Filters








8 Hits in 5.2 sec

On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks [article]

Marcilio O. O. Lemos, Yuri Gil Dantas, Iguatemi E. Fonseca, Vivek Nigam
2017 arXiv   pre-print
We demonstrate that formal methods is a powerful tool for specifying defenses for mitigating Distributed Denial of Service attacks allowing to increase our confidence on the proposed defense before actual  ...  Our first contribution is to demonstrate both experimentally and by using formal verification that selective strategies are suitable for mitigating TDoS attacks.  ...  This work has been funded by the DFG as part of the project Secure Refinement of Cryptographic Algorithms (E3) within the CRC 1119 CROSSING, by RNP project GT-ACTIONS, by Capes Science without Borders  ... 
arXiv:1709.04162v1 fatcat:5474mkrsw5huvgago6lq5flvqa

The 18th European Symposium on Quantitative Structure–Activity Relationships

Anna Tsantili-Kakoulidou, Dimitris K Agrafiotis
2011 Expert Opinion on Drug Discovery  
especially its positioning into the ATP binding cleft. 4 CDK1 inhibitory potency or/and selectivity improvement efforts led to the synthesis of new selectively substituted pyrrolo [2,3-a]carbazoles.  ...  We have recently reported on the CDK1 inhibitory activity of the pyrrolo [2,3-a]carbazole scaffold. 4 Molecular modeling and docking simulation studies explored the CDK1 binding mode of this core and  ...  as nucleophilic sites of attack.  ... 
doi:10.1517/17460441.2011.560604 pmid:22646021 fatcat:tb4bhvtnpzahxm4xba7iw4afuy

Comparative effectiveness research in neurotrauma

Shelly D. Timmons, Steven A. Toms
2012 Neurosurgical Focus  
For a list of documents currently on file for public inspection, see www.ofr.gov.  ...  Documents are on file for public inspection in the Office of the Federal Register the day before they are published, unless the issuing agency requests earlier filing.  ...  Renewal of the TDO A.  ... 
doi:10.3171/2012.6.focus1296 pmid:22746235 fatcat:jz4p245zyvhydnyawblkblih7e

Priorities assignment for actions in a transport system based on a multicriteria decision model [chapter]

2009 Reliability, Risk, and Safety, Three Volume Set  
The innovative tools for prevention of accidents in a post-socialist country Council Directive 89/391/EEC of 12 June 1989 on the introduction of measures to encourage improvements in the safety and health  ...  "Impact Of Maintenance Function On Plant Safety" American Society Of Safety Engineers, August 2000 , pp. 45-48. Reason, J. 1997. "Managing the Risks of Organizational Accidents", Ashgate.  ...  Journal of Systems and Software 77 (1): 47-54. Principles of theAOP 52 draft on software safety for the ammunition domain Departnemt of Defense USA. 2000.  ... 
doi:10.1201/9780203859759-69 fatcat:wnkjp4evmnawrn55cmckrgazze

SEVENTY-FIFTH ANNUAL MEETING OF THE British Medical Association

1907 BMJ (Clinical Research Edition)  
la'ynx, accompanied by great enlargement of the cervical lymphatic glands on oae or both isides of the neck, fetor ot the breath, frequent small haemorrhages from the throat, geneTal cachexia, and pain  ...  shooting fr.n the thrcat into the care. 952 TD TM Ban= ] 952g NJovvxJOMA roCT. 2, 1907-OCT. 12, 1907.1 TUBERCULOSIS, SYPHILIS AND MAIGNANT DISEASE OF L&EYNX. 7 9  ...  a purely defensive nature.  ... 
doi:10.1136/bmj.2.2441.952 fatcat:au52tjlb4vcp7ir4gr4tunxlvy

Information system agnostic ancestry for digital objects

Stephan Jakob Benedikt Heuscher
2010
In order for the ancestry of digital information to span more than one generation, each source, and therefore each digital object, must provide information on its ancestry.  ...  In this thesis, we present the theoretical foundation for the identification of digital objects independent of information systems and for enhancing digital objects with ancestry information.  ...  However, the integration of the hash values is not a defense against malicious attacks on a single digital object since the attacker can use the same sealing technique to make the digital object appear  ... 
doi:10.5167/uzh-46699 fatcat:qrumkbqyi5a2pjnwcz7chzuulm

Negotiating racial boundaries and organisational borders: an interpretive study of a cross cultural training programme [article]

Susan Young
1999
The standard and accepted manner of presenting a research thesis allows poorly for such foregrounding, concentrating more on a realist and objective representation of observable fact.  ...  Here is a rationale for the design, list of abbreviations and a list of study participants for quick reference while reading.  ...  From the feedback I got from staff they felt attacked, they weren 'tjust defensive, they felt attacked.  ... 
doi:10.26182/5d0c473075182 fatcat:szc4s5pnirfnfcffmxxo2tktni

*********************************************************************** Reproductions supplied by EDRS are the best that can De made from the original document. ******* ***** ********************************1************************** BEST COPY AVAILABLE PERMANENT SUBCOMMITTEE ON INVESTIGATIONS OF THE COMMITTEE ON GOVERNMENTAL AFFAIRS UNITED STATES SENATE ONE HUNDRED FIRST CONGRESS SECOND SESSION COMMITTEE ON GOVERNMENTAL AFFAIRS PERMANENT SUBCOMMITTEE ON INVESTIGATIONS

Li, John Glenn, Sam Nunn, Georgia Levin, Jim Sasser, David Pryor, Jeff Bingaman, New Memico, Herbert Kohl, Joseph Lieberman, William Roth, Ted Delaware (+24 others)
unpublished
-e-f+IS Of t r t Sc .Iea th,s eta 0" P^of..fnt "1 4, pott,t,t n. S. HRG 101-659  ...  S DEPARTMENT OF EDuCaTION ,J.ktP C. at,-'ftt .entenc t c A' .,41, 1.-1 .4 11MA Nol Js .tt, s 4, as t.e. t a, nt0-t) ty4 ,tattgt-% frOCIal, IAA A 0.  ...  To *sem and save the valuabie time of a busy manager, business owner or exetutive by doing as marry se possible ot his/her daily list of things to be dOne; atso, to try to anticipate, Intercept and deal  ... 
fatcat:jyav4lgbfvgjvpnumw6l2y6hqq