نتایج جستجو برای: admonitory denial

تعداد نتایج: 21034  

Journal: :ادیان و عرفان 0
فاطمه کیائی استادیار گروه معارف اسلامی دانشگاه پیام نور تهران.

meister eckhart is one of the christian mystics that christian orthodoxy and catholic church accused his thoughts in medieval ages and named him heretic. most important themes that disparate the theism of eckhart from his christian predecessors are belief to godhead beyond god, denial of possibility of knowing god, innovations about trinity, belief to apophatic theology and etc. he defended of ...

2011
Amir R. Khakpour Joshua W. Hulst Zihui Ge Alex X. Liu Dan Pei Jia Wang

Firewalls are critical security devices handling all traffic in and out of a network. When under heavy load of both malicious and legitimate traffic, firewalls may be overloaded and start discarding or permitting packets without checking firewall rules, which can cause huge revenue losses or security breaches. In this paper, we study Denial of Firewalling attacks, where attackers use well-craft...

Journal: :European journal of public health 2011
Susanne Richter Heinke Rehder Heiner Raspe

BACKGROUND Internationally, in many healthcare systems financial pressure has led to the implementation of co-payments, private medical (extra) services and rationing. In Germany, members of statutory health insurances (SHIs) increasingly report the denial of medical services and the offer/demand of privately financed supplementary health services individual health services, (IHSs) in medical p...

2010
Md Yusuf Sarwar Uddin Ahmed Khurshid Hee Dong Jung Carl Gunter

Disruption-tolerant network (DTN) is an intermittently connected network where the traditional end-to-end data communication between a source-destination pair is hardly possible. Instead, nodes opportunistically replicate the same packet several times and try to deliver them through multiple paths. Due to this multi-copy forwarding scheme, denial of service (DoS) attacks in DTN is believed to b...

2014
Hannes Grunert

For many years, privacy has not been considered as a critical issue in the field of software development. Recent events have led to discussions how the privacy of the user can be protected in information systems. While most approaches do only focus on increasing the security of the systems to protect private information against uncontrolled access, the aspect of enhancing privacy itself has bee...

Journal: :Pediatrics 2004
Robert S Valet Diane F Kutny Gerald B Hickson William O Cooper

OBJECTIVE Twenty-three million people, accounting for >58% of Medicaid enrollees, are enrolled in Medicaid managed care programs. Although the expectation of management in Medicaid managed care programs necessitates restrictions in use of some services sought by patients and families, the circumstances surrounding care denial and related access problems in vulnerable populations of children hav...

2014
Gaurav Bansal

In this study we use Politeness Theory to understand the trust violation and restoration process. The study examines the role of CEO gender, perceived CEO status, and response type (apology vs. denial) on restored trust and trusting beliefs in the case of an insider data breach incident. The data were collected using a scenario based experiment from students studying in a Midwestern University....

2001
David Karig

As evinced by a series of high profile attacks, denial of service (DoS), or prevention of legitimate access to resources, is a threat that demands attention. Of particular concern are distributed attacks, in which an adversary recruits several computers to aid in the attack. The first major distributed denial of service (DDoS) attack brought down the University of Minnesota’s network for three ...

Journal: :CoRR 2015
Hrishikesh Deshpande

Today, internet and web services have become an inseparable part of our lives. Hence, ensuring continuous availability of service has become imperative to the success of any organization. But these services are often hampered by constant threats from myriad types of attacks. One such attack is called distributed denial of service attack that results in issues ranging from temporary slowdown of ...

2013
Abusayeed Saifullah

A high profile internet server is always a target of denial-of-service attacks. In this project, we propose a novel technique for protecting an internet server from distributed denial-of-service attacks. The defense mechanism is based on a distributed algorithm that performs weight-fair throttling at the upstream routers. The throttling is weight-fair because the traffics destined for the serve...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید