نتایج جستجو برای: flaming

تعداد نتایج: 1419  

Journal: :IJHCITP 2016
Ruchi Verma Nitin Amit Srivastava

1 Empathy and Mindfulness: Potential Antecedents to Authentic Leadership; Aishwarya Singh, Jaypee Business School, Jaypee Institute of Information Technology, Noida, India Santoshi Sengupta, Department of Humanities and Social Sciences, Jaypee Institute of Information Technology, Noida, India Swati Sharma, Department of Humanities and Social Sciences, Jaypee Institute of Information Technology,...

2010
Stefano Ortolani Cristiano Giuffrida Bruno Crispo

Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unprivileged programs running in user space to eavesdrop and record all the keystrokes of the users of the system. Such an ability to run in unprivileged mode facilitates their implementation and distribution, but, at the sa...

Journal: :JCM 2013
Huayang Cao Jinjing Zhao Peidong Zhu Xicheng Lu Chonglun Zhao

A sophisticated worm, namely Stuxnet, attacked Iran nuclear facilities in 2010. This incident, together with newly found similar worms, e.g., Duqu, Flame, Gauss, highlight the cyber threat in industrial networks. These worms are highlytargeted and are carefully tested before being released. They are difficult to be detected by current security products, as there is no knowledge about them when ...

Journal: :CoRR 2018
Nick Gravin Zhihao Gavin Tang

In many shopping scenarios, e.g., in online shopping, customers have a large menu of options to choose from. However, most of the buyers do not browse all the options and make decision after considering only a small part of the menu. To study such buyer’s behavior we consider the standard Bayesian monopoly problem for a unit-demand buyer, where the monopolist displays the menu dynamically page ...

Journal: :Computers in Human Behavior 2008
Monica T. Whitty

Ever since the beginnings of the internet researchers have questioned its utility in developing and maintaining psychological healthy romantic and sexual relations. Advocates of the social presence theory and media richness theory purport that in leaner media individuals can be quite aggressive towards one another (e.g., in the form of flaming). In contrast, others believe that the lack of trad...

Journal: :Comput. Manag. Science 2013
Christopher M. Baker Michael Bode

Invasive predators are a critical driver of global biodiversity loss • Invasive predators (particularly feral cats and foxes) are the cause of many native mammal extinctions throughout Australia •Well established predators cannot be eradicated due to the cost •One method to protect threatened species is exclusion fencing • Although fences are predator proof, breaches occasionally occur (tree fa...

2004
M. D. Thomas H. Fitzgerald

Science for Conservation presents the results of investigations contracted to science providers outside the Department of Conservation. Reports are subject to peer review within the Department and, in some instances, to a review from outside both the Department and the science providers.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید