Littérature scientifique sur le sujet « ILLEGITIMATE SERVER »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « ILLEGITIMATE SERVER ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "ILLEGITIMATE SERVER"

1

Jan, Saeed Ullah, et Fawad Qayum. « A Robust Authentication Scheme for Client-Server Architecture With Provable Security Analysis ». Network and Communication Technologies 3, no 1 (26 avril 2018) : 6. http://dx.doi.org/10.5539/nct.v3n1p6.

Texte intégral
Résumé :
Client-server computing is the analytical development of compatible programming with significant supposition and the detachment of a massive program into its fundamental parts ("modules"), which can create the chance for extra enhancement, inconsiderable improvement, and prominent maintainability. In client-server computing, total extensive modules don't need to be accomplished within the similar memory space totally but can execute independently on a suitable hardware and software platform according to their behavior. The user authentication is the dominant constraint for client-server computing that limits the illegitimate right of entry into the main workstation. This research is mainly focused on the design of a robust authentication scheme for client-server architecture computing. It carries some additional features like security, virtualization, user's programs security, individuality supervision, integrity, control access to server and authentication. The proposed background also delivers the characteristic supervision, mutual authentication, and establishment of secure session key among users and the remote server.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Razaque, Abdul, et Khaled Elleithy. « Controlling Attacks of Rogue Dynamic Host Configuration Protocol (DHCP) to Improve Pedagogical Activities in Mobile Collaborative Learning (MCL) Environment ». Journal of Communications and Computer Engineering 3, no 1 (13 octobre 2012) : 15. http://dx.doi.org/10.20454/jcce.2013.426.

Texte intégral
Résumé :
Mobile collaborative learning (MCL) is extremely recognized as focusing archetype in educational institutions. It demonstrates cerebral synergy of assorted collective minds. It handles several problems in order to motivate social activity for mutual communication. To advance and promote baseline for MCL; several supporting frameworks, architectures including number of different mobile applications have been introduced. But, no one has mainly focused to augment the security of those architectures. The paper handles issues of rogue DHCP server that highly affects network resources during MCL. The rogue DHCP is illegal server that issues the fake IP address to users for sniffing the legal traffic. This contribution specially targets the malicuius attacks that weaken the security of mobile supported collaborative framework (MSCF). The paper introduces multi-frame signature-cum anomaly-based intrusion detection system (MSAIDS) that blocks an unlawful behavior of rogue DHCP server. This novel security method emphasize confidence of users and secures also network from illegitimate interference of rogue DHCP server. Finally, paper confirms scheme through simulations. The simulations comrises of testbed, ns2 and discrete simulation.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Brindha, K., et N. Jeyanthi. « Secured Document Sharing Using Visual Cryptography in Cloud Data Storage ». Cybernetics and Information Technologies 15, no 4 (1 novembre 2015) : 111–23. http://dx.doi.org/10.1515/cait-2015-0058.

Texte intégral
Résumé :
Abstract Security has emerged as the most concerned aspect of cloud computing environment and a prime challenge for the cloud users. The stored data can be retrieved by the user whenever and wherever required. But there is no guarantee that the data stored in the cloud server has not been accessed by any unauthorized user. The current cloud framework does not allow encrypted data to be stored due to the space and storage cost. Storing secret data in an unencrypted form is vulnerable to external attacks by both illegitimate customers and a Cloud Service Provider (CSP). Traditional encryption techniques require more computation and storage space. Hence, protecting cloud data with minimal computations is the prime task. Secured Document Sharing Using Visual Cryptography (SDSUVC) technique proposes an efficient storage scheme in a cloud for storing and retrieving a document file without any mathematical computations and also ensures data confidentiality and integrity.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Chao, Han-Chieh, Hsin-Te Wu et Fan-Hsun Tseng. « AIS Meets IoT : A Network Security Mechanism of Sustainable Marine Resource Based on Edge Computing ». Sustainability 13, no 6 (10 mars 2021) : 3048. http://dx.doi.org/10.3390/su13063048.

Texte intégral
Résumé :
The sustainable utilization of marine resources is a vital issue to enrich marine life and to prevent species extinction caused by overfishing. Nowadays, it is common that commercial and smaller vessels are equipped with an Automatic Identification System (AIS) and GPS for better vessel tracking to avoid vessel collision as well as mayday calls. Additionally, governments can monitor vessels’ sea activities through AIS messages, stopping them from overfishing or tracking if any vessel has caused marine pollution. However, because AIS devices cannot guarantee data security, they are susceptible to malicious attacks such as message modification or an illegitimate identity faking a distress signal that causes other vessels to change their course. Given the above, a comprehensive network security system of a sustainable marine environment should be proposed to ensure secure communication. In this paper, a stationary IoT-enabled (Internet of Things) vessel tracking system of a sustainable marine environment is proposed. The system combines network security, edge computing, and tracking management. It offers the following functions: (1) The IoT-based vessel tracking system tracks each aquafarmer’s farming zone and issues periodic warning to prevent vessel collision for pursuing a sustainable marine environment; (2) the system can serve as a relay station that evaluates whether a vessel’s AIS data is correct; (3) the system detects abnormal behavior and any irregular information to law enforcement; (4) the system’s network security mechanism adopts a group key approach to ensure secure communication between vessels; and (5) the proposed edge computing mechanism enables the tracking system to perform message authentication and analysis, and to reduce computational burden for the remote or cloud server. Experiment results indicate that our proposed system is feasible, secure, and sustainable for the marine environment, and the tendered network security mechanism can reduce the computational burden while still ensuring security.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Haruna, Saibu Aliyu, Raphael Olufemi Akinyede et Boyinbode Olutayo Kehinde. « NEURO-FUZZY DATA MINING SYSTEM FOR IDENTIFYING E-COMMERCE RELATED THREATS ». MALAYSIAN JOURNAL OF COMPUTING 5, no 2 (9 septembre 2020) : 537. http://dx.doi.org/10.24191/mjoc.v5i2.8642.

Texte intégral
Résumé :
E-commerce is driven via Information Technology (IT) especially the web it mostly relies upon on innovative technologies that are facilitated by Electronic Data Interchange (EDI) and Electronic Payment over the web. Several researches have shown that e-commerce platforms are compromised by means of phishing and fraud attacks. This has necessitated trying to find innovative methodologies for defending e-commerce systems and users from the said threats. This research integrates Case Based Reasoning (CBR) and Adaptive Neuro-Fuzzy Inference System (ANFIS) to spot and categorise e-commerce websites transactions as legitimate or illegitimate by analyzing and evaluating some attributes. this may provide an invulnerable platforms for e-commerce users. The system, which was implemented on MATLAB, are often deployed on e-commerce systems and servers to watch e-commerce requests with the aim of identifying legitimate and illegitimate websites and transactions. The results of the implementation indicates that the machine is promising.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Periyasamy, A. R. Pon. « Security Issues of Firewall ». International Journal of Advanced Research in Computer Science and Software Engineering 7, no 7 (30 juillet 2017) : 455. http://dx.doi.org/10.23956/ijarcsse/v7i4/0208.

Texte intégral
Résumé :
The need of Network Security is accelerating at the same pace as that of increased Internet usage. Network Security prevents from illegitimate admittance, hacking andauthentic data transportation. Network Security consist of provisions and policies adopted by a network administrator to preclude and monitor unauthorized access, alterations, perversion, declination of a computer network and network-accessible resources. Network Security is achieved by Firewall. Firewall is a hardware or software device which is designed to permit or refuse network transmissions based upon certain protocols. Firewall is a locus at the endpoints of the system which strains out all illegitimate traffic and users. But conventional or traditional firewalls rely stricly on the restricted topology and restrained entry points to function; which results in difficulty in filtering certain protocols, end-to-end encryption problem etc. Hence, it resulted in the evolution of Distributed Firewall which strengthens the network security policies without delimitating its topology from inside or outside. Distributed Firewall is a host-resident security software application that protects the enterprise network’s servers and end-user machines against unwanted intrusion. This paper is a literature review paper focusing on traditional firewalls, it evolution, security issues various policies and the concept of distributed firewall.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Razaque, Abdul, Nazerke Shaldanbayeva, Bandar Alotaibi, Munif Alotaibi, Akhmetov Murat et Aziz Alotaibi. « Big Data Handling Approach for Unauthorized Cloud Computing Access ». Electronics 11, no 1 (3 janvier 2022) : 137. http://dx.doi.org/10.3390/electronics11010137.

Texte intégral
Résumé :
Nowadays, cloud computing is one of the important and rapidly growing services; its capabilities and applications have been extended to various areas of life. Cloud computing systems face many security issues, such as scalability, integrity, confidentiality, unauthorized access, etc. An illegitimate intruder may gain access to a sensitive cloud computing system and use the data for inappropriate purposes, which may lead to losses in business or system damage. This paper proposes a hybrid unauthorized data handling (HUDH) scheme for big data in cloud computing. The HUDH scheme aims to restrict illegitimate users from accessing the cloud and to provide data security provisions. The proposed HUDH consists of three steps: data encryption, data access, and intrusion detection. The HUDH scheme involves three algorithms: advanced encryption standards (AES) for encryption, attribute-based access control (ABAC) for data access control, and hybrid intrusion detection (HID) for unauthorized access detection. The proposed scheme is implemented using the Python and Java languages. The testing results demonstrated that the HUDH scheme can delegate computation overhead to powerful cloud servers. User confidentiality, access privilege, and user secret key accountability can be attained with more than 97% accuracy.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Purwoleksono, Didik Endro. « THE APPLICABILITY OF ARTICLE 4 OF ANTI-CORRUPTION LAW AND THE THEORY OF TORT ». Yuridika 34, no 1 (1 janvier 2019) : 21. http://dx.doi.org/10.20473/ydk.v34i1.7552.

Texte intégral
Résumé :
Article 4 of the Indonesian Corruption Law stipulates that the return of state financial losses does not eliminate the criminalization of the perpetrators of criminal acts as referred to in Article 2 and Article 3. What about the suspects or defendants who return the results of corruption related to the theory illegitimacy? There are two theories about the illegitimacy which are; the theory of illegitimacy against the formal law and the theory of illegitimacy against the material law. The theory of illegitimacy against the formal law, providing an understanding that an action, act, or activity is said to be against the law when against the rules set in the law. While through the Decision of the Supreme Court, Indonesia adheres to this theory. According to this theory, an action, act, or activity is said to be against the law when it is against the rules established in the law and according to the conditions is a disgraceful act or illegal. The decision of the Supreme Court provides the criteria for the loss of unlawful nature because of the factors of the state not being harmed, the society served and the defendant not making a profit. With the enactment of this theory, the existence of Article 4 of the Indonesian Corruption Law, becomes invalid with the condition that the results of corruption and its benefits have been returned by the perpetrators of corruption.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Lewin, Linda. « Natural and Spurious Children in Brazilian Inheritance Law From Colony to Empire : A Methodological Essay ». Americas 48, no 3 (janvier 1992) : 351–96. http://dx.doi.org/10.2307/1007241.

Texte intégral
Résumé :
This discussion takes its historical cue from a piece of recent urban folk wisdom in Brazil, one claiming that children born outside wedlock historically have enjoyed equal inheritance rights with their legitimate half-siblings. This notion attained wide circulation in the final years of the great debate over divorce that ended in 1976. As the defenders of the status quo, opponents of divorce usually failed to point out that Brazilian succession law had historically distinguished not just between individuals of legitimate and illegitimate birth but also among those of illegitimate birth. Of course, most Brazilians, like most North Americans, remained unaware of the vast differences prevailing between their two legal systems of inheritance. They usually assumed that the legal precept contained in the Statute of Merton (1235) still served as a rule of thumb for the Anglo-American experience: “Once a bastard, always a bastard.” On the other hand, what appealed to Brazilians' sense of fairness was the flexibility their national system of succession offered. The notion that inheritance rights should be restricted to those of legitimate birth was one they proudly rejected. In leaving the door open to the possibility that civil law could equip those born to unmarried parents with the potential for equal inheritance rights with legitimate heirs, Brazil's system of succession provided that so-called bastardy could be converted into legitimacy.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Boulton, S. J., et S. P. Jackson. « Saccharomyces cerevisiae Ku70 potentiates illegitimate DNA double-strand break repair and serves as a barrier to error-prone DNA repair pathways. » EMBO Journal 15, no 18 (septembre 1996) : 5093–103. http://dx.doi.org/10.1002/j.1460-2075.1996.tb00890.x.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "ILLEGITIMATE SERVER"

1

DHAMA, VIKRANT. « ANALYZING SECURITY BREACH AND DATA LEAKAGE IN MOBILE APPLICATIONS USING ILLEGITIMATE SERVER CONNECTIONS ». Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15024.

Texte intégral
Résumé :
In past few years, an incredible increase is measured in the popularity and pervasiveness of android smart phones. Also it has observed that new mobile applications are built almost everyday. These apps provides functionalities such as social networking, games, and a lot more to users. A few of the mobile applications have a direct purchasing cost or may be freely available but having an ad-support in it for the revenue and in return these applications provides user’s private/confidential data to the ad providers without letting the users consent. Worryingly, most of ad libraries ask for the permissions beyond their requirement and sometimes additional ones from that are listed in their documentation. Some apps also track their users with a network sniffer across ad providers and its applications. Though for security point in concern, users have full right to know that if someone is taking his/her private data or information. This is often ineffective at conveying meaningful, useful information on how a user’s privacy might be impacted by using an application. In this research work, the effect on user privacy of some grossing Android apps was examined that includes apps which provide private data of user without their permission. Android device is firstly rooted for this work and then made some useful changes to collect the required traffic from different applications. On basis of certain parameters, traffic is analyzed and effective results concluded. Using third party connections that an app makes, a threshold is defined to know about legitimacy of application. Some other parameters were also added to check whether an app is stealing users’ private information.
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "ILLEGITIMATE SERVER"

1

Bernhardt, Elizabeth Louise. Genevra Sforza and the Bentivoglio. Nieuwe Prinsengracht 89 1018 VR Amsterdam Nederland : Amsterdam University Press, 2023. http://dx.doi.org/10.5117/9789463726849.

Texte intégral
Résumé :
Genevra Sforza (ca. 1441-1507) lived her long life near the apex of Italian Renaissance society as wife of two successive de facto rulers of Bologna: Sante Bentivoglio then Giovanni II Bentivoglio. Placed there twice without a dowry by Duke Francesco Sforza as part of a larger Milanese plan, Genevra served the Bentivoglio by fulfilling the gendered role demanded of her by society, most notably by contributing eighteen children, accepting many illegitimates born to Giovanni II, and helping arrange their futures for the success of the family at large. Based on contemporary archival research conducted across Italy, this biography presents Genevra as the object of academic study for the first time. The book also explores how Genevra’s life-story, filled with a multitude of successes appropriate for an elite fifteenth-century female, has been transformed into a farraginous body of misogynistic legends claiming she destroyed the Bentivoglio and the city of Bologna.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Andrade, Nathanael. Civil War. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190638818.003.0009.

Texte intégral
Résumé :
In early 272, the emperor Aurelian, who deemed Zenobia’s authority to be illegitimate and her bid for power unsanctioned, invaded her territory. Zenobia responded by claiming the titles of Augusta and Augustus for herself and Wahballath. Suffering a series of defeats, Zenobia attempted to flee Palmyra as Aurelian’s forces invested the city. While the sources diverge in their treatment of Zenobia’s fate, the evidence indicates that Aurelian displayed her in his triumph and settled her with Wahballath and her other children at Tibur, near Rome. There she spent the rest of her life.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Varol, Ozan O. The Enemy Within. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190626013.003.0012.

Texte intégral
Résumé :
The armed forces serve as the iron fist of some dictatorships. For several reasons, a military whose primary mission is fighting the political enemy within is in a poor position to serve as a democratic catalyst. If the military has taken sides on domestic conflicts and is viewed as a partisan institution that enforces government policies—particularly unpopular ones—it risks cutting its ties to society. As a result the populace may outright reject the military’s attempts to promote democratic institution building. In contrast, a military that hasn’t been mired in domestic conflicts is more likely to be viewed as a legitimate state institution in an illegitimate state apparatus. In times of regime crisis, these militaries remain free of the stigma of having pushed people around. This credibility better allows the military to lead a democratic regime change.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Okeke, Edward Chukwuemeke. Conclusion. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190611231.003.0011.

Texte intégral
Résumé :
The conclusion makes the case that the jurisdictional immunities of States and international organizations are not only sustainable but also necessary for international relations and cooperation. Contrary to the polemic that immunity breeds impunity, jurisdictional immunities promote respect for international law rather than undermine it. Even where a State or an international organization is immune, it may still be responsible for a wrongful act. To be sure, immunities can be abused. However, abuse of immunity is a different question from the necessity of immunity. The book concludes with the submission that if the international community finds the international law of jurisdictional immunities of States and international organizations to be illegitimate or inadequate, then the proper course of action is to re-evaluate the goals served by the law.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Bergeron, David M. The Duke of Lennox, 1574-1624. Edinburgh University Press, 2022. http://dx.doi.org/10.3366/edinburgh/9781399500449.001.0001.

Texte intégral
Résumé :
This is the first biography of Ludovic Stuart, Duke of Lennox, who served King James VI of Scotland/ I of England from his arrival in 1583 in Scotland until his untimely death in February 1624. Lennox arrived as a 9-year-old boy from France, a cousin of the king. For the next 40 years Lennox served James faithfully and skillfully, becoming the quintessential courtier, James’s confidant, adviser, and friend. Shrewd politician, ambitious and sometimes ruthless, but also beloved by the royal family, Lennox carefully negotiated political and diplomatic minefields. He also participated in the arts as patron and performer, sponsoring his own acting company, attending drama performances and dancing in several court masques. This book explores his private life as well, his three marriages, his relationships with his siblings, his illegitimate son, and life with the royal family. This biography covers the politics and cultural life of the Jacobean court in Scotland and England and Lennox’s unparalleled importance, without whom our knowledge of King James is incomplete.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Delmas, Candice. Justice and Democracy. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190872199.003.0004.

Texte intégral
Résumé :
Chapter 3 uses the natural duty of justice—which requires supporting just institutions—to defend a duty to resist injustice in basically legitimate states. It develops a typology of injustice ranging from democratically sanctioned violations of basic rights to official abuses, in order to better understand the implications of the duty of justice as it applies to the unjust conditions that can prevail within otherwise-legitimate, democratic societies. The chapter defends a series of political obligations corresponding to the contexts of injustice identified: obligations to engage in education efforts, protest (including by means of civil disobedience), covert disobedience, vigilante self-defense, and whistleblowing. The chapter concludes by sketching potential political obligations with respect to illegitimate states.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Gleave, Robert, et István Kristó-Nagy, dir. Violence in Islamic Thought from the Qur'an to the Mongols. Edinburgh University Press, 2015. http://dx.doi.org/10.3366/edinburgh/9780748694235.001.0001.

Texte intégral
Résumé :
The topic of Legitimate and Illegitimate Violence in Islamic Thought (LIVIT) calls for an interdisciplinary, comparative and historical approach. This has been the underlying methodological assumption within the project which bore this name. Amongst the products of that three-year project is a series of collected studies by established and emerging scholars in the field, examining how Muslim thinkers have conceptualised violence and categorised (morally and legally) acts of violence. In this opening chapter, István Kristó-Nagy first explores how violence in Islamic thought can be set against a wider consideration of violence in human history. It is this comparative perspective which contextualises not only this volume, but also the two subsequent volumes in the LIVIT series. In the second half of this chapter, Robert Gleave explains how this volume is structured, addressing the different approaches used by the contributors, and examines the different ways in which violence can be categorised.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Zola, Émile. The Fortune of the Rougons. Traduit par Brian Nelson. Oxford University Press, 2012. http://dx.doi.org/10.1093/owc/9780199560998.001.0001.

Texte intégral
Résumé :
He thought he could see, in a flash, the future of the Rougon-Macquart family, a pack of wild satiated appetites in the midst of a blaze of gold and blood.’ Set in the fictitious Provençal town of Plassans, The Fortune of the Rougons tells the story of Silvère and Miette, two idealistic young supporters of the republican resistance to Louis-Napoleon Bonaparte's coup d’état in December 1851. They join the woodcutters and peasants of the Var to seize control of Plassans, opposed by the Bonapartist loyalists led by Silvère's uncle, Pierre Rougon. Meanwhile, the foundations of the Rougon family and its illegitimate Macquart branch are being laid in the brutal beginnings of the Imperial regime. The Fortune of the Rougons is the first in Zola's famous Rougon-Macquart series of novels. In it we learn how the two branches of the family came about, and the origins of the hereditary weaknesses passed down the generations. Murder, treachery, and greed are the keynotes, and just as the Empire was established through violence, the ‘fortune’ of the Rougons is paid for in blood.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Collins, Wilkie. The Dead Secret. Sous la direction de Ira B. Nadel. Oxford University Press, 2008. http://dx.doi.org/10.1093/owc/9780199536719.001.0001.

Texte intégral
Résumé :
‘Oh, my God! to think of that kind-hearted, lovely young woman, who brings happiness with her wherever she goes, bringing terror to me! Terror when her pitying eyes look at me; terror when her kind voice speaks to me; terror when her tender hand touches mine!’ Porthgenna Tower on the remote western Cornish coast. Moments before her death, Mrs Treverton dictates a secret to her maid, never to be passed to her husband as she had instructed. Fifteen years later, when Mrs Treverton’s daughter, Rosamond, returns to Porthgenna with her blind husband, Leonard, she is intrigued by the strange and seemingly disturbed Mrs Jazeph’s warning not to enter the Myrtle Room in the ruined north wing. Strong-minded and ingenious, Rosamond’s determined detective work uncovers shocking and unsettling truths beyond all expectation. A mystery of unrelenting suspense and psychologically penetrating characters, The Dead Secret explores the relationship between a fallen woman, her illegitimate daughter, and buried secrets in a superb blend of romance and Gothic drama. Wilkie Collins’s fifth novel, The Dead Secret anticipates the themes of his next novel, The Woman in White in its treatment of mental illness, disguise and deception, and the dispossession of lost identity. Yet a series of comic figures offsets the tension, from the dyspeptic Mr Phippen to the perpetually smiling governess, Miss Sturch. Displaying the talent and energy which made Collins the most popular novelist of the 1860s, The Dead Secret represents a crucial phase in Collins’s rise as a mystery writer, and was his first full-length novel written specifically for serialization.
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "ILLEGITIMATE SERVER"

1

Dalai, Asish Kumar, et Sanjay Kumar Jena. « Online Identification of Illegitimate Web Server Requests ». Dans Communications in Computer and Information Science, 123–31. Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22786-8_15.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Swami, Rochak, Mayank Dave et Virender Ranga. « DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN ». Dans Research Anthology on Combating Denial-of-Service Attacks, 248–64. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5348-0.ch013.

Texte intégral
Résumé :
Distributed denial of service (DDoS) attack is one of the most disastrous attacks that compromises the resources and services of the server. DDoS attack makes the services unavailable for its legitimate users by flooding the network with illegitimate traffic. Most commonly, it targets the bandwidth and resources of the server. This chapter discusses various types of DDoS attacks with their behavior. It describes the state-of-the-art of DDoS attacks. An emerging technology named “Software-defined networking” (SDN) has been developed for new generation networks. It has become a trending way of networking. Due to the centralized networking technology, SDN suffers from DDoS attacks. SDN controller manages the functionality of the complete network. Therefore, it is the most vulnerable target of the attackers to be attacked. This work illustrates how DDoS attacks affect the whole working of SDN. The objective of this chapter is also to provide a better understanding of DDoS attacks and how machine learning approaches may be used for detecting DDoS attacks.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Swami, Rochak, Mayank Dave et Virender Ranga. « DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN ». Dans Security and Privacy Issues in Sensor Networks and IoT, 193–214. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-0373-7.ch008.

Texte intégral
Résumé :
Distributed denial of service (DDoS) attack is one of the most disastrous attacks that compromises the resources and services of the server. DDoS attack makes the services unavailable for its legitimate users by flooding the network with illegitimate traffic. Most commonly, it targets the bandwidth and resources of the server. This chapter discusses various types of DDoS attacks with their behavior. It describes the state-of-the-art of DDoS attacks. An emerging technology named “Software-defined networking” (SDN) has been developed for new generation networks. It has become a trending way of networking. Due to the centralized networking technology, SDN suffers from DDoS attacks. SDN controller manages the functionality of the complete network. Therefore, it is the most vulnerable target of the attackers to be attacked. This work illustrates how DDoS attacks affect the whole working of SDN. The objective of this chapter is also to provide a better understanding of DDoS attacks and how machine learning approaches may be used for detecting DDoS attacks.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Daci, Genti, et Rezarta Jaupi. « IP Layer Client Puzzles ». Dans Enterprise Business Modeling, Optimization Techniques, and Flexible Information Systems, 14–25. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-3946-1.ch002.

Texte intégral
Résumé :
It is very common today that many business models are based on offering on-line services. Profitability and efficiency of this business model relies on a secure and undisturbed Internet infrastructure. Unfortunately, services offered on Internet infrastructure, being an Open and yet untrusted network, are very often targets of Denial-of-Service and Distributed Denial-of-Service attacks. These attacks are today a serious problem for on-line services offered by many business models. Preventing or minimizing DoS and DDoS is a difficult task which could serve to many on-line service offering business models to provide quality services to their clients. The main objective of this chapter is to present the Client Puzzle mechanism as a new method designed to defend business networks and their on-line services from these attacks. By using a client puzzle protocol on the IP level, the client is forced to solve a cryptographic puzzle before it can request any operation from a server, thus creating computational efforts and delays to illegitimate attackers and minimizing their attack effects on services. In this chapter, the authors show that chained puzzle protocol reduces the network and insfrastructure overhead because the servers do not have to generate puzzles on a per-packet basis. In addition, the chapter analyzes the effectiveness and some limitations of chained puzzles method with regards to minimizing DDoS attacks and outlines a general approach for addressing the identified limitations. At the last part, the authors propose a solution based on the general principle that under attack legitimate clients should be willing to experience some degradation in their performance in order to obtain the requested service.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Mac Amhlaigh, Cormac S. « What’s Wrong with Constitutionalism ? Between Cacophony and Coercion ». Dans New Constitutional Horizons, 134—C6.N117. Oxford University PressOxford, 2022. http://dx.doi.org/10.1093/oso/9780198852339.003.0006.

Texte intégral
Résumé :
Abstract This chapter considers a variety of critiques of the idea of constitutionalism as a form of normative theory of legitimate authority. The first of these critiques—the cacophony critique—argues that the ‘definitional conundrums’ which beset the concept of constitutionalism question its utility as a form of normative theorizing and can lead to potentially illegitimate outcomes. The second critique—the illegitimacy critique—argues, relatedly, that constitutionalism can serve to delegitimize rather than legitimize authority due to its tendency towards constitutional entrenchment and judicial supremacy which can violate democratic values; a critique which is exacerbated at the transnational level in the form of ‘new constitutionalism’.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Lenowitz, Jeffrey A. « Ratification beyond (and before) Constitutions ». Dans Constitutional Ratification without Reason, 40–63. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780198852346.003.0002.

Texte intégral
Résumé :
This chapter explores ratification outside of constitution-making, specifically in agency law, international law, and labor law. In each, ratification or its cognates is used to describe a procedure of a similar form. This is no coincidence, the chapter reveals, for all types of ratification descend from a common procedure in the private law of Ancient Rome. The procedure entered early modern agency law, then treaty-making, then written constitution-making, and finally into collective bargaining practices. This chapter describes the history and use of ratification in each of the non-constitutional areas and explains the procedure’s evolving functions. In agency law, ratification serves the purpose of fixing a broken (illegitimate) decision-making process by transforming false agents into real ones. In early treaty law, ratification served as a means of pronouncing judgment on the behavior and credentials of ambassador agents. In current treaty law, ratification serves as the site or a site of sovereign decision-making. And, in collective bargaining settings, ratification is thought both to add to the legitimacy of a contract and give the union a strategic advantage in negotiations. In later chapters, these functions help generate potential justifications for constitutional ratification.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Sowjanya, K. K., K. P. B. Madavi et G. Thahniyath. « Preserving the Privacy of Wearable IoT Device Data Using Blockchain ». Dans Blockchain Applications in Cybersecurity Solutions, 97–116. BENTHAM SCIENCE PUBLISHERS, 2023. http://dx.doi.org/10.2174/9789815080599123010009.

Texte intégral
Résumé :
Personal healthcare has become the most important part of present human life due to the COVID-19 pandemic. The awareness of one’s health is made easily available by adopting IoT wearable devices like Fitbit, smart watches, oximeters, etc. All these devices store sensitive information like a heartbeat, BP, distance traveled, calories burnt, stress levels, location details, etc., and are stored in third-party data servers. These servers are vulnerable to illegitimate users and also have a single point of failure. The personal data of the individuals should be protected along with its integrity. At the same time, the data stored in the servers should be decentralized to overcome the problem of a single point of attack. The objective of this article is to provide a framework that uses SHA-56 for generating the hash code and Blockchain technology to store the data. Thus, providing privacy, security, and integrity for the data.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Rai, Mridu. « Kashmiris in the Hindu Rashtra ». Dans Majoritarian State, 259–80. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190078171.003.0015.

Texte intégral
Résumé :
Mridu Rai discusses the location of Kashmiri Muslims in India after the BJP’s electoral win in 2014, identifying how Kashmiri Muslims are made to serve as contrapuntal symbols for constructing a mythical Hindu nation – of terrorist violence, illegitimate religious impulses and sedition. Rai argues that the evocatory purpose Kashmiris serve is so essential to Hindutva that it dissipates the possibility of resolving the Kashmir question under the Modi-led BJP. The preference for militaristic modes of dominance has allowed India to eschew its responsibility of administering Kashmir through democratic engagement and of seeking negotiated settlement with all segments of the public. This governance confines Kashmiris to a reality of daily atrocities, including shootings, mass graves and gendered violence. The study of the mistreatment of Kashmiris by the Indian state and Hindu nationalists is important, as similar repressive strategies are being deployed in the heartland of India against other minority groups.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Jackson, Emily. « 9. Genetic Information ». Dans Medical Law, 470–505. Oxford University Press, 2019. http://dx.doi.org/10.1093/he/9780198825845.003.0009.

Texte intégral
Résumé :
All books in this flagship series contain carefully selected substantial extracts from key cases, legislation, and academic debate, providing students with a stand-alone resource. This chapter examines the regulation of access to genetic information. It first discusses various third parties’ interests in genetic test results and DNA profiles, and the extent to which genetic privacy is protected by the law. The chapter then considers the issue of whether genetic discrimination should be treated in the same way as other illegitimate discriminatory practices and also discusses recent developments in the field of genetics, namely direct-to-consumer genetic testing and pharmacogenetics.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Grant, Ruth W. « Ethical and Not So Ethical Incentives ». Dans Strings Attached. Princeton University Press, 2011. http://dx.doi.org/10.23943/princeton/9780691151601.003.0004.

Texte intégral
Résumé :
This chapter suggests three basic standards for distinguishing ethical from unethical uses of incentives. These are legitimacy of purpose, voluntariness, and effect on the character of the parties involved. These standards, in turn, rest on the notion that ethical uses of any kind of power must treat human beings as free and rational agents. Acts of power can be judged by whether they serve a rationally defensible purpose, whether they allow for a voluntary response or are based on freely given consent, and whether they accord with the requirements of moral character. These are the conceptual materials we can use to distinguish between legitimate and illegitimate incentives, just as we would distinguish between the use and abuse of other forms of power.
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "ILLEGITIMATE SERVER"

1

Gill, Grandon. « The Predatory Journal : Victimizer or Victim ? » Dans InSITE 2021 : Informing Science + IT Education Conferences. Informing Science Institute, 2021. http://dx.doi.org/10.28945/4780.

Texte intégral
Résumé :
Aim/Purpose: Labeling a journal as “predatory” can do great damage to the journal and the individuals that have contributed to it. This paper considers whether the predatory classification has outlived its usefulness and what might replace it. Background: With the advent of open access publishing, the term “predatory” has increasingly been used to identify academic journals, conferences, and publishers whose practices are driven by profit or self-interest rather than the advancement of science. Absent clear standards for determining what is predatory and what is not, concerns have been raised about the misuse of the label. Methodology: Mixed methods: A brief review of the literature, some illustrative case studies, and conceptual analysis. Contribution: The paper provides recommendations for reducing the impact of illegitimate journals. Findings: Current predatory classifications are being assigned with little or no systematic research and virtually no accountability. The predatory/not predatory distinction does not accommodate alternative journal missions. Recommendations for Researchers: The distinction between legitimate and illegitimate journals requires consideration of each journal’s mission. To serve as a useful guide, a process akin to that used for accrediting institutions needs to be put in place. Impact on Society: Avoiding unnecessary damage to the careers of researchers starting out. Future Research: Refining the initial classification scheme proposed in the paper. NOTE: This Proceedings paper was revised and published in Informing Science: The International Journal of an Emerging Transdiscipline, 24, 51-82. Click DOWNLOAD PDF to download the published paper.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Lauc, Zvonimir, et Marijana Majnarić. « EU LEGAL SYSTEM AND CLAUSULA REBUS SIC STANTIBUS ». Dans EU 2021 – The future of the EU in and after the pandemic. Faculty of Law, Josip Juraj Strossmayer University of Osijek, 2021. http://dx.doi.org/10.25234/eclic/18352.

Texte intégral
Résumé :
We are witnesses and participants of Copernican changes in the world which result in major crises/challenges (economic, political, social, climate, demographic, migratory, MORAL) that significantly change “normal” circumstances. The law, as a large regulatory system, must find answers to these challenges. Primarily, these circumstances relate to (i) the pandemic - Corona 19, which requires ensuring economic development with a significant encroachment on human freedoms and rights; (ii) globalization, which fundamentally changes the concept of liberal capitalism as the most efficient system of production of goods and services and democracy as a desirable form of government; (iii) automation, robotics, artificial intelligence, and big data are changing the ways we work, live, communicate, and learn in a Copernican manner. The law should serve to shape the relationship between people in order to realize a life of love and freedom. This is done to the greatest extent through the constitutional engineering of selected institutions. The legal system focuses on institutions that have a raison d'etre in their mission, which is read as “ratio legis”, as a desirable normative and real action in the range of causal and teleological aspect. Crisis situations narrow social cohesion and weaken trust in institutions. It is imperative to seek constitutional engineering that finds a way out in autopoietic institutions in allopoietic environment. We believe that the most current definition of law is that = law is the negation of the negation of morality. It follows that morality is the most important category of social development. Legitimacy, and then legality, relies on morality. In other words, the rules of conduct must be highly correlated with morality - legitimacy - legality. What is legal follows the rules, what is lawful follows the moral substance and ethical permissibility. Therefore, only a fair and intelligent mastery of a highly professional and ethical teleological interpretation of law is a conditio sine qua non for overcoming current anomalies of social development. The juridical code of legal and illegal is a transformation of moral, legitimate and legal into YES, and immoral, illegitimate and illegal into NO. The future of education aims to generate a program for global action and a discussion on learning and knowledge for the future of humanity and the planet in a world of increasing complexity, uncertainty and insecurity.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie