Search results for "Denial"

showing 10 items of 54 documents

A configurable rule based classful token bucket filter network request scheduler for the lustre file system

2017

HPC file systems today work in a best-effort manner where individual applications can flood the file system with requests, effectively leading to a denial of service for all other tasks. This paper presents a classful Token Bucket Filter (TBF) policy for the Lustre file system. The TBF enforces Remote Procedure Call (RPC) rate limitations based on (potentially complex) Quality of Service (QoS) rules. The QoS rules are enforced in Lustre's Object Storage Servers, where each request is assigned to an automatically created QoS class.The proposed QoS implementation for Lustre enables various features for each class including the support for high-priority and real-time requests even under heavy …

File systemComputer scienceQuality of service020206 networking & telecommunications020207 software engineeringDenial-of-service attackRule-based system02 engineering and technologycomputer.software_genreObject storageRemote procedure callServer0202 electrical engineering electronic engineering information engineeringOperating systemLustre (file system)computerProceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis
researchProduct

Firewall as a service in SDN OpenFlow network

2015

Protecting publicly available servers in internet today is a serious challenge, especially when encountering Distributed denial-of-service (DDoS) attacks. In traditional internet, there is narrow scope of choices one can take when ingress traffic overloads physical connection limits. This paper proposes Firewall as a service in internet service providers (ISP) networks allowing end users to request and install match-action rules in ISPs edge routers. In proposed scenario, ISP runs Software Defined Networking environment where control plane is separated from data plane utilizing OpenFlow protocol and ONOS controller. For interaction between end-users and SDN Controller author defines an Appl…

Firewall (construction)OpenFlowNetwork packetbusiness.industryComputer scienceServerComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSForwarding planeThe InternetDenial-of-service attackSoftware-defined networkingbusinessComputer network2015 IEEE 3rd Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)
researchProduct

Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic

2016

Distributed denial-of-service (DDoS) attacks are one of the most serious threats to today’s high-speed networks. These attacks can quickly incapacitate a targeted business, costing victims millions of dollars in lost revenue and productivity. In this paper, we present a novel method which allows us to timely detect application-layer DDoS attacks that utilize encrypted protocols by applying an anomaly-based approach to statistics extracted from network packets. The method involves construction of a model of normal user behavior with the help of weighted fuzzy clustering. The construction algorithm is self-adaptive and allows one to update the model every time when a new portion of network tr…

Fuzzy clusteringbusiness.industryNetwork securityComputer scienceNetwork packet05 social sciencesDenial-of-service attack02 engineering and technologyIntrusion detection systemEncryption0502 economics and business0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAnomaly detectionActivity-based costingbusiness050203 business & managementComputer network
researchProduct

Smart Grid Security: A new Approach to Detect Intruders in a Smart Grid Neighborhood Area Network

2016

International audience; In this paper, we propose an efficient and lightweight attack detection mechanism for a smart grid Neighborhood Area Network (NAN) that combine between distributed and centralized intrusion detection. A NAN includes the customers' appliances, smart meters and collectors. The smart meters measure the power consumption of each appliance and the collectors aggregate the measures and forward them to the control center for analysis. Intrusion Detection System (IDS) agents, proposed in our framework, run in a distributed fashion at smart meters level and in a centralized fashion at collector and control center nodes. A combination between a rule-based detection and a learn…

Intruder detection[ INFO ] Computer Science [cs]Computer science[SPI] Engineering Sciences [physics][ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Denial-of-service attack02 engineering and technologyIntrusion detection system[INFO] Computer Science [cs]Resource exhaustion0202 electrical engineering electronic engineering information engineering[ SPI ] Engineering Sciences [physics]Neighborhood area networkSmart GridFalse data injection[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industrySmart grid security020208 electrical & electronic engineering020206 networking & telecommunicationsAttackGrid[SPI.TRON] Engineering Sciences [physics]/Electronics[ SPI.TRON ] Engineering Sciences [physics]/ElectronicsSmart gridDoSbusinessEnergy (signal processing)Computer networkEfficient energy use
researchProduct

Impaired Self-Awareness and Denial During the Postacute Phases After Moderate to Severe Traumatic Brain Injury.

2020

While a number of empirical studies have appeared on impaired self-awareness (ISA) after traumatic brain injury (TBI) over the last 20 years, the relative role of denial (as a psychological method of coping) has typically not been addressed in these studies. We propose that this failure has limited our understanding of how ISA and denial differentially affect efforts to rehabilitate persons with TBI. In this selective review paper, we summarize early findings in the field and integrate those findings with more recent observations (i.e., 1999-2019). We believe that this synthesis of information and expert clinical opinion will inform future research on ISA and denial as well as approaches to…

Moderate to severeCoping (psychology)Traumatic brain injurymedia_common.quotation_subjectmedicine.medical_treatmentlcsh:BF1-990Review050105 experimental psychologydenial03 medical and health sciences0302 clinical medicineDenialmedicinePsychology0501 psychology and cognitive sciencesGeneral Psychologyinterventionmedia_commonanosognosiaRehabilitationAnosognosiatraumatic brain injury05 social sciencesmedicine.diseaseimpaired self-awarenesslcsh:PsychologySelf-awarenessPsychology030217 neurology & neurosurgeryClinical psychologyFrontiers in psychology
researchProduct

‘Stars’ or ‘professionals’: the imagined vocation and exclusive knowledge of translators in Israel

2010

Amb l’examen de la professionalització suspesa de l’ocupació traductora a Israel, aquest article estudia dos tipus de discursos d’autopresentació i estratègies d’estatus: d’una banda, els dels traductors literaris, i de l’altra, els dels traductors tècnics, subtituladors i traductors literaris que no pertanyen a l’elit. L’anàlisi del primer grup es fonamenta en diversos centenars d’articles retrat i altres reportatges en els mitjans de comunicació, que situen en primer pla 23 traductors reconeguts, mentre que la del segon grup es basa en resultats provisionals d’entrevistes obertes amb 22 treballadors de la traducció no pertanyents a l’elit (seleccionats a partir d’una mostra més àmplia reu…

Non-elite translatorsLinguistics and LanguageProfessionalizationTraductors -- Israelmedia_common.quotation_subjectArtizationProfessionalization; Artization; Professional identity discourse; Vocation rhetoric; Elite literary translators; Non-elite translatorsArtitzacióAmbivalenceVocation rhetoricProfessionalizationLanguage and LinguisticsEducationDenialRetòrica de vocacióInterimProfessional identity discourseSociologyProfessionalitzacióCompetence (human resources)media_commonCustodiansUNESCO::CIENCIAS DE LAS ARTES Y LAS LETRASDiscurs identitari professionalTraductors aliens a l’elitProfessionalization; Artization; Professional identity discourse; Vocation rhetoric; Elite literary translators; Non-elite translators; rofessionalització; Artització; Discurs identitari profesional; Retòrica de vocació; Traductors literaris d’elit; TraduTraducción e InterpretaciónGender studiesTraductors literaris d’elitVocational educationRhetoric:CIENCIAS DE LAS ARTES Y LAS LETRAS [UNESCO]Elite literary translatorsProfessionalització; Artització; Discurs identitari profesional; Retòrica de vocació; Traductors literaris d’elit; Traductors aliens a l’elit
researchProduct

Validation of the Working Alliance Inventory–Observer Short Version with male intimate partner violence offenders

2018

The working alliance is a key element to increase intimate partner violence (IPV) offenders' motivation, adherence to treatment, and active participation in batterer intervention programs (BIPs). The objective of the present study is to assess the psychometric properties and factor structure of the Working Alliance Inventory-Observer Short Version (WAI-O-S) with a sample of IPV offenders. The sample was 140 men convicted for IPV and court-mandated to a community-based BIP. Inter-rater agreement and reliability were evaluated by computing the intraclass correlation coefficient. To test the latent structure a Bayesian confirmatory factor analysis approach was used. To test criterion-related v…

Original article050103 clinical psychologyObservational descriptive studyIntraclass correlationmedia_common.quotation_subjectProgramas de intervención con maltratadoresAlianza terapéuticaBatterer intervention programsDenial0501 psychology and cognitive sciencesmedia_commonmaltratadoresObservational scaleIntimate partner violence offenders05 social sciencesStage of changeEstudio descriptivo observacionalDeceptionWorking allianceConfirmatory factor analysisClinical PsychologyAllianceEscala observacionalDomestic violenceObservational studyPsychology050104 developmental & child psychologyClinical psychologyInternational Journal of Clinical and Health Psychology
researchProduct

Denied and false pregnancies: Opposite settings of a single evolutionary conflict

2016

Aim: A woman in denial of pregnancy is pregnant but remains unaware of her gravid state. In the case of a false pregnancy; the woman is not pregnant but believes she is and presents signs and symptoms of pregnancy. These syndromes correspond to opposite contradictions that were mainly explored separately. Our aim is to explain them by a common and consistent etiology. Method: We explore internal conflicts inherited from the evolutionary transition from solitary animals to social species. Results: The solitary and social characters are contradictory. They induce internal conflicts intrinsic to the human condition. At the reproduction level, those conflicts oppose primitive interests (genes t…

Pregnancymedia_common.quotation_subjectIdentity (social science)Human conditionmedicine.diseaseDevelopmental psychologyDenialmedicineContradictionFalse pregnancySocial identity theoryPsychologySocial psychologyInternal conflictmedia_common
researchProduct

Domain Generation Algorithm Detection Using Machine Learning Methods

2018

A botnet is a network of private computers infected with malicious software and controlled as a group without the knowledge of the owners. Botnets are used by cybercriminals for various malicious activities, such as stealing sensitive data, sending spam, launching Distributed Denial of Service (DDoS) attacks, etc. A Command and Control (C&C) server sends commands to the compromised hosts to execute those malicious activities. In order to avoid detection, recent botnets such as Conficker, Zeus, and Cryptolocker apply a technique called Domain-Fluxing or Domain Name Generation Algorithms (DGA), in which the infected bot periodically generates and tries to resolve a large number of pseudorando…

Pseudorandom number generatorDomain generation algorithmAlphanumericComputer sciencebusiness.industryDomain Name SystemComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBotnetDenial-of-service attackMachine learningcomputer.software_genreComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSCryptoLockerMalwareArtificial intelligencebusinesscomputer
researchProduct

Hume on the Phenomenological Discovery of the Self

1993

This paper presents a synthesis of my research into the problem of the self in Hume. The copious bibliography available on this topic indicates that the subject I suggest to discuss is problematic but also of crucial interest. I propose to develop the following argument, namely, that there exists in Hume a psychological awareness of the self. There is no incompatibility between the denial of personal identity in A Treatise of Human Nature Book I, and the arguments put forward in Book II Of the Passions, and in Book III, Of the Understanding of Morals. I shall maintain that Hume is not elaborating an ontological but a psychological theory of the self. This represents a new departure with reg…

PsychoanalysisDenialArgumentMind–body problemIdentity (philosophy)media_common.quotation_subjectSelfPersonal identitySubject (philosophy)PassionsPsychologymedia_commonEpistemology
researchProduct