Search results for "Denial"
showing 10 items of 54 documents
Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall
2016
Algorithmic complexity vulnerabilities are an opportunity for an ad-versary to conduct a sophisticated kind of attack i.e. on network infrastructure services. Such attacks take advantage of worst case time or space complexity of algorithms implemented on devices in their software. In this paper we address potential risks introduced by such algorithmic behavior in computer networks in particular on a stateful firewall. First we introduce the idea and theoretical background for the attack. We then describe in full detail a successfully con-ducted attack which takes advantage of the worst case computational complexi-ty of O(n2) of a hash table data structure used to store active sessions. The …
Socially desirable responding:enhancement and denial in 20 countries
2015
This article investigated the dimensionality, measurement invariance, and cross-cultural variations of social desirability. A total of 3,471 university students from 20 countries completed an adapted version of the Marlowe–Crowne scale. A two-dimensional structure was revealed in the pooled sample, distinguishing enhancement (endorsement of positive self-description) and denial (rejection of negative self-description). The factor structure was supported in most countries; medium-sized item bias was found in two denial items. In a multilevel analysis, we found that (a) there was more cross-cultural variation in denial than enhancement; (b) females tended to score higher on enhancement where…
Halitosis: a stomatological and psychological issue.
2009
It can be stated that halitosis is located on the ridge connecting dentistry, oral medicine, parodontology and psychology. It represents, at the same time, the manifestation of an organic malfunctioning of the oral apparatus, and a problematic element for the individual and his/her relational life. A smelly emanation comes into conflict with the wish to attract, to please, to seduce. The attitudes towards the possibility to suffer from bad breath have two typical opposite expressions, which share the common characteristic that many are bad judges of one's own breath. The dentist, in fact, is frequently involved in the management of patients who believe they have bad breath problems, which i…
How connected are the major forms of irrationality? : an analysis of pseudoscience, science denial, fact resistance and alternative facts
2017
Science is a fact-finding practice, but there are many other fact-finding practices that apply largely the same patterns of reasoning in order to achieve as reliable information as possible in empirical issues. The fact-finding practices form in their turn a subcategory of rational discourse, a wider category that also encompasses argumentation on non-empirical issues. Based on these categories, it is easy to see the relationship between on the one hand pseudoscience, on the other hand fact resistance, disinformation, and fallacies of reasoning. The flaws in argumentation are similar, and the main difference is whether or not the subject matter falls within or without the realm of science.
‘My Language! Heavens!’: Strange Tongues and the Denial of Mimesis in The Tempest
2008
The Tempest est la dernière pièce « italienne » de Shakespeare. Cet article se penche sur quelques unes des conséquences poétiques et métaphysiques de la convention qui consiste à faire correspondre l’anglais de la pièce à l’italien que sont sensés parler les personnages. Nous montrerons que cette convention est un paramètre essentiel de l’action dramatique et qu’elle contribue à la mise en évidence du caractère fondamentalement « Autre » de la langue du théâtre. Dans The Tempest, l’imbrication d’une langue inconnue et d’une langue familière débouche par métonymie et par métaphore sur un déni du principe classique de mimesis.
Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol
2015
Denial of Service attacks remain one of the most serious threats to the Internet nowadays. In this study, we propose an algorithm for detection of Denial of Service attacks that utilize SSL/TLS protocol. These protocols encrypt the data of network connections on the application layer which makes it impossible to detect attackers activity based on the analysis of packet payload. For this reason, we concentrate on statistics that can be extracted from packet headers. Based on these statistics, we build a model of normal user behavior by using several data mining algorithms. Once the model has been built, it is used to detect DoS attacks. The proposed framework is tested on the data obtained w…
Censura 2.0 y Holocausto: el control de contenidos y su impacto en la imagen transnacional del genocidio nazi
2015
En los sistemas democráticos que imperan en occidente, la censura stricto sensu está prohibida. Sin embargo, la revolución digital ha impulsado la aprobación de normas para la supervisión, el filtrado y el bloqueo de contenido que restringen la difusión de información. El proceso es singularmente alarmante cuando opera por medio de la traducción, ya que es en ella en quien, en un mundo cada vez más globalizado, recae la responsabilidad de materializar el contacto entre culturas. Partiendo de los conflictos que crean las diferentes leyes que criminalizan la negación del Holocausto, analizaremos el impacto del control de contenidos en la imagen transnacional del hecho histórico, que varía en …
Data Stream Clustering for Application-Layer DDoS Detection in Encrypted Traffic
2018
Application-layer distributed denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks can be performed using legitimate requests from legitimately connected network machines that make these attacks undetectable by signature-based intrusion detection systems. Moreover, the attacks may utilize protocols that encrypt the data of network connections in the application layer, making it even harder to detect an attacker’s activity without decrypting users’ network traffic, and therefore violating their privacy. In this paper, we present a method that allows us to detect various application-l…
Déni du travail et tyrannie des normes
2012
Based on the example of two quality processes deployed at the SNCF in the field of the service encounter, the aim of this article is to explore, from a clinical point of view, organizational mechanisms which encourage the denial of work. The norms of services previously defined contributed to the front office agents' denial of work, essentially because the respect of these norms became an ultimate finality. This situation has induced an "annoyed activity" (CLOT, 2009) among the front office agents, owing to the fact that the norms have been perceived as a hindrance to the accomplishment of a high-grade work. In the two previous practical examples, the reality (of work), the real work (in op…