Search results for "Denial"

showing 10 items of 54 documents

Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall

2016

Algorithmic complexity vulnerabilities are an opportunity for an ad-versary to conduct a sophisticated kind of attack i.e. on network infrastructure services. Such attacks take advantage of worst case time or space complexity of algorithms implemented on devices in their software. In this paper we address potential risks introduced by such algorithmic behavior in computer networks in particular on a stateful firewall. First we introduce the idea and theoretical background for the attack. We then describe in full detail a successfully con-ducted attack which takes advantage of the worst case computational complexi-ty of O(n2) of a hash table data structure used to store active sessions. The …

RouterComputer sciencenetwork vulnerabilitiesDenial-of-service attack02 engineering and technologyNetwork topologyComputer securitycomputer.software_genreFirewall (construction)Stateful firewall0202 electrical engineering electronic engineering information engineeringDenial of Servicecomplexity attackcomputational complexitybusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsHash tablese-curitycomputer networksDoSbusinessSegmentation faultcomputerRebootComputer network
researchProduct

Socially desirable responding:enhancement and denial in 20 countries

2015

This article investigated the dimensionality, measurement invariance, and cross-cultural variations of social desirability. A total of 3,471 university students from 20 countries completed an adapted version of the Marlowe–Crowne scale. A two-dimensional structure was revealed in the pooled sample, distinguishing enhancement (endorsement of positive self-description) and denial (rejection of negative self-description). The factor structure was supported in most countries; medium-sized item bias was found in two denial items. In a multilevel analysis, we found that (a) there was more cross-cultural variation in denial than enhancement; (b) females tended to score higher on enhancement where…

SUBSTANCEmedia_common.quotation_subjectSocioeconomic developmentSHORT FORMSbehavioral disciplines and activitiesSTYLEDenialArts and Humanities (miscellaneous)social desirability:Psychology [Social sciences]mental disorders:Psicologia [Ciências sociais]valuesPersonalityPsychologyMeasurement invarianceHuman Development IndexSCALEMETAANALYSISmedia_commonMultilevel modelcultureshumanitiesPsicologiaImpression managementpersonalityAnthropologyScale (social sciences)IMPRESSION MANAGEMENTmultilevel analysisPERSONALITY-TRAITSPsychology (miscellaneous)EQUIVALENCEORIENTATIONPsychologyBALANCED INVENTORYSocial psychology
researchProduct

Halitosis: a stomatological and psychological issue.

2009

It can be stated that halitosis is located on the ridge connecting dentistry, oral medicine, parodontology and psychology. It represents, at the same time, the manifestation of an organic malfunctioning of the oral apparatus, and a problematic element for the individual and his/her relational life. A smelly emanation comes into conflict with the wish to attract, to please, to seduce. The attitudes towards the possibility to suffer from bad breath have two typical opposite expressions, which share the common characteristic that many are bad judges of one's own breath. The dentist, in fact, is frequently involved in the management of patients who believe they have bad breath problems, which i…

Settore MED/28 - Malattie OdontostomatologicheSurveys and Questionnaireshalitosis diagnosisHumansDenial PsychologicalInterpersonal RelationsHalitosisAttitude to HealthDentist-Patient Relations
researchProduct

How connected are the major forms of irrationality? : an analysis of pseudoscience, science denial, fact resistance and alternative facts

2017

Science is a fact-finding practice, but there are many other fact-finding practices that apply largely the same patterns of reasoning in order to achieve as reliable information as possible in empirical issues. The fact-finding practices form in their turn a subcategory of rational discourse, a wider category that also encompasses argumentation on non-empirical issues. Based on these categories, it is easy to see the relationship between on the one hand pseudoscience, on the other hand fact resistance, disinformation, and fallacies of reasoning. The flaws in argumentation are similar, and the main difference is whether or not the subject matter falls within or without the realm of science.

SubcategoryMultidisciplinary010504 meteorology & atmospheric sciencesmedia_common.quotation_subject05 social sciencesPseudoscienceIrrationalityResistance (psychoanalysis)050905 science studies01 natural sciencesArgumentation theoryEpistemologyDenialHistory and Philosophy of ScienceRealmDisinformationSociology0509 other social sciences0105 earth and related environmental sciencesmedia_common
researchProduct

‘My Language! Heavens!’: Strange Tongues and the Denial of Mimesis in The Tempest

2008

The Tempest est la dernière pièce « italienne » de Shakespeare. Cet article se penche sur quelques unes des conséquences poétiques et métaphysiques de la convention qui consiste à faire correspondre l’anglais de la pièce à l’italien que sont sensés parler les personnages. Nous montrerons que cette convention est un paramètre essentiel de l’action dramatique et qu’elle contribue à la mise en évidence du caractère fondamentalement « Autre » de la langue du théâtre. Dans The Tempest, l’imbrication d’une langue inconnue et d’une langue familière débouche par métonymie et par métaphore sur un déni du principe classique de mimesis.

TranslationTempest[SHS.LITT]Humanities and Social Sciences/LiteratureShakespearemedia_common.quotation_subjectArt historySocial SciencesArt[ SHS.LITT ] Humanities and Social Sciences/Literature[SHS.LITT] Humanities and Social Sciences/LiteratureHDenialGeneral Earth and Planetary SciencesSemioticsTempestHumanitiesSemioticsComputingMilieux_MISCELLANEOUSGeneral Environmental Sciencemedia_commonLanguage
researchProduct

Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol

2015

Denial of Service attacks remain one of the most serious threats to the Internet nowadays. In this study, we propose an algorithm for detection of Denial of Service attacks that utilize SSL/TLS protocol. These protocols encrypt the data of network connections on the application layer which makes it impossible to detect attackers activity based on the analysis of packet payload. For this reason, we concentrate on statistics that can be extracted from packet headers. Based on these statistics, we build a model of normal user behavior by using several data mining algorithms. Once the model has been built, it is used to detect DoS attacks. The proposed framework is tested on the data obtained w…

Transport Layer SecurityNetwork securitybusiness.industryNetwork packetComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSDenial-of-service attackIntrusion detection systemcomputer.software_genreApplication layerAnomaly detectionThe InternetData miningbusinesscomputerComputer network
researchProduct

Censura 2.0 y Holocausto: el control de contenidos y su impacto en la imagen transnacional del genocidio nazi

2015

En los sistemas democráticos que imperan en occidente, la censura stricto sensu está prohibida. Sin embargo, la revolución digital ha impulsado la aprobación de normas para la supervisión, el filtrado y el bloqueo de contenido que restringen la difusión de información. El proceso es singularmente alarmante cuando opera por medio de la traducción, ya que es en ella en quien, en un mundo cada vez más globalizado, recae la responsabilidad de materializar el contacto entre culturas. Partiendo de los conflictos que crean las diferentes leyes que criminalizan la negación del Holocausto, analizaremos el impacto del control de contenidos en la imagen transnacional del hecho histórico, que varía en …

UNESCO::CIENCIAS DE LAS ARTES Y LAS LETRASTraducciónTranslationLinguistics and LanguageLiterature and Literary TheoryHolocaustCensuraCensorshipLanguage and LinguisticsDenialMemoryHolocausto:CIENCIAS DE LAS ARTES Y LAS LETRAS [UNESCO]MemoriaPhilologyNegacionismoFilologíaQuaderns de Filologia - Estudis Literaris
researchProduct

Data Stream Clustering for Application-Layer DDoS Detection in Encrypted Traffic

2018

Application-layer distributed denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks can be performed using legitimate requests from legitimately connected network machines that make these attacks undetectable by signature-based intrusion detection systems. Moreover, the attacks may utilize protocols that encrypt the data of network connections in the application layer, making it even harder to detect an attacker’s activity without decrypting users’ network traffic, and therefore violating their privacy. In this paper, we present a method that allows us to detect various application-l…

Web serverbusiness.industryComputer scienceNetwork packetDenial-of-service attackIntrusion detection systemEncryptioncomputer.software_genreApplication layerData stream clusteringbusinesscomputerVirtual networkComputer network
researchProduct

Déni du travail et tyrannie des normes

2012

Based on the example of two quality processes deployed at the SNCF in the field of the service encounter, the aim of this article is to explore, from a clinical point of view, organizational mechanisms which encourage the denial of work. The norms of services previously defined contributed to the front office agents' denial of work, essentially because the respect of these norms became an ultimate finality. This situation has induced an "annoyed activity" (CLOT, 2009) among the front office agents, owing to the fact that the norms have been perceived as a hindrance to the accomplishment of a high-grade work. In the two previous practical examples, the reality (of work), the real work (in op…

[SHS.SOCIO]Humanities and Social Sciences/Sociology[SHS.SOCIO] Humanities and Social Sciences/Sociologynorms of servicesJEL : M - Business Administration and Business Economics • Marketing • Accounting • Personnel Economics/M.M1 - Business Administration/M.M1.M12 - Personnel Management • Executives; Executive CompensationJEL: M - Business Administration and Business Economics • Marketing • Accounting • Personnel Economics/M.M1 - Business Administration/M.M1.M14 - Corporate Culture • Diversity • Social ResponsibilityJEL : M - Business Administration and Business Economics • Marketing • Accounting • Personnel Economics/M.M1 - Business Administration/M.M1.M14 - Corporate Culture • Diversity • Social Responsibility[SHS.PSY]Humanities and Social Sciences/Psychology[ SHS.SOCIO ] Humanities and Social Sciences/Sociologyservice encounter.JEL: M - Business Administration and Business Economics • Marketing • Accounting • Personnel Economics/M.M1 - Business Administration/M.M1.M12 - Personnel Management • Executives; Executive Compensation"real of work"[SHS.PSY] Humanities and Social Sciences/Psychology[ SHS.PSY ] Humanities and Social Sciences/Psychologydéni du travaildenial of work"real of work"norms of servicesservice encounter.déni du travail" réel du travail "normes de servicerelation de service.denial of work" réel du travail "[SHS.GESTION]Humanities and Social Sciences/Business administrationrelation de service.[ SHS.GESTION ] Humanities and Social Sciences/Business administration[SHS.GESTION] Humanities and Social Sciences/Business administrationnormes de service
researchProduct

Distributed denial-of-service attacks in the Internet

2005

automated intrusion agentInternetclassificationdenial-of-serviceconcept definitionstietoturvatietoverkotcomputer security
researchProduct