نتایج جستجو برای: admonitory denial
تعداد نتایج: 21034 فیلتر نتایج به سال:
meister eckhart is one of the christian mystics that christian orthodoxy and catholic church accused his thoughts in medieval ages and named him heretic. most important themes that disparate the theism of eckhart from his christian predecessors are belief to godhead beyond god, denial of possibility of knowing god, innovations about trinity, belief to apophatic theology and etc. he defended of ...
Firewalls are critical security devices handling all traffic in and out of a network. When under heavy load of both malicious and legitimate traffic, firewalls may be overloaded and start discarding or permitting packets without checking firewall rules, which can cause huge revenue losses or security breaches. In this paper, we study Denial of Firewalling attacks, where attackers use well-craft...
BACKGROUND Internationally, in many healthcare systems financial pressure has led to the implementation of co-payments, private medical (extra) services and rationing. In Germany, members of statutory health insurances (SHIs) increasingly report the denial of medical services and the offer/demand of privately financed supplementary health services individual health services, (IHSs) in medical p...
Disruption-tolerant network (DTN) is an intermittently connected network where the traditional end-to-end data communication between a source-destination pair is hardly possible. Instead, nodes opportunistically replicate the same packet several times and try to deliver them through multiple paths. Due to this multi-copy forwarding scheme, denial of service (DoS) attacks in DTN is believed to b...
For many years, privacy has not been considered as a critical issue in the field of software development. Recent events have led to discussions how the privacy of the user can be protected in information systems. While most approaches do only focus on increasing the security of the systems to protect private information against uncontrolled access, the aspect of enhancing privacy itself has bee...
OBJECTIVE Twenty-three million people, accounting for >58% of Medicaid enrollees, are enrolled in Medicaid managed care programs. Although the expectation of management in Medicaid managed care programs necessitates restrictions in use of some services sought by patients and families, the circumstances surrounding care denial and related access problems in vulnerable populations of children hav...
In this study we use Politeness Theory to understand the trust violation and restoration process. The study examines the role of CEO gender, perceived CEO status, and response type (apology vs. denial) on restored trust and trusting beliefs in the case of an insider data breach incident. The data were collected using a scenario based experiment from students studying in a Midwestern University....
As evinced by a series of high profile attacks, denial of service (DoS), or prevention of legitimate access to resources, is a threat that demands attention. Of particular concern are distributed attacks, in which an adversary recruits several computers to aid in the attack. The first major distributed denial of service (DDoS) attack brought down the University of Minnesota’s network for three ...
Today, internet and web services have become an inseparable part of our lives. Hence, ensuring continuous availability of service has become imperative to the success of any organization. But these services are often hampered by constant threats from myriad types of attacks. One such attack is called distributed denial of service attack that results in issues ranging from temporary slowdown of ...
A high profile internet server is always a target of denial-of-service attacks. In this project, we propose a novel technique for protecting an internet server from distributed denial-of-service attacks. The defense mechanism is based on a distributed algorithm that performs weight-fair throttling at the upstream routers. The throttling is weight-fair because the traffics destined for the serve...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید