نتایج جستجو برای: cookie
تعداد نتایج: 1160 فیلتر نتایج به سال:
A growing body of literature has investigated whether the ability to contend with false belief (Wimmer and Perner 1983) is dependent upon the acquisition of the language that reports false beliefs (de Villiers, 2000, 2004, de Villiers and de Villiers 2000, de Villiers and Roeper (in prep)). de Villiers and her colleagues maintain that certain linguistic developments are precursors to a child’s ...
Quantifiers like “all” and “every” are frequent in daily language. However, when a sentence contains two quantifiers or is “doubly-quantified” (e.g., “Every boy ate a cookie”) the meaning can often be ambiguous since there are two potential interpretations: collective (e.g., several boys sharing a single cookie) and distributive (e.g., several boys each eating their own cookie). Psycholinguisti...
Due to the Prevalence of cookies on the Internet, consumers need to understand how cookies can be abused. Due to their essentially uncontrolled nature, cookies pose a security risk because they can contain important data within them. This paper examens how Internet cookies are used and abused, the pervasive nature of cookies, compares the various tools currently available to manage cookies, and...
Imagine a cookie placed on every vertex of an infinite d-dimensional grid. A random walker on this grid behaves as follows upon encountering a cookie: he consumes it and then performs a random step with an ǫ-drift to the right, namely the probability to make a right move is 1 2d + ǫ, the probability for a left move is 1 2d − ǫ and the probability for all other moves is 1 2d . When encountering ...
With the development of network, the issues of network security are rapidly becoming a serious problem, and the Denial of Service (DoS) attack has already become the greatest threat to the network. SYN Flood attack is one of the most common distributed denial of service attack way (DDoS). This paper presents an improved SYN Cookie method, designing a novel attack detector processing and a enhan...
We propose active cookies as a tool for stronger user/client authentication on the Web. An ordinary cookie is automatically released to any server associated with a particular domain name. It is therefore vulnerable to capture by pharming, that is, spoofing of domain names. An active cookie, by contrast, resists such pharming attacks. Active cookies rely on a new protocol we propose that channe...
Puzzles have been proposed as a mechanism to deamplify denial of service attacks against a server’s memory and processing resources. For example, HIP implements a cookie puzzle mechanism to protect the server from wasting resources performing Diffie-Hellman exponentiation in response to spurious requests. We examine cookie puzzle mechanisms of this type. We find that careful attention is needed...
Web searcher is an important area of research for designing more helpful searching systems and targeting content to particular users. Methods explored by other researchers include both qualitative (i.e., the use of human judges to manually analyze query patterns on usually small samples) and nondeterministic algorithms, typically using large amounts of training data to predict query modificatio...
Because of the stateless character of HTTP, cookies were invented to maintain continuity and states on the Web. Cookies which have user-related information are transmitted and stored, so an attacker can easily copy and modify them for his own purpose. Therefore, cookies are exposed to serious security threats such as network threats, end-system threats, and cookie-harvesting threats. In this pa...
fumonisins and aflatoxins are mycotoxins that are produced by fusarium and aspergillus genus respectively. due to the toxicity of aflatoxin and fumonisin and its effects on human and animals' health, the purpose of this study was analysis of total fumonisin and total aflatoxin contamination in biscuit and cookie samples in babol city, northern iran.thirty biscuit (n=15) and cookie (n=15) sample...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید