Results 21 to 30 of about 3,473,454 (285)

A network-wide view-based detection and mitigation of a sophisticated Interest Flooding Attack

open access: yesEURASIP Journal on Wireless Communications and Networking, 2020
Interest Flooding Attack (IFA) is one of the main security threats for the Named Data Networking (NDN). Most of its existing countermeasures enable intermediate routers near the attackers to independently detect the attack and consider the typical attack
Guang Cheng   +5 more
doaj   +1 more source

Dret a l'oblit: la discrepància entre el TJUE i l'advocat general en el cas Google Spain (STJUE de 13 de maig de 2014) en un context de reforma normativa

open access: yesIDP, 2014
S'analitza la STJUE de 13 de maig de 2014, que va resoldre una qüestió prejudicial plantejada per l'AN espanyola relativa a un cas sobre el dret a l'oblit.
Mònica Vilasau
doaj   +1 more source

Data protection and the legitimate interest of data controllers: Much ado about nothing or the winter of rights?

open access: yesCommon market law review, 2014
EU data protection law is in a process of reform to meet the challenges of the modern economy and rapid technological developments. This study analyses the legitimate interest of data controllers as a legal basis for processing personal data under both ...
Federico Ferretti
semanticscholar   +1 more source

Citizenship as strict liability: a review of Avia Pasternak’s Responsible Citizens, Irresponsible States

open access: yesEthics & Global Politics, 2022
States commit wrongs that demand redress. In her recent book, Avia Pasternak considers the circumstances under which it is legitimate to impose the cost of redress upon the state’s citizens at large.
Bennet Francis
doaj   +1 more source

Anticipated guilt and going against one's self-interest.

open access: yesEmotion, 2021
To lend money to someone and to later ask this same person to pay the money back should be relatively unproblematic in modern, monetized societies. Still, some people find it difficult to ask for lent money to be paid back, even though it is in their own
Xiaolu Zhang   +2 more
semanticscholar   +1 more source

Motive Criminal Procedure Evidence

open access: yesПроблеми Законності, 2015
In the article the need for such a level of mental regulation of behavior of proving motivation. The latter refers to internal motivation conscious entity Criminal Procedure proof, due to specific needs, interests and goals that cause a person to act ...
В. В. Вапнярчук
doaj   +1 more source

NISD2: A Common Framework for Information Sharing Among Network Defenders

open access: yesSCRIPTed: A Journal of Law, Technology & Society, 2021
Sharing information about vulnerabilities and attacks is essential to defend information systems against threats such as malware, phishing and unauthorised access.
Andrew Cormack
doaj   +1 more source

Beneficial Ownership – Demand for Transparency, Threat to Privacy

open access: yesReview of European and Comparative Law, 2023
The basic idea behind establishing the register of beneficial owners is to increase the transparency and accessibility of data on beneficial ownership of companies and other legal entities with the aim of ensuring the public availability of data on ...
Sonja Cindori
doaj   +1 more source

Legitimating private interests

open access: yesJournal of Sociology, 2007
National Competition Policy (NCP), legislated in Australia in 1995, has arguably been the single most consequential economic policy over the past decade. Yet it has largely escaped sociological analysis. This article investigates how the concept of the public interest in NCP has actually had the effect of legitimizing neo-liberal ideologies concerning
openaire   +2 more sources

The Detection Method of Collusive Interest Flooding Attacks Based on Prediction Error in NDN

open access: yesIEEE Access, 2020
Named Data Networking (NDN) is one of the main research projects of the information center network (ICN), and its efficient forwarding mechanism attaches the attention of researchers. Like other networks, NDN also faces the threat of cyber attacks.
Liang Liu   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy