Search results for "Intrusion"

showing 10 items of 159 documents

E-advertising Formats and Intrusion Perceived

2013

E-advertising Formats and Intrusion Perceived Abstract : The aim of this paper is firstly to define intrusive advertising based on marketing and in psychology literature. We identify the elements favoring the intrusion perceived as well as the intrusive attributes of the formats of advertising. We also envisage the consequences of the intrusion perceived for the main actors of the publicity.

[SHS.STAT]Humanities and Social Sciences/Methods and statisticsintrusive advertisingformat de publicité[SHS.PSY]Humanities and Social Sciences/Psychologyintrusion publicitaire[SHS.PSY] Humanities and Social Sciences/Psychology[ SHS.PSY ] Humanities and Social Sciences/Psychology[SHS.STAT] Humanities and Social Sciences/Methods and statistics[SHS.GESTION]Humanities and Social Sciences/Business administrationinternetadvertising formats[SHS.GESTION] Humanities and Social Sciences/Business administration[ SHS.GESTION ] Humanities and Social Sciences/Business administration[ SHS.STAT ] Humanities and Social Sciences/Methods and statistics
researchProduct

Decision-cache based XACML authorisation and anonymisation for XML documents

2012

Author's version of an article in the journal: Computer Standards and Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.10.007 This paper describes a decision cache for the eXtensible Access Control Markup Language (XACML) that supports fine-grained authorisation and anonymisation of XML based messages and documents down to XML attribute and element level. The decision cache is implemented as an XACML obligation service, where a specification of the XML elements to be authorised and anonymised is sent to the Policy Enforcement Point (PEP) during initial authorisation. Further authorisation of individual XML elements according to the authorisation specifi…

authorisationSoftware_OPERATINGSYSTEMSMarkup languageComputer sciencecomputer.internet_protocolXACMLAccess controlIntrusion detection systemcomputer.software_genrecachingXACMLcomputer.programming_languageanonymisationVDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424AuthenticationDatabasebusiness.industryComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSHardware and ArchitectureCacheprivacy policyWeb servicebusinessLawcomputerSoftwareXMLComputer Standards & Interfaces
researchProduct

Distributed denial-of-service attacks in the Internet

2005

automated intrusion agentInternetclassificationdenial-of-serviceconcept definitionstietoturvatietoverkotcomputer security
researchProduct

Belief reports and pragmatic intrusion: the case of null appositives. Journal of Pragmatics 40 (2008), 1019-1040.

2008

belief reports pragmatic intrusion null appositives opacity knowing howSettore M-FIL/05 - Filosofia E Teoria Dei Linguaggi
researchProduct

Factors Affecting Interspecific Aggression in a Year-Round Territorial Species, the Jewel Damselfish

2012

Vertebrates live in complex species networks in which interspecific interactions are common. In some contexts, the aggressive behaviours shown in these interspecific interactions are very similar to those shown in intraspecific interactions. It is still an open question whether intra- and interspecific aggression share common causality. We studied a year-round territorial species the jewel damselfish, (Plectroglyphidodon lacrymatus), which cultivate algae they feed on. Territory holders aggressively defend these algae that are an attractive resource for many other species. In this study, we recorded territorial aggression in free-living individuals and recorded aggressive responses to a sta…

biologyAggressionEcologyInterspecific competitionbiology.organism_classificationPlectroglyphidodon lacrymatusIntraspecific competitionIntrusionCommon speciesTerritorial aggressionmedicineAnimal Science and Zoologymedicine.symptomDamselfishEcology Evolution Behavior and SystematicsEthology
researchProduct

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

2021

International audience; With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article co…

business.industryComputer scienceAnomaly (natural sciences)020206 networking & telecommunications02 engineering and technologyIntrusion detection system[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Computer securitycomputer.software_genre[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe Internet[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Electrical and Electronic Engineering[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businesscomputer
researchProduct

Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context

2010

Published version of an article from the journal: Wireless Personal Communications. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11277-010-0069-6 The paper proposes a location-aware mobile Intrusion Prevention System (mIPS) architecture with enhanced privacy that is integrated in Managed Security Service (MSS). The solution is envisaged in a future fifth generation telecommunications (5G) context with increased but varying bandwidth, a virtualised execution environment and infrastructure that allows threads, processes, virtual machines and storage to be migrated to cloud computing services on demand, to dynamically scale performance and save power. 5G mob…

business.industryComputer scienceVDP::Technology: 500::Information and communication technology: 550Context (language use)Cloud computingIntrusion detection systemManaged security servicecomputer.software_genreComputer securityComputer Science ApplicationsInformation sensitivityVirtual machineMalwareElectrical and Electronic EngineeringIntrusion prevention systembusinesscomputerMobile deviceComputer networkWireless Personal Communications
researchProduct

A novel method for network intrusion detection based on nonlinear SNE and SVM

2017

In the case of network intrusion detection data, pre-processing techniques have been extensively used to enhance the accuracy of the model. An ideal intrusion detection system (IDS) is one that has appreciable detection capability overall the group of attacks. An open research problem of this area is the lower detection rate for less frequent attacks, which result from the curse of dimensionality and imbalanced class distribution of the benchmark datasets. This work attempts to minimise the effects of imbalanced class distribution by applying random under-sampling of the majority classes and SMOTE-based oversampling of minority classes. In order to alleviate the issue arising from the curse…

business.industryComputer science[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingDimensionality reductionFeature vectorPattern recognitionGeneral MedicineIntrusion detection systemSupport vector machineBenchmark (computing)EmbeddingRadial basis functionArtificial intelligencebusinessCurse of dimensionality
researchProduct

Theory of mercury intrusion in a distribution of unconnected wedge-shaped slits

2004

Effective mercury intrusion in a wedge-shaped slit is gradual, the intruded depth increasing with applied pressure. The Washburn equation must be modified accordingly. It relates the distance, e, separating the three-phase contact lines on the wedge faces to the hydrostatic pressure, P, wedge half-opening angle alpha, mercury surface tension gamma, and contact angle theta: e=(-2gamma/P)cos(theta-alpha) if theta-alpha>pi2. The equations relating the volume of mercury in a single slit to hydrostatic pressure are established. The total volume of mercury V(Hg)(tot)(E(0),e) intruded in a set of unconnected isomorphous slits (same alpha value) with opening width, E, distributed over interval [E(0…

business.industryHydrostatic pressurechemistry.chemical_elementGeometryPorosimetrySurfaces Coatings and FilmsElectronic Optical and Magnetic MaterialsMercury (element)BiomaterialsContact angleSurface tensionColloid and Surface ChemistryOpticschemistryTransition metalWashburn's equationMercury intrusionbusinessJournal of Colloid and Interface Science
researchProduct

L'INFLUENCE DE L'INTRUSION PERÇUE SUR LES COMPORTEMENTS DE RÉSISTANCE AUX FORMATS DE PUBLICITÉ SUR INTERNET

2012

Drawing from the theoretical framework defined by Roux (2007), this research examines the relationship between perceived advertising intrusion (Anzieu, 1994) and manifestations of consumer resistance (Hirschman, 1970). The results show that the intrusion does not significantly affect the expression or intention to return to the website. However, it influences positively defection and negatively purchase intention of the product promoted in the ad.

consumer resistance[SHS.STAT]Humanities and Social Sciences/Methods and statistics[SHS.PSY]Humanities and Social Sciences/Psychologyintrusion publicitaire[SHS.PSY] Humanities and Social Sciences/Psychology[ SHS.PSY ] Humanities and Social Sciences/Psychologyintrusion perceivedrésistance du consommateur[SHS.STAT] Humanities and Social Sciences/Methods and statistics[SHS.GESTION]Humanities and Social Sciences/Business administrationinternet[ SHS.GESTION ] Humanities and Social Sciences/Business administration[SHS.GESTION] Humanities and Social Sciences/Business administration[ SHS.STAT ] Humanities and Social Sciences/Methods and statisticsadvertisingpublicité
researchProduct