by signature-based intrusion detection systems. Moreover, the attacks may utilize protocols that encrypt the data of network connections in the application layer, making it even harder to detect an attacker’s activity without decrypting users’ network traffic, and therefore violating their privacy. In this paper, we present a method that allows us to detect various application-l…
The impact of adult attachment style on organizational commitment and adult attachment in the workplace
2015
International audience; Adult attachment style has only recently been considered as having a role in explaining work behavior. The present research aimed to explore the impact of adult attachment style, assessed by the Adult Attachment Interview (AAI), on organizational commitment (OC) and on adult attachment in the workplace (AAW). We hypothesized that a secure attachment style would be positively related to affective and normative commitment, while preoccupied and avoidant styles would be negatively related to affective commitment; we also hypothesized that there would be a correspondence between the AAI categories and the AAW dimensions. Using the AAI categories as group variable, analys…
Les effets de la vie privée/vie au travail sur l’attachement au travail: le rôle médiateur du fonctionnement interne de l’équipe.
2011
Biometric sensors rapid prototyping on field-programmable gate arrays
2015
AbstractBiometric user authentication in large-scale distributed systems involves passive scanners and networked workstations and databases for user data acquisition, processing, and encryption. Unfortunately, traditional biometric authentication systems are prone to several attacks, such as Replay Attacks, Communication Attacks, and Database Attacks. Embedded biometric sensors overcome security limits of conventional software recognition systems, hiding its common attack points. The availability of mature reconfigurable hardware technology, such as field-programmable gate arrays, allows the developers to design and prototype the whole embedded biometric sensors. In this work, two strong an…
Security Implications of Using Third-Party Resources in the World Wide Web
2018
Modern web pages have nothing in common with the static connotation coming from the word “page” - it is a dynamic unique experience created by active content and executed within browser, just-in-time assembled from various resources hosted on many different domains. Active content increases attack surface naturally exposing users to many novel threats. A popular security advice has been to deploy active content blocker plugins like NoScript, unfortunately they are not capable to effectively stop the attacks. Content Security Policy (CSP) can be effective against these attacks, but we demonstrate how poor decisions made by website administrators or external resource hosters can render CSP in…
The influence of attachment on well-being: the mediating role of emotion regulation in Spanish youth
2021
Las personas construyen y mantienen vínculos emocionales a lo largo de todo su desarrollo vital. El modo de vincularse, es decir, el estilo de apego, es consecuencia de los modelos mentales de relación construidos durante las experiencias afectivas. Los individuos con apego inseguro informan de elevada ansiedad y/o elevada evitación al establecer relaciones interpersonales. Estas personas podrían beneficiarse especialmente del aprendizaje de estrategias adecuadas para regular sus emociones, y así, aumentar su grado de bienestar. El objetivo del presente trabajo es estudiar la relación entre el apego y el bienestar subjetivo en jóvenes españoles, contemplando la regulación emocional como var…
Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127
2014
International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…
Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks
2023
Deploying Connected and Automated Vehicles (CAVs) on top of 5G and Beyond networks (5GB) makes them vulnerable to increasing vectors of security and privacy attacks. In this context, a wide range of advanced machine/deep learning-based solutions have been designed to accurately detect security attacks. Specifically, supervised learning techniques have been widely applied to train attack detection models. However, the main limitation of such solutions is their inability to detect attacks different from those seen during the training phase, or new attacks, also called zero-day attacks. Moreover, training the detection model requires significant data collection and labeling, which increases th…