Siga este link para ver outros tipos de publicações sobre o tema: Defacement of.

Artigos de revistas sobre o tema "Defacement of"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Defacement of".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.

1

Hoang, Xuan Dau, e Ngoc Tuong Nguyen. "Detecting Website Defacements Based on Machine Learning Techniques and Attack Signatures". Computers 8, n.º 2 (8 de maio de 2019): 35. http://dx.doi.org/10.3390/computers8020035.

Texto completo da fonte
Resumo:
Defacement attacks have long been considered one of prime threats to websites and web applications of companies, enterprises, and government organizations. Defacement attacks can bring serious consequences to owners of websites, including immediate interruption of website operations and damage of the owner reputation, which may result in huge financial losses. Many solutions have been researched and deployed for monitoring and detection of website defacement attacks, such as those based on checksum comparison, diff comparison, DOM tree analysis, and complicated algorithms. However, some solutions only work on static websites and others demand extensive computing resources. This paper proposes a hybrid defacement detection model based on the combination of the machine learning-based detection and the signature-based detection. The machine learning-based detection first constructs a detection profile using training data of both normal and defaced web pages. Then, it uses the profile to classify monitored web pages into either normal or attacked. The machine learning-based component can effectively detect defacements for both static pages and dynamic pages. On the other hand, the signature-based detection is used to boost the model’s processing performance for common types of defacements. Extensive experiments show that our model produces an overall accuracy of more than 99.26% and a false positive rate of about 0.27%. Moreover, our model is suitable for implementation of a real-time website defacement monitoring system because it does not demand extensive computing resources.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Bergadano, Francesco, Fabio Carretto, Fabio Cogno e Dario Ragno. "Defacement Detection with Passive Adversaries". Algorithms 12, n.º 8 (29 de julho de 2019): 150. http://dx.doi.org/10.3390/a12080150.

Texto completo da fonte
Resumo:
A novel approach to defacement detection is proposed in this paper, addressing explicitly the possible presence of a passive adversary. Defacement detection is an important security measure for Web Sites and Applications, aimed at avoiding unwanted modifications that would result in significant reputational damage. As in many other anomaly detection contexts, the algorithm used to identify possible defacements is obtained via an Adversarial Machine Learning process. We consider an exploratory setting, where the adversary can observe the detector’s alarm-generating behaviour, with the purpose of devising and injecting defacements that will pass undetected. It is then necessary to make to learning process unpredictable, so that the adversary will be unable to replicate it and predict the classifier’s behaviour. We achieve this goal by introducing a secret key—a key that our adversary does not know. The key will influence the learning process in a number of different ways, that are precisely defined in this paper. This includes the subset of examples and features that are actually used, the time of learning and testing, as well as the learning algorithm’s hyper-parameters. This learning methodology is successfully applied in this context, by using the system with both real and artificially modified Web sites. A year-long experimentation is also described, referred to the monitoring of the new Web Site of a major manufacturing company.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Young, Kevin. "Defacement". Callaloo 20, n.º 2 (1997): 292–93. http://dx.doi.org/10.1353/cal.1997.0067.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Barber, Charles. "Defacement". Yearbook of Comparative Literature 56, n.º 1 (2010): 104–15. http://dx.doi.org/10.1353/cgl.2010.0011.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Hariyadi, Dedy. "Analisis Serangan Web Defacement pada Situs Web Pemerintah Menggunakan ELK Stack". JISKA (Jurnal Informatika Sunan Kalijaga) 4, n.º 1 (16 de novembro de 2019): 1. http://dx.doi.org/10.14421/jiska.2019.41-01.

Texto completo da fonte
Resumo:
Web defacement merupakan serangan yang dikategorikan sebagai serangan siber yang berpotensi. Dampak dari serangan web defacement adalah proses pengembalian ke kondisi semula yang memerlukan mitigasi khusus. Pemantauan serangan web defacement dapat dilakukan dari dua sisi, yaitu sisi internal dan eksternal. Pada penelitian ini pemantauan dan analisis serangan web defacement dari sisi eksternal. Oleh sebab itu diperlukan aplikasi khusus untuk mendapatkan informasi dari OSINT Source penyedia informasi serangan web defacement yang merupakan hasil laporan dari peretas. Informasi yang didapatkan selanjutnya diolah menggunakan ELK Stack untuk mempermudah analisis dalam bentuk visualisasi pada Dashboard.Web defacement merupakan serangan yang dikategorikan sebagai serangan siber yang berpotensi. Dampak dari serangan web defacement adalah proses pengembalian ke kondisi semula yang memerlukan mitigasi khusus. Pemantauan serangan web defacement dapat dilakukan dari dua sisi, yaitu sisi internal dan eksternal. Pada penelitian ini pemantauan dan analisis serangan web defacement dari sisi eksternal. Oleh sebab itu diperlukan aplikasi khusus untuk mendapatkan informasi dari OSINT Source penyedia informasi serangan web defacement yang merupakan hasil laporan dari peretas. Informasi yang didapatkan selanjutnya diolah menggunakan ELK Stack untuk mempermudah analisis dalam bentuk visualisasi pada Dashboard.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Albalawi, Mariam, Rasha Aloufi, Norah Alamrani, Neaimh Albalawi, Amer Aljaedi e Adel R. Alharbi. "Website Defacement Detection and Monitoring Methods: A Review". Electronics 11, n.º 21 (1 de novembro de 2022): 3573. http://dx.doi.org/10.3390/electronics11213573.

Texto completo da fonte
Resumo:
Web attacks and web defacement attacks are issues in the web security world. Recently, website defacement attacks have become the main security threats for many organizations and governments that provide web-based services. Website defacement attacks can cause huge financial and data losses that badly affect the users and website owners and can lead to political and economic problems. Several detection techniques and tools are used to detect and monitor website defacement attacks. However, some of the techniques can work on static web pages, dynamic web pages, or both, but need to focus on false alarms. Many techniques can detect web defacement. Some are based on available online tools and some on comparing and classification techniques; the evaluation criteria are based on detection accuracies with 100% standards and false alarms that cannot reach 1.5% (and never 2%); this paper presents a literature review of the previous works related to website defacement, comparing the works based on the accuracy results, the techniques used, as well as the most efficient techniques.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Aryapranata, Ariawan, Sigit Hermanto, Yogi Priya Agsena, Yuliansyah Al Rasyid e Fachrul Husain Habibie. "Pencegahan Web Defacement". Jurnal Esensi Infokom : Jurnal Esensi Sistem Informasi dan Sistem Komputer 8, n.º 1 (31 de maio de 2024): 10–19. http://dx.doi.org/10.55886/infokom.v8i1.816.

Texto completo da fonte
Resumo:
Meningkatnya penggunaan internet memiliki risiko semakin masifnya ancaman peretasan. Badan Siber dan Sandi Negara (BSSN) mencatat hingga April 2022, serangan siber di Indonesia mencapai angka 100 juta kasus. Web defacement selalu masuk ke dalam tiga teratas insiden yang masuk dalam layanan BSSN, Web Defacement adalah tindakan merusak dan mengubah tampilan website, dan dapat merusak reputasi bisnis serta mengancam kepercayaan pengunjung. Metode penelitian tindakan (action Research) digunakan untuk langkah-langkah penerapan pencegahan web defacement yang menjadi bagian integral dari strategi keamanan website.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Mantzios, George. "Cold War image-myths: A crime scene ethnography of defacement and historical redress from Athens, Greece". International Journal of Cultural Studies 24, n.º 5 (5 de março de 2021): 749–66. http://dx.doi.org/10.1177/1367877921996371.

Texto completo da fonte
Resumo:
This article develops an experimental ethnographic investigation into defacement as a popular modality of historical redress. It takes as its point of departure artistic remediations of archival materials pertaining to the commission, transport, and defacement of the statue of Harry S. Truman in Athens, Greece. At the forefront of the analysis is a consideration of such artistic remediations as extensions of the acts of defacement they (re)present. A political aesthetics of defacement is then elaborated through an experimental ethnography of Cold War historical redress centered around a crime scene investigation into the whereabouts and status of Harry S. Truman in present-day Athens. The experiment involves shifting the terms of historical redress from a focus on the statue of Harry S. Truman as a historiographical object of analytical study to the phantasmagoric modes of its ongoing defacement and (re)presentations in and from post-war Greece.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Zayid, Elrasheed, Ibrahim Isah, Nadir Farah, Yagoub Adam e Omar Alshehri. "Exploiting the Capabilities of Classifiers to Examine a Website Defacement Data Set". International Journal of Computers and Informatics 3, n.º 3 (31 de março de 2024): 9–41. http://dx.doi.org/10.59992/ijci.2024.v3n3p1.

Texto completo da fonte
Resumo:
Website defacement is the illegal electronic act of changing a website. In this paper, the capabilities of robust machine learning classifiers are exploited to select the best input feature set for evaluation of a website’s defacement risk. A defacement mining data set was obtained from Zone-H, a private organization, and a sample consisting of 93,644 data points was pre-processed and used for modelling purposes. Using multi-dimensional features as input, enormous modelling computations were carried out to determine the optimal outputs, in terms of performance. Reason and hackmode presented the highest contributions for the evaluation of website defacement, and were thus chosen as outputs. Various machine learning models were examined, and decision tree (DT), k-nearest neighbours (k-NN), and random forest (RF) were found to be the most powerful algorithms for prediction of the target model. The input variables 'domain', 'system', 'web_server', 'redefacement', 'type', 'def_grade', and 'reason/hackmode' were tested and used to shape the final model. Using the cross-validation (CV) technique, the key performance factors of the models were calculated and reported. After calculating the average scores for the hyperparameter metrics (i.e., max-depth, min-sample-leaf, weight, max-features, and CV), both targets were evaluated, and the learning algorithms were ranked as RF > DT > k-NN. The reason and hackmode variables were thoroughly analysed, and the average score accuracies for the reason and hackmode targets were 0.85 and 0.585, respectively. The results comprise a significant development, in terms of modelling and optimizing website defacement risk. This study successfully addresses key cybersecurity concerns, particularly website defacement.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Davidson, Tonya. "Mica, Pedagogy, and Defacement". Public Historian 38, n.º 2 (1 de maio de 2016): 42–61. http://dx.doi.org/10.1525/tph.2016.38.2.42.

Texto completo da fonte
Resumo:
This article examines four interactions with Canada’s National War Memorial: ongoing skateboarding, an act of public urination in 2006, the 2008 “Vigil Project,” and the 2006 placement of the Valiants Memorial. It argues that these interactions with the monument demonstrate its potential as a site at which to learn about Canada’s military past and to embody the memories of others, thereby learning from the past. These types of learning are possible because the monument operates as an assemblage of material and virtual components.
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Soetomo, Mohammad Amin, e Rio Asepta. "Risks Mitigation of Defacement Attack Vectors on Educational Institution Websites by Using OWASP and Risk IT Frameworks". ACMIT Proceedings 3, n.º 1 (18 de março de 2019): 14–23. http://dx.doi.org/10.33555/acmit.v3i1.22.

Texto completo da fonte
Resumo:
According to an article published by The Hacker News in 2006 [1] 21.549 websites defaced by Turkish hacker team, Iskorpitx. It was the largest defacement in web history. Zone-h, the largest defaced website archives [2] listing 11.107.846 websites became the victims of defacement attack. So how about educational institution websites? Are they become the target of defacement attack? In point of fact, University of Maryland, North Dakota University, Butler University, Indiana University and Arkansas State University became the victims of data breach by malicious attacker, the data breach was larger than data breach attack on Sony [3]. After analysing the data filtered from Zone-h archives, we retrieved that the defaced websites belong to educational institution in ASEAN countries; Indonesia (11.615 websites), Malaysia (3.512 websites), Singapore (312 websites), Vietnam (3.294 websites), Thailand (9.860 websites), Brunei Darussalam (30 websites), Cambodia (65 websites), LAO PDR (9 websites), Myanmar (6 websites), Philippines (978 websites) have been efaced in 2015. This paper will analyse the motive, attack methods, risks, impacts and mitigations of defacement attack in educational institutions. MECEES, OWASP and Risk IT will be used as framework. Hacked educational institutions will lead to critical risks .
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Mondragón, Oscar, Andrés Felipe Mera Arcos, Christian Urcuqui e Andrés Navarro Cadavid. "Security control for website defacement". Sistemas y Telemática 15, n.º 41 (1 de agosto de 2017): 45–55. http://dx.doi.org/10.18046/syt.v15i41.2442.

Texto completo da fonte
Resumo:
Cyber-attacks to websites are increasing steadily affecting the integrity and availability of information, so the implementation of safeguards to mitigate or reduce to acceptable levels the risks generated are necessary. Computer incidents produce economic and reputational impacts to different organizations. It has identified an increase in computer attacks on different organizations where one of them, and highly reputational impact, is the “Defacement” attack, which consists of unauthorized modification or alteration to the web sites using wordpress cms , affecting the integrity of information. The result of this article proposes the development of a model for establishing a security control to perform the containment and reporting of this attack type, which currently have focused on the websites of the government entities. The development model allows online control the attack on Web sites by constant reading of certain parts of the source code making the detection and maintenance of the integrity of information.
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

K Das, Ashish, Quynh Thi Nguyen e Susan Thomas. "Entertaining Whilst Defacing Websites: Psychological Games for Hackers". Issues in Informing Science and Information Technology 14 (2017): 219–27. http://dx.doi.org/10.28945/3801.

Texto completo da fonte
Resumo:
Aim/Purpose: This study aims to investigate various characteristics from both victims as defaced websites and defacers that linked to a risk of being defaced through a set of descriptive analysis. Background: The current figures from a spectrum of sources, both academic and non-academic reports, proved a progressive increase of website defacement attacks to numerous organisations. Methodology: This study obtains a set of data from Zone-H site, which is accessible to the public, including 99,437 defaced websites. The descriptive analysis is applied in order to understand the motives of defacers and the probability of website re-defacements through the statistical investigation. Findings: The motives for defacing websites are driven mainly due to entertaining reasons. This in turn has an implication on the type of techniques defacers attack websites.
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Marschall, Sabine. "Targeting Statues: Monument “Vandalism” as an Expression of Sociopolitical Protest in South Africa". African Studies Review 60, n.º 3 (7 de agosto de 2017): 203–19. http://dx.doi.org/10.1017/asr.2017.56.

Texto completo da fonte
Resumo:
Abstract:Inspired by the “Rhodes Must Fall” campaign, this article examines the defacement of statues and commemorative monuments in postapartheid South Africa. The term “vandalism” is problematized and, based on observation, site visits, and media reports, various cases of statue defacement are then discussed. Local events are contextualized in relation to selected postcolonial societies in Africa and other comparative international contexts. The article argues that political discontent is not necessarily expressed in overt acts of ideologically motivated vandalism, but can manifest itself equally in acts of neglect, disrespect, silence, and disengagement.
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Lerer, Seth. "Devotion and Defacement: Reading Children's Marginalia". Representations 118, n.º 1 (2012): 126–53. http://dx.doi.org/10.1525/rep.2012.118.1.126.

Texto completo da fonte
Resumo:
The study of children's marginalia in manuscripts and printed books enables us to reassess traditional assumptions about bibliography, subjectivity, and the literary imagination in the English and American traditions. Commentaries, signatures, and scribbling defacements—together with fictional representations of young people writing in books—illustrate relationships among canonical authority, playful subversion, commodity value, and archival preservation that all contribute to (and may critique) our current fascination with book history as a discipline.
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Yusuf Raharja. "Implementasi Metode Osint untuk Mengidentifikasi Serangan Judi Online pada Website". Jurnal Informatika Polinema 10, n.º 3 (31 de maio de 2024): 359–64. http://dx.doi.org/10.33795/jip.v10i3.4847.

Texto completo da fonte
Resumo:
Serangan siber atau cyber-attack merupakan sebuah serangan yang dilakukan oleh suatu golongan untuk merusak, mencuri atau mengubah data dari suatu sistem komputer dengan cara memanfaatkan kerentanan sistem tersebut. Web defacement merupakan salah satu contoh dari serangan siber yang dilakukan dengan mengubah tampilan halaman dari website oleh oknum yang tidak memiliki wewenang. Serangan judi online pada website merupakan contoh dari web defacement. Judi online merupakan aktivitas taruhan yang dilakukan secara online dengan mempertaruhkan uang atau barang berharga. Serangan judi online semakin marak akibat dari perkembangan judi online yang semakin cepat. Dampak yang terjadi ketika sebuah website terkena web defacement judi online adalah situs tersebut menampilkan konten judi online. Serangan judi online sering dilakukan pada domain tingkat atas seperti .co.id, .edu, .or.id, dan .com. Penelitian ini menggunakan metode Open Source Intelligence (OSINT) dengan teknik google dork untuk mengidentifikasi serangan judi online pada website dengan domain .co.id, .edu, .or.id, dan .com. Hasil identifikasi menunjukkan bahwa sebanyak 511.000 situs web dengan domain .co.id, 61.700 situs web dengan domain .edu, 26.800 situs web dengan domain .or.id, dan 6.540.000 situs web dengan domain .com terkena serangan judi online, total 7.149.500 situs web terkena serangan judi online pada keempat domain tersebut.
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Han, Mee Lan, Byung Il Kwak e Huy Kang Kim. "CBR-Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data-Driven Website Defacement Analysis". Security and Communication Networks 2019 (20 de dezembro de 2019): 1–21. http://dx.doi.org/10.1155/2019/1901548.

Texto completo da fonte
Resumo:
Criminal profiling is a useful technique to identify the most plausible suspects based on the evidence discovered at the crime scene. Similar to offline criminal profiling, in-depth profiling for cybercrime investigation is useful in analysing cyberattacks and for speculating on the identities of the criminals. Every cybercrime committed by the same hacker or hacking group has unique traits such as attack purpose, attack methods, and target. These unique traits are revealed in the evidence of cybercrime; in some cases, these unique traits are well hidden in the evidence such that it cannot be easily perceived. Therefore, a complete analysis of several factors concerning cybercrime can provide an investigator with concrete evidence to attribute the attacks and narrow down the scope of the criminal data and grasp the criminals in the end. We herein propose a decision support methodology based on the case-based reasoning (CBR) for cybercrime investigation. This study focuses on the massive data-driven analysis of website defacement. Our primary aim in this study is to demonstrate the practicality of the proposed methodology as a proof of concept. The assessment of website defacement was performed through the similarity measure and the clustering processing in the reasoning engine based on the CBR. Our results show that the proposed methodology that focuses on the investigation enables a better understanding and interpretation of website defacement and assists in inferring the hacker’s behavioural traits from the available evidence concerning website defacement. The results of the case studies demonstrate that our proposed methodology is beneficial for understanding the behaviour and motivation of the hacker and that our proposed data-driven analytic methodology can be utilized as a decision support system for cybercrime investigation.
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Majkut, Paul. "Media Structural Defacement and Its Philosophical Implications". Glimpse 21 (2020): 97–107. http://dx.doi.org/10.5840/glimpse20202111.

Texto completo da fonte
Resumo:
Examples given in this paper deal with print media, but the argument applies to all media. These examples illustrate structural-linguistic principles, principles that may be extended to any medium. The approach is structuralist.The history of handwritten and printed texts in the West is an inseparable history of punctuation and lettering. Written and printed texts represent spoken language: letters are representations of segmental-phonemes (linguistically meaningful sounds); graphemic punctuation represents meaningful supra-segmental phonemes (intonation, pitch, pause, etc.).Alphabetical, graphemic representation in the West has through the ages developed many arbitrary systems of grammatic punctuation to show speech, but the semantics of speech representation remains under-developed. This is no less true of digital media as of print media. Digital print media are particularly vulnerable to ambiguity. Emoticons and emojis came about of necessity. Just as early-print punctuation was primarily invented by printers and printers’ devils, not scholars, so too emoticons are Silicon-Valley formalization of user-invented semantic punctuation. :-) becomes [smiley emoji] or [smiling alien emoji]. :-( becomes [frowning emoji] or [frowning alien emoji], and so on—and ambiguity is the hothouse of error and misreading that affects all media. We should not be surprised. It is said that a similar devil, Titivillus, caused medieval manuscript scribes to make errors in their copying.I am specifically interested in the ramifications of semantic punctuation on philosophical texts—above all, irony, though sarcasm, ridicule, double entendre, derision, mockery, satire, scorn, sneering, scoffing, gibing, taunting, acerbity, causticity, hate, trenchancy, etc., as well as positive expressions such as love, amusement, friendliness, approval, sincerity, etc. are also of semantic-punctuation representational importance. Does the failure of traditional written and printed tests to reflect, for the most part, semantic values handicap printed representational discourse? In fact, can the handicapped discussion of profound ideas be adequately represented graphemically and philosophical inquiry limited without representation of the full range of human linguistic communication?Representation of irony in print has long escaped writers and scholars. In the 17th century, John Wilkins in An Essay towards a Real Character and a Philosophical Language (1668) proposed, among other semantic punctuations, an inverted exclamation mark (¡) to indicate irony: “That is terrific work¡” for a job poorly done. “What a lovely hat you have¡” said with sarcastic irony to someone sporting a ridiculous hat. (Later, an inverted question mark was suggested for ironic statement, ¿, but confusion with Spanish inverted question marks makes it a less attractive alternative).Wilkins’ term “philosophical language” refers to language as printed representation, not speech. His argument is an early reference to what I have elsewhere argued is the failure of “bookish philosophy” that has come to typify academic philosophy, for example, the gibberish of Heidegger, Derrida, post-structuralists, post-modernists, post-humanists, numerous analytic and “linguistic” philosophers, and many others.One possible way out of these difficulties is a process of mediation, unmediation, and immediation.
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Goodyear, Anne Collins. "Digitization, Genetics, and the Defacement of Portraiture". American Art 23, n.º 2 (junho de 2009): 28–31. http://dx.doi.org/10.1086/605708.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Njoku, Jonathan. "Defacement of bank going concern public secrecy". International Journal of Critical Accounting 5, n.º 3 (2013): 229. http://dx.doi.org/10.1504/ijca.2013.055477.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Jain, Palak, Nikhil Kumar Singh e Dr Deepak Singh Tomar. "Defacement of Colluding Attack Using Blowfish Algorithm". International Journal of Engineering and Technology 9, n.º 3 (30 de junho de 2017): 2420–34. http://dx.doi.org/10.21817/ijet/2017/v9i3/1709030233.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Urcuqui, Christian Camilo, Melisa García Peña, José Luis Osorio Quintero e Andrés Navarro Cadavid. "Antidefacement". Sistemas y Telemática 14, n.º 39 (1 de dezembro de 2016): 9–27. http://dx.doi.org/10.18046/syt.v14i39.2341.

Texto completo da fonte
Resumo:
Internet connects around three billions of users worldwide, a number increasing every day. Thanks to this technology, people, companies and devices perform several tasks, such as information broadcasting through websites. Because of the large volumes of sensitive information and the lack of security in the websites, the number of attacks on these applications has been increasing significantly. Attacks on websites have different purposes, one of these is the introduction of unauthorized modifications (defacement). Defacement is an issue which involves impacts on both, system users and company image, thus, the researchers community has been working on solutions to reduce security risks. This paper presents an introduction to the state of the art about techniques, methodologies and solutions proposed by both, the researchers community and the computer security industry.
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Burton, Laura L. "Defacement: Indigenous Patients' Experiences in Baja Verapaz, Guatemala". Howard Journal of Communications 23, n.º 2 (abril de 2012): 119–35. http://dx.doi.org/10.1080/10646175.2012.667723.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Hens, H. L. S. C. "Fungal Defacement in Buildings: A Performance Related Approach". HVAC&R Research 5, n.º 3 (1 de julho de 1999): 265–80. http://dx.doi.org/10.1080/10789669.1999.10391237.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Kung, Ren-Yi, Nai-Hsin Pan, Charles C. N. Wang e Pin-Chan Lee. "Application of Deep Learning and Unmanned Aerial Vehicle on Building Maintenance". Advances in Civil Engineering 2021 (19 de abril de 2021): 1–12. http://dx.doi.org/10.1155/2021/5598690.

Texto completo da fonte
Resumo:
Several natural and human factors are responsible for the defacement of the external walls and tiles of buildings, and the related deterioration can be a public safety hazard. Therefore, active building maintenance and repair processes are essential for ensuring building sustainability. However, conventional inspection methods are time-, cost-, and labor-intensive processes. Therefore, herein, this study proposes a convolutional neural network (CNN) model for image-based automated detection and localization of key building defects (efflorescence, spalling, cracking, and defacement). Based on a pretrained CNN VGG-16 classifier, this model applies class activation mapping for object localization. After identifying its limitations in real-life applications, this study determined the model’s robustness and ability to accurately detect and localize defects in the external wall tiles of buildings. For real-time detection and localization, this study applied this model by using mobile devices and drones. The results show that the application of deep learning with UAV can effectively detect various kinds of external wall defects and improve the detection efficiency.
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Cho, Youngho. "Intelligent On-Off Web Defacement Attacks and Random Monitoring-Based Detection Algorithms". Electronics 8, n.º 11 (13 de novembro de 2019): 1338. http://dx.doi.org/10.3390/electronics8111338.

Texto completo da fonte
Resumo:
Recent cyberattacks armed with various ICT (information and communication technology) techniques are becoming advanced, sophisticated and intelligent. In security research field and practice, it is a common and reasonable assumption that attackers are intelligent enough to discover security vulnerabilities of security defense mechanisms and thus avoid the defense systems’ detection and prevention activities. Web defacement attacks refer to a series of attacks that illegally modify web pages for malicious purposes, and are one of the serious ongoing cyber threats that occur globally. Detection methods against such attacks can be classified into either server-based approaches or client-based approaches, and there are pros and cons for each approach. From our extensive survey on existing client-based defense methods, we found a critical security vulnerability which can be exploited by intelligent attackers. In this paper, we report the security vulnerability in existing client-based detection methods with a fixed monitoring cycle and present novel intelligent on-off web defacement attacks exploiting such vulnerability. Next, we propose to use a random monitoring strategy as a promising countermeasure against such attacks, and design two random monitoring defense algorithms: (1) Uniform Random Monitoring Algorithm (URMA), and (2) Attack Damage-Based Random Monitoring Algorithm (ADRMA). In addition, we present extensive experiment results to validate our idea and show the detection performance of our random monitoring algorithms. According to our experiment results, our random monitoring detection algorithms can quickly detect various intelligent web defacement on-off attacks (AM1, AM2, and AM3), and thus do not allow huge attack damage in terms of the number of defaced slots when compared with an existing fixed periodic monitoring algorithm (FPMA).
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Kaulingfreks, Ruud, e René ten Bos. "On faces and defacement: the case of Kate Moss". Business Ethics: A European Review 16, n.º 3 (julho de 2007): 302–12. http://dx.doi.org/10.1111/j.1467-8608.2007.00501.x.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Davanzo, G., E. Medvet e A. Bartoli. "Anomaly detection techniques for a web defacement monitoring service". Expert Systems with Applications 38, n.º 10 (setembro de 2011): 12521–30. http://dx.doi.org/10.1016/j.eswa.2011.04.038.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Indah Septiani, Nurina, Agung Sediyono e Abdul Rochman. "PERANCANGAN WEB DEFACEMENT MONITORING DENGAN MENGGUNAKAN METODE KOMPARASI NILAI HASH1". JIKO (Jurnal Informatika dan Komputer) 5, n.º 2 (8 de agosto de 2022): 150–55. http://dx.doi.org/10.33387/jiko.v5i2.4852.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

R, Newlin Shebiah, e Arivazhagan S. "Versatile Defacement Detection by Monitoring Video Sequences Using Deep Learning". European Journal of Engineering Research and Science 4, n.º 7 (19 de julho de 2019): 37–41. http://dx.doi.org/10.24018/ejers.2019.4.7.1396.

Texto completo da fonte
Resumo:
The main objective of this paper is to detect vandal and vandalism by monitoring recorded video sequences. Vandalism is one of the most commonly occurring crimes in the society that indirectly affects the economy of the country. The proposed algorithm takes in the input from the video extracted from surveillance camera which prevails in public places. Further, it is converted into frames and subtracted with the background to detect the foreground object. The background subtracted image contains both human and non-human moving objects. In order to differentiate human pixels and other moving objects in the video sequence, discriminative features are extracted using deep architecture and classified using SVM classifier. Deep features proved to be highly discriminative when compared with the handcrafted Histogram of Oriented Gradients features. By analyzing the dwell time of the person in the restricted scene and his motion pattern with time and significant change in background vandalism act is declared and the person is considered as vandal. The proposed method was evaluated on the videos collected from You Tube with the contents taken during night time, multiple vandals, car vandals etc.
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

R, Newlin Shebiah, e Arivazhagan S. "Versatile Defacement Detection by Monitoring Video Sequences Using Deep Learning". European Journal of Engineering and Technology Research 4, n.º 7 (19 de julho de 2019): 37–41. http://dx.doi.org/10.24018/ejeng.2019.4.7.1396.

Texto completo da fonte
Resumo:
The main objective of this paper is to detect vandal and vandalism by monitoring recorded video sequences. Vandalism is one of the most commonly occurring crimes in the society that indirectly affects the economy of the country. The proposed algorithm takes in the input from the video extracted from surveillance camera which prevails in public places. Further, it is converted into frames and subtracted with the background to detect the foreground object. The background subtracted image contains both human and non-human moving objects. In order to differentiate human pixels and other moving objects in the video sequence, discriminative features are extracted using deep architecture and classified using SVM classifier. Deep features proved to be highly discriminative when compared with the handcrafted Histogram of Oriented Gradients features. By analyzing the dwell time of the person in the restricted scene and his motion pattern with time and significant change in background vandalism act is declared and the person is considered as vandal. The proposed method was evaluated on the videos collected from You Tube with the contents taken during night time, multiple vandals, car vandals etc.
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Schwyzer, Philip. "Fallen idols, broken noses: Defacement and memory after the Reformation". Memory Studies 11, n.º 1 (janeiro de 2018): 21–35. http://dx.doi.org/10.1177/1750698017736835.

Texto completo da fonte
Resumo:
The Henrician and Edwardian Reformations of the 1530s and 1540s were marked by successive waves of iconoclasm in English churches and cathedrals. Statues, screens, wall paintings, and windows were among the idols targeted. While some objects and artworks were destroyed or effaced entirely, others remained in situ, bearing the marks of iconoclastic violence. Even today, many English cathedrals harbour numerous examples of defaced images which have suffered beheading or scoring of the face and hands, but have been neither repaired nor removed. This article explores how various post-Reformation observers including Protestants, Catholics, antiquaries, and poets understood and responded to defaced images, arguing that traditionalists and reformers found a paradoxical common cause in the curation of iconoclasm.
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Brook, Scott. "Touring the Phantom Agent: Recognition, Defacement and the Vietnamese Australian War Memorial". Journal of Intercultural Studies 27, n.º 1-2 (fevereiro de 2006): 133–49. http://dx.doi.org/10.1080/07256860600607900.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Ashby, Richard. "Face-off: defacement, ethics and the ‘neighbour’ in The Comedy of Errors". Textual Practice 32, n.º 8 (20 de janeiro de 2017): 1255–75. http://dx.doi.org/10.1080/0950236x.2016.1275757.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Ramos, N. M. M., E. Barreira, M. L. Simões e J. M. P. Q. Delgado. "Probabilistic Risk Assessment Methodology of Exterior Surfaces Defacement Caused by Algae Growth". Journal of Construction Engineering and Management 140, n.º 12 (dezembro de 2014): 05014012. http://dx.doi.org/10.1061/(asce)co.1943-7862.0000909.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Collins, Katie. "“Her Ruined Head”: Defacement and Bodyminds in Jean Stafford’s Life and Work". Journal of Modern Literature 45, n.º 1 (janeiro de 2021): 121–36. http://dx.doi.org/10.2979/jmodelite.45.1.08.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Kavyashree, K., C. N. Sowmyarani e P. Dayananda. "Transmission Control Protocol Off Path Exploits in Web". Journal of Computational and Theoretical Nanoscience 17, n.º 9 (1 de julho de 2020): 3995–98. http://dx.doi.org/10.1166/jctn.2020.9006.

Texto completo da fonte
Resumo:
The network community in the current scenario has faced lot of potential threats like restricted access to unauthorized network; break in through other organizations, making the system unavailable and so on. An off-path attacker can perform various attacks like Browser page read, Web phishing, website Spoofing and defacement to know the 4 tuples in Transmission Control Protocol. The attacker can also carry out Cross Site Scripting to know the sensitive information on websites. Cross Site Request Forgery which performs defective exploit on web. This helps in detecting the four tuples Sequence number, Acknowledgement number, Global IPID Counter and ports.
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Essien, D. "Economic implications of superstition and the defacement of the currency notes: Nigeria experience". African J. of Economic and Sustainable Development 3, n.º 1 (2014): 65. http://dx.doi.org/10.1504/ajesd.2014.061635.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Powell, M. A., R. A. Eaton e J. F. Webber. "The role of micro-arthropods in the defacement of sawn lumberby sapstain and mould fungi". Canadian Journal of Forest Research 25, n.º 7 (1 de julho de 1995): 1148–56. http://dx.doi.org/10.1139/x95-127.

Texto completo da fonte
Resumo:
Fungal sap stain, mould, and basidiomycete defacement of boards sawn from the sapwood of freshly felled logs of Corsican pine (Pinusnigra var. maritima (Aiton) Melville) was assessed during a 14-week field trial at a sawmill in southern England. The boards were placed in nonstickered stacks to reduce moisture loss, and stacks were constructed in a nest arrangement to allow experimental untreated board samples to be positioned centrally in each stack. The experimental samples were placed in plastic tanks, and the open tank faces were left either uncovered or were covered with a fine-mesh nylon screen to prevent entry of micro-arthropods. All the experimental samples were sterilized by γ-radiation prior to the tanks being installed into the board stacks. The outer casing boards, which surrounded the experimental tanks in each stack, were dip treated with a fungicide, a broad-spectrum insecticide-acaricide, a combination of the fungicide and the insecticide-acaricide, or water, which served as a control. After 8 and 14 weeks of exposure, casing boards were inspected for fungal infestation. The experimental sample boards removed from the centre of the stacks at the 8-week inspection were also assessed for fungal infestation. Boards that were accessible to arthropods (i.e., in open tanks surrounded by non-insecticide-treated boards) suffered severe sap stain. Experimental boards protected from arthropods by a mesh screen and (or) casing timbers treated with the insecticide chemical had minimal sap stain. In contrast, colonization by moulds was not reduced when either physical or chemical barriers were in place, suggesting that mould spores were mainly transmitted by air currents. Micro-arthropods were clearly implicated as primary agents of sap-stain transmission on green sawn lumber. They may also graze the moulds and therefore limit the intensity of defacement by these fungi.
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Huang, Wenzhi. "“Defacing the Leader’s Portrait and Quotations”: An Archival Study of Four Cases". Rural China 16, n.º 2 (7 de outubro de 2019): 243–92. http://dx.doi.org/10.1163/22136746-01602004.

Texto completo da fonte
Resumo:
During the Cultural Revolution, Mao’s portrait and quotations were everywhere in China. This modern form of cult was manifested in two ways: the cult of the Leader’s personality through the use of his likenesses and quotes by government authorities and the populace, and the defilement of the objects emblematic of the Leader by certain individuals. Based on an analysis of newly discovered archives on a number of cases involving defaced portraits, photos, and quotations of the Leader, this article reveals the micro-level mechanisms of political events, by which the “enemies” were identified and treated, and further tackles some theoretical issues concerning defacement, stigmatization and de-stigmatization, and the allegation of counter-revolutionary crimes in political campaigns.
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Breen, Colin, e John Raven. "Archaeological investigations at Kinbane Castle, County Antrim and its Scottish connections". Proceedings of the Society of Antiquaries of Scotland 144 (30 de novembro de 2015): 311–22. http://dx.doi.org/10.9750/psas.144.311.322.

Texto completo da fonte
Resumo:
Kinbane Castle is positioned at the base of steep cliffs on the north Antrim coast, with views northwards to Rathlin Island and Islay and eastwards to Kintyre. Recent investigations have demonstrated that this headland was fortified in the 1540s by certain MacDonalds who had arrived in Antrim from Islay. The site was built to act as a bridgehead into Ulster as this family, and its associated mercenaries, attempted to establish themselves as a major force amongst the Gaelic lordships of west Ulster. Its occupation was short-lived, since it was effectively abandoned in the 1550s following defacement by English forces and the reconfiguration of MacDonald settlement across north-east Antrim and the Southern Hebrides.
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Meskill, Lynn S. "Jonson and the Alchemical Economy of Desire: Creation, Defacement and Castration in The Alchemist". Cahiers Élisabéthains: A Journal of English Renaissance Studies 62, n.º 1 (outubro de 2002): 47–63. http://dx.doi.org/10.7227/ce.62.1.6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Howell, C. Jordan, George W. Burruss, David Maimon e Shradha Sahani. "Website defacement and routine activities: considering the importance of hackers’ valuations of potential targets". Journal of Crime and Justice 42, n.º 5 (20 de outubro de 2019): 536–50. http://dx.doi.org/10.1080/0735648x.2019.1691859.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Jennings, Margaret, e Francis P. Kilcoyne. "Defacement: Practical Theology, Politics, or Prejudice: The Case of the North Portal of Bourges". Church History 72, n.º 2 (junho de 2003): 276–303. http://dx.doi.org/10.1017/s0009640700099856.

Texto completo da fonte
Resumo:
The Cathedral of St. Étienne at Bourges, which Ribault justly styles “un chef d'oeuvre gothique” (a Gothic masterpiece), did not escape the Huguenot depredations of 1562. Especially vulnerable to the pikes and pry-bars of the Reformers were the choir screen in front of the main altar, the north and south doorways commemorating respectively Mary in Majesty and Christ in Majesty, and several areas of the West facade: the jamb statues (whose subjects are currently unknown), the spandrel sculptures under the dado that celebrated events of the Christian scriptures and of the book of Genesis, and the five extensively carved tympana dedicated from right to left as one faces them:
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Mitchell, Beverly Eileen. "The Struggle for Human Dignity in a Consumer-Oriented Culture". Anglican Theological Review 98, n.º 1 (setembro de 2016): 111–23. http://dx.doi.org/10.1177/000332861609800109.

Texto completo da fonte
Resumo:
This article addresses the need to ground our discussions and advocacy to rectify economic injustice in the basic affirmation that the most vulnerable victims of injustice are above all full human beings created in the image of God and that their humanness is therefore inscribed with a dignity which we are bound to respect. There are three areas in which we need to be more attentive to the ways in which our discourse and assistance unwittingly reinforce patterns of defacement even as we seek to address economic injustice: (1) addressing our biases and negative feelings about the materially disadvantaged; (2) clarifying who the materially disadvantaged are; and (3) enlisting the aid of the impoverished in seeking the solutions to economic injustice.
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Moneva, Asier, E. Rutger Leukfeldt, Steve G. A. Van De Weijer e Fernando Miró-Llinares. "Repeat victimization by website defacement: An empirical test of premises from an environmental criminology perspective". Computers in Human Behavior 126 (janeiro de 2022): 106984. http://dx.doi.org/10.1016/j.chb.2021.106984.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Sclocchi, Maria Carla, Lucia Kraková, Flavia Pinzari, Piero Colaizzi, Marina Bicchieri, Nikoleta Šaková e Domenico Pangallo. "Microbial Life and Death in a Foxing Stain: a Suggested Mechanism of Photographic Prints Defacement". Microbial Ecology 73, n.º 4 (15 de dezembro de 2016): 815–26. http://dx.doi.org/10.1007/s00248-016-0913-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Patta, Abd Rahman, e Suhartono Suhartono. "PENGEMBANGAN SISTEM INFORMASI ABSENSI GURU DAN SISWA BERBASIS WEB DI SMA NEGERI 1 TELLULIMPOE KABUPATEN SINJAI". Jurnal Teknologi Elekterika 1, n.º 1 (9 de julho de 2022): 76. http://dx.doi.org/10.31963/elekterika.v1i1.1216.

Texto completo da fonte
Resumo:
Tujuan penelitian ini adalah untuk menghasilkan rancangan sistem absensi guru dan siswa berbasis web di SMA Negeri 1 Tellulimpoe Kabupaten Sinjai. Penelitian ini merupakan jenis penelitian yang menggunakan metode Research and Development (R & D) dengan menggunakan prosedur pengembangan Prototipe dan pengujian kualitas perangkat lunak berdasar ISO 9126 dengan empat karakteristik, yakni karakteristik functionality, reliability, portability dan usability. Hasil penelitian ini adalah sebuah rancangan sistem absensi guru dan siswa berbasis web di SMA Negeri 1 Tellulimpoe Kabupaten Sinjai dengan hasil pengujian dari functionality untuk sub karakteristik accurancy and suitability menunjukkan tingkat kelayakan 100% , untuk sub karakteristik security sistem dinyatakan aman dari malware, website blacklisting, injected SPAM, defacement, dan SQLInjection. Hasil pengujian reliability sistem dinyatakan sangat baik dengan tingkat kelayakan 100%, Pengujian portability menunjukan bahwa sistem ini mendukung desktop dan OS mobile, dan pada pengujian usability menunjukan tingkat kelayakan 84.88%.
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Patta, Abd Rahman, e Suhartono Suhartono. "PENGEMBANGAN SISTEM INFORMASI ABSENSI GURU DAN SISWA BERBASIS WEB DI SMA NEGERI 1 TELLULIMPOE KABUPATEN SINJAI". Jurnal Teknologi Elekterika 14, n.º 1 (31 de maio de 2017): 76. http://dx.doi.org/10.31963/elekterika.v14i1.1216.

Texto completo da fonte
Resumo:
Tujuan penelitian ini adalah untuk menghasilkan rancangan sistem absensi guru dan siswa berbasis web di SMA Negeri 1 Tellulimpoe Kabupaten Sinjai. Penelitian ini merupakan jenis penelitian yang menggunakan metode Research and Development (R & D) dengan menggunakan prosedur pengembangan Prototipe dan pengujian kualitas perangkat lunak berdasar ISO 9126 dengan empat karakteristik, yakni karakteristik functionality, reliability, portability dan usability. Hasil penelitian ini adalah sebuah rancangan sistem absensi guru dan siswa berbasis web di SMA Negeri 1 Tellulimpoe Kabupaten Sinjai dengan hasil pengujian dari functionality untuk sub karakteristik accurancy and suitability menunjukkan tingkat kelayakan 100% , untuk sub karakteristik security sistem dinyatakan aman dari malware, website blacklisting, injected SPAM, defacement, dan SQLInjection. Hasil pengujian reliability sistem dinyatakan sangat baik dengan tingkat kelayakan 100%, Pengujian portability menunjukan bahwa sistem ini mendukung desktop dan OS mobile, dan pada pengujian usability menunjukan tingkat kelayakan 84.88%.
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

Capps†, Donald. "Stephen Pattison , Saving Face: Defacement, Shame, Theology (Farnham and Burlington, VT: Ashgate, 2013), pp. 210. £17.99." Scottish Journal of Theology 69, n.º 3 (26 de julho de 2016): 344–47. http://dx.doi.org/10.1017/s0036930614000660.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia