Results 21 to 30 of about 3,473,454 (285)
A network-wide view-based detection and mitigation of a sophisticated Interest Flooding Attack
Interest Flooding Attack (IFA) is one of the main security threats for the Named Data Networking (NDN). Most of its existing countermeasures enable intermediate routers near the attackers to independently detect the attack and consider the typical attack
Guang Cheng +5 more
doaj +1 more source
S'analitza la STJUE de 13 de maig de 2014, que va resoldre una qüestió prejudicial plantejada per l'AN espanyola relativa a un cas sobre el dret a l'oblit.
Mònica Vilasau
doaj +1 more source
EU data protection law is in a process of reform to meet the challenges of the modern economy and rapid technological developments. This study analyses the legitimate interest of data controllers as a legal basis for processing personal data under both ...
Federico Ferretti
semanticscholar +1 more source
States commit wrongs that demand redress. In her recent book, Avia Pasternak considers the circumstances under which it is legitimate to impose the cost of redress upon the state’s citizens at large.
Bennet Francis
doaj +1 more source
Anticipated guilt and going against one's self-interest.
To lend money to someone and to later ask this same person to pay the money back should be relatively unproblematic in modern, monetized societies. Still, some people find it difficult to ask for lent money to be paid back, even though it is in their own
Xiaolu Zhang +2 more
semanticscholar +1 more source
Motive Criminal Procedure Evidence
In the article the need for such a level of mental regulation of behavior of proving motivation. The latter refers to internal motivation conscious entity Criminal Procedure proof, due to specific needs, interests and goals that cause a person to act ...
В. В. Вапнярчук
doaj +1 more source
NISD2: A Common Framework for Information Sharing Among Network Defenders
Sharing information about vulnerabilities and attacks is essential to defend information systems against threats such as malware, phishing and unauthorised access.
Andrew Cormack
doaj +1 more source
Beneficial Ownership – Demand for Transparency, Threat to Privacy
The basic idea behind establishing the register of beneficial owners is to increase the transparency and accessibility of data on beneficial ownership of companies and other legal entities with the aim of ensuring the public availability of data on ...
Sonja Cindori
doaj +1 more source
Legitimating private interests
National Competition Policy (NCP), legislated in Australia in 1995, has arguably been the single most consequential economic policy over the past decade. Yet it has largely escaped sociological analysis. This article investigates how the concept of the public interest in NCP has actually had the effect of legitimizing neo-liberal ideologies concerning
openaire +2 more sources
The Detection Method of Collusive Interest Flooding Attacks Based on Prediction Error in NDN
Named Data Networking (NDN) is one of the main research projects of the information center network (ICN), and its efficient forwarding mechanism attaches the attention of researchers. Like other networks, NDN also faces the threat of cyber attacks.
Liang Liu +4 more
semanticscholar +1 more source

