Search results for "Intrusion"
showing 10 items of 159 documents
E-advertising Formats and Intrusion Perceived
2013
E-advertising Formats and Intrusion Perceived Abstract : The aim of this paper is firstly to define intrusive advertising based on marketing and in psychology literature. We identify the elements favoring the intrusion perceived as well as the intrusive attributes of the formats of advertising. We also envisage the consequences of the intrusion perceived for the main actors of the publicity.
Decision-cache based XACML authorisation and anonymisation for XML documents
2012
Author's version of an article in the journal: Computer Standards and Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.10.007 This paper describes a decision cache for the eXtensible Access Control Markup Language (XACML) that supports fine-grained authorisation and anonymisation of XML based messages and documents down to XML attribute and element level. The decision cache is implemented as an XACML obligation service, where a specification of the XML elements to be authorised and anonymised is sent to the Policy Enforcement Point (PEP) during initial authorisation. Further authorisation of individual XML elements according to the authorisation specifi…
Distributed denial-of-service attacks in the Internet
2005
Belief reports and pragmatic intrusion: the case of null appositives. Journal of Pragmatics 40 (2008), 1019-1040.
2008
Factors Affecting Interspecific Aggression in a Year-Round Territorial Species, the Jewel Damselfish
2012
Vertebrates live in complex species networks in which interspecific interactions are common. In some contexts, the aggressive behaviours shown in these interspecific interactions are very similar to those shown in intraspecific interactions. It is still an open question whether intra- and interspecific aggression share common causality. We studied a year-round territorial species the jewel damselfish, (Plectroglyphidodon lacrymatus), which cultivate algae they feed on. Territory holders aggressively defend these algae that are an attractive resource for many other species. In this study, we recorded territorial aggression in free-living individuals and recorded aggressive responses to a sta…
Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets
2021
International audience; With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article co…
Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context
2010
Published version of an article from the journal: Wireless Personal Communications. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11277-010-0069-6 The paper proposes a location-aware mobile Intrusion Prevention System (mIPS) architecture with enhanced privacy that is integrated in Managed Security Service (MSS). The solution is envisaged in a future fifth generation telecommunications (5G) context with increased but varying bandwidth, a virtualised execution environment and infrastructure that allows threads, processes, virtual machines and storage to be migrated to cloud computing services on demand, to dynamically scale performance and save power. 5G mob…
A novel method for network intrusion detection based on nonlinear SNE and SVM
2017
In the case of network intrusion detection data, pre-processing techniques have been extensively used to enhance the accuracy of the model. An ideal intrusion detection system (IDS) is one that has appreciable detection capability overall the group of attacks. An open research problem of this area is the lower detection rate for less frequent attacks, which result from the curse of dimensionality and imbalanced class distribution of the benchmark datasets. This work attempts to minimise the effects of imbalanced class distribution by applying random under-sampling of the majority classes and SMOTE-based oversampling of minority classes. In order to alleviate the issue arising from the curse…
Theory of mercury intrusion in a distribution of unconnected wedge-shaped slits
2004
Effective mercury intrusion in a wedge-shaped slit is gradual, the intruded depth increasing with applied pressure. The Washburn equation must be modified accordingly. It relates the distance, e, separating the three-phase contact lines on the wedge faces to the hydrostatic pressure, P, wedge half-opening angle alpha, mercury surface tension gamma, and contact angle theta: e=(-2gamma/P)cos(theta-alpha) if theta-alpha>pi2. The equations relating the volume of mercury in a single slit to hydrostatic pressure are established. The total volume of mercury V(Hg)(tot)(E(0),e) intruded in a set of unconnected isomorphous slits (same alpha value) with opening width, E, distributed over interval [E(0…
L'INFLUENCE DE L'INTRUSION PERÇUE SUR LES COMPORTEMENTS DE RÉSISTANCE AUX FORMATS DE PUBLICITÉ SUR INTERNET
2012
Drawing from the theoretical framework defined by Roux (2007), this research examines the relationship between perceived advertising intrusion (Anzieu, 1994) and manifestations of consumer resistance (Hirschman, 1970). The results show that the intrusion does not significantly affect the expression or intention to return to the website. However, it influences positively defection and negatively purchase intention of the product promoted in the ad.