• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 11
  • 4
  • 4
  • 4
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Tax havens bending to the will of soft law : a case study of the Cayman Islands' response to the OECD and FATF blacklists

Driscoll, Matthew Brian 13 December 2013 (has links)
In 2000, two international organizations—the Financial Action Task Force (FATF) and the Organization for Economic Development (OECD)—attempted to attack the problems of money laundering and tax evasion through coercive soft law. Both organizations attempted to induce state compliance with international standards by placing noncompliant states on publicly available blacklists. The FATF blacklist, Non-Cooperative Countries or Territories, documented states that failed to implement international anti-money laundering standards and the OECD blacklist, Uncooperative Tax Havens, documented states that failed to implement international tax information-sharing agreements. This report examines the Cayman Islands’ quick compliance with these two international efforts. The report hypothesizes that the Cayman Islands’ complied quickly with both the FATF and OECD initiatives because the Cayman Islands’ had a strong financial institutional capacity and a high level of reputational risk from not complying. The report develops a methodology for testing this theory against other jurisdictions placed on both of the original FATF and OECD blacklists. The testing reveals that while financial institutional capacity and reputational risk may have contributed to the Cayman Islands’ and other states’ compliance with the FATF and OECD initiatives, these factors were not determinative. The report concludes that better metrics for state institutional capacity and reputational risk are needed to accurately measure states’ compliance with the FATF and OECD regimes. / text
2

Avaliação de Desempenho de uma Rede WirelessHART

Fraga, David John Freitas 08 September 2014 (has links)
Submitted by Lucelia Lucena (lucelia.lucena@ufpe.br) on 2015-03-06T19:14:40Z No. of bitstreams: 2 DISSERTAÇÃO David John Freitas Fraga.pdf: 2916605 bytes, checksum: e406ab0a5e4df8243c836c3e46fc3925 (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) / Made available in DSpace on 2015-03-06T19:14:40Z (GMT). No. of bitstreams: 2 DISSERTAÇÃO David John Freitas Fraga.pdf: 2916605 bytes, checksum: e406ab0a5e4df8243c836c3e46fc3925 (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) Previous issue date: 2014-09-08 / As redes de sensores sem fio estão sendo cada vez mais utilizadas em várias áreas, dentre elas comerciais, industriais e ambientais. A maior capacidade de processamento e o baixo custo dos dispositivos tornam essa área mais difundida. Em ambientes industriais deve-se levar em conta o contexto em que essa rede será aplicada. Várias instituições investem na produção de novas especificações que atendam esses requisitos, dentre elas a HFC (HART Communication Foundation) que especifica o padrão WirelessHART. Com a popularização desse padrão se tornam necessários trabalhos que avaliem o desempenho dessas redes, através de estudos de caso e cenários onde seja avaliado o seu comportamento com e sem interferência e em diferentes configurações. Essa dissertação apresenta uma rede WirelessHART, avaliando o seu comportamento, em um experimento prático, desde a sua formação até a indução de interferência Wi-Fi e algumas configurações que possam melhorar ou prejudicar o desempenho dessa rede. A experimentação nos mostra o quanto a rede WirelessHART pode ser robusta e que algumas limitações deverão ser consideradas na sua utilização.
3

Proxy servery v síti Internet / Proxy servers in Internet

Henek, Jan January 2016 (has links)
The goal of this paper is to analyze the representation of proxy servers in cyber attacks conducted by Internet. For this purpose I used method which compares tested IP address with database of open proxy servers. I assembled a list of IP address taken from the blacklist of cyber attacks committed in 2015. Then I checked this list with the created program Proxy checker and compared them with a database of open proxy servers. By measurement I demonstrate the inefficacy of this method for reverse detection of proxy servers in the IP list of past attacks.
4

Letters from the blacklist: the un-friendship of Albert Maltz and Michael Blankfort

Jones, Elizabeth Pelletier 31 July 2017 (has links)
Please note: Editorial Studies works are permanently embargoed in OpenBU. No public access is forecasted for this item. To request private access, please click on the locked Download file link, and fill out the appropriate web form. / This edition is an annotated selection of the correspondences of two screenwriters, Michael Blankfort and Albert Maltz, who were affected by institutional anti-communism. Both were subpoenaed to appear before the House Committee on Un-American Activities (HUAC): Maltz refused to answer questions, went to prison for contempt of Congress as a member of the Hollywood Ten, and was blacklisted from the film industry for nearly two decades; Blankfort cooperated with the committee and continued to work in Hollywood. They had been close friends for quite some time, but never spoke again following Blankfort’s HUAC appearance, despite a few attempts by Blankfort at renewing the friendship. The letters span five decades, beginning with the period of radicalization in the 1930s, through the era of blacklisting and all that followed in its wake, and ending with their deaths in the 1980s. Blankfort and Maltz’s encounters with HUAC affected them their entire lives after: Blankfort in his need to defend his actions even decades later, and Maltz in his need to denounce any person who cooperated with the committee. The letters demonstrate humanity through the difficulty of the situation, the struggle of navigating the politics of the times, and are the writers’ attempts to explain and justify their actions. / 2031-01-01
5

Na černé listině: Hollywoodští rudí a hony na čarodejnice v americkém filmovém průmyslu (1947-1960) / On the Black List: Hollywood Reds and Witch Hunting in the American Motion Picture Industry (1947-1960)

Srch, Daniel January 2014 (has links)
On the Blacklist: Hollywood Reds and Witch Hunting in the American Motion Picture Industry (1947-1960) Abstract At the beginning of the Cold War, the American motion picture industry was struck with a "witch-hunt" that led to establishment of the so-called blacklist. Due to this controversial policy, three hundred "Reds" (actual or perceived members of the U.S. Communist Party) were shut out from work in Hollywood during 1947-1950. The first explanation of this phenomenon can be seen in the bipolarity of the post-war world where the United States took leadership in a crusade against the Soviet Union. One result of this seemingly international crusade was that it also became domestic-followers of the U.S. Communist Party became actual public enemies. A deeper analysis of whole issue, however, requires that other elements must be seriously taken into account. The microcosm of Hollywood, some principles of American thinking and the activities of the Reds themselves provide crucial insights into comprehensively understanding the complexity of blacklisting. Experience with the Hollywood blacklist included many different aspects. First of all, it was a political battle with the "inquisitors" from the House Committee on Un-American Activities who helped establish the anti-Communist policy in American motion...
6

As escolhas temáticas, técnicas e práticas como elementos de afirmação e resistência política em O sal da terra de Herbert Biberman / The thematic, technic and practice choices as elements of political statement and resistence in Salt of the earth by Herbert Biberman

Oliveira, Maris Stella de Araújo Rodrigues de 01 October 2010 (has links)
O Sal da Terra (Salt of the Earth) de 1954 de Herbert Biberman (1900-1971) foi emblemático para a história do cinema americano. O filme baseado em um evento real da história americana uma greve de mineiros no Novo México foi censurado durante o período da Guerra Fria e aqueles que fizeram parte de sua produção foram perseguidos por longos períodos, tendo suas carreiras arruinadas dentro do território americano. O objetivo deste estudo é demonstrar que as escolhas feitas por aqueles que produziram, dirigiram e participaram do filme revelam o posicionamento político, social e cultural fruto das lutas históricas de cada um dos grupos participantes. A maneira como Herbert Biberman (diretor), Paul Jarrico (produtor) e Michael Wilson (roteirista) criaram um filme de gênero híbrido e as escolhas estéticas e técnicas necessárias para sua consecução demonstram um resultado baseado na crença política dos criadores aliado à vontade de um povo em mostrar sua história. A análise será feita tendo textos basilares de autores como Walter Benjamin, Peter Szondi e Bertold Brecht, tratando questões relacionadas à forma de narrar e de mostrar através de escolhas baseadas na história. Também foram de grande ajuda os textos históricos de Rodolfo Acuña sobre o povo do Novo México, bem como os textos referentes ao filme em si. Considerar para esta análise a base histórica e política de todos que, de alguma maneira, participaram do filme é fator essencial para a compreensão e entendimento deste trabalho. / Salt of the Earth was emblematic to the history of the American cinema. The movie based on a true event of American history a miner strike in New Mexico was suppressed during the period of Cold War, and those who worked in its production were pursued for a long time, and their carriers were ruined inside American territory. The aim of this study is to show that the choices made by those who produced, directed and participated in the film reveal the political, social and cultural positioning, result of the historical fights of each group inside the movie. The way as Herbert Biberman (director), Paul Jarrico (producer), and Michael Wilson (screenwriter) created a movie with a hybrid genre and the aesthetic choices and techniques needed for its consecution shows a result based on creators political belief, allied with the people desire in showing its history. The analysis was made with authors basilar texts as Walter Benjamin, Peter Szondi, Bertold Brecht, treating questions related to the way of telling and showing through the choices based on history. It was also helpful the historical text from Rodolfo Acuña about New Mexico, as well the texts referred to the movie itself. Considering to this analysis the historical and political basis of everyone who, in any way, worked in the movie, is an essential factor to the understanding and comprehension of this job.
7

Kallt krig i klassrummet : Spelfilm i historieundervisningen

Ohlander, Daniel January 2019 (has links)
This study aims to examine how some people in the United States of America during a period of ten years shortly after World War II used motion pictures to spread their political beliefs to the general public. The study also assesses how movies can be used as a teaching method about the Cold War in the subject of history in Swedish upper secondary schools. The main object for the analysis is two movies All the King’s Men (1949) and Rio Bravo (1959), and how they’re used to spread ideological messages to the masses. This study will also try to explain how two political beliefs, communism and McCarthyism rose to such prominent positions in Hollywood. The tools for the analysis of the movies are based on three methods by Jeff Smith about analyzing movies. Furthermore, I’ve presented previous research about films with political messages made during the same period and also what has been said about showing films for educational purposes in the subject of history. The results from this study shows that you can interpret that some films made in Hollywood during the early stages of the Cold War had political messages in them, if you knew what to look for. The results also show that films can and should be used for educational purposes about the Cold War as long as it’s done properly, so that the students can broaden their historical knowledge.
8

As escolhas temáticas, técnicas e práticas como elementos de afirmação e resistência política em O sal da terra de Herbert Biberman / The thematic, technic and practice choices as elements of political statement and resistence in Salt of the earth by Herbert Biberman

Maris Stella de Araújo Rodrigues de Oliveira 01 October 2010 (has links)
O Sal da Terra (Salt of the Earth) de 1954 de Herbert Biberman (1900-1971) foi emblemático para a história do cinema americano. O filme baseado em um evento real da história americana uma greve de mineiros no Novo México foi censurado durante o período da Guerra Fria e aqueles que fizeram parte de sua produção foram perseguidos por longos períodos, tendo suas carreiras arruinadas dentro do território americano. O objetivo deste estudo é demonstrar que as escolhas feitas por aqueles que produziram, dirigiram e participaram do filme revelam o posicionamento político, social e cultural fruto das lutas históricas de cada um dos grupos participantes. A maneira como Herbert Biberman (diretor), Paul Jarrico (produtor) e Michael Wilson (roteirista) criaram um filme de gênero híbrido e as escolhas estéticas e técnicas necessárias para sua consecução demonstram um resultado baseado na crença política dos criadores aliado à vontade de um povo em mostrar sua história. A análise será feita tendo textos basilares de autores como Walter Benjamin, Peter Szondi e Bertold Brecht, tratando questões relacionadas à forma de narrar e de mostrar através de escolhas baseadas na história. Também foram de grande ajuda os textos históricos de Rodolfo Acuña sobre o povo do Novo México, bem como os textos referentes ao filme em si. Considerar para esta análise a base histórica e política de todos que, de alguma maneira, participaram do filme é fator essencial para a compreensão e entendimento deste trabalho. / Salt of the Earth was emblematic to the history of the American cinema. The movie based on a true event of American history a miner strike in New Mexico was suppressed during the period of Cold War, and those who worked in its production were pursued for a long time, and their carriers were ruined inside American territory. The aim of this study is to show that the choices made by those who produced, directed and participated in the film reveal the political, social and cultural positioning, result of the historical fights of each group inside the movie. The way as Herbert Biberman (director), Paul Jarrico (producer), and Michael Wilson (screenwriter) created a movie with a hybrid genre and the aesthetic choices and techniques needed for its consecution shows a result based on creators political belief, allied with the people desire in showing its history. The analysis was made with authors basilar texts as Walter Benjamin, Peter Szondi, Bertold Brecht, treating questions related to the way of telling and showing through the choices based on history. It was also helpful the historical text from Rodolfo Acuña about New Mexico, as well the texts referred to the movie itself. Considering to this analysis the historical and political basis of everyone who, in any way, worked in the movie, is an essential factor to the understanding and comprehension of this job.
9

Detekce malware pomocí analýzy DNS provozu / Malware Detection Using DNS Traffic Analysis

Daniš, Daniel January 2016 (has links)
This master thesis deals with the design and implementation of a tool for malware detection using DNS traffic analysis. Text of the thesis is divided into theoretical and practical part. In theoretical part the reader will be acknowledged with the domain of malware and botnet detection. Consequently, various options and methods of malware detection will be described. Practical part of the thesis contains description of malware detection tool architecture as well as key aspects of its implementation. Moreover, the emphasis is being placed on testing and experiments. The result of the thesis is a tool, written in python, for malware detection using DNS traffic analysis, that uses a combination of several methods of detection.
10

Using network resources to mitigate volumetric DDoS / Utiliser les ressources réseaux pour atténuer les attaques DDoS volumétriques

Fabre, Pierre-Edouard 13 December 2018 (has links)
Les attaques massives par déni de service représentent une menace pour les services Internet. Ils impactent aussi les fournisseurs de service réseau et menace même la stabilité de l’Internet. Il y a donc un besoin pressant de contrôler les dommages causés par ces attaques. De nombreuses recherches ont été menées, mais aucune n’a été capable de combiner le besoin d’atténuation de l’attaque, avec l’obligation de continuité de service et les contraintes réseau. Les contre mesures proposées portent sur l’authentification des clients légitimes, le filtrage du trafic malicieux, une utilisation efficace des interconnections entre les équipements réseaux, ou l’absorption de l’attaque par les ressources disponibles. Dans cette thèse, nous proposons un mécanisme de contrôle de dommages. Basé sur une nouvelle signature d’attaque et les fonctions réseaux du standard Multiprotocol Label Switching (MPLS), nous isolons le trafic malicieux du trafic légitime et appliquons des contraintes sur la transmission du trafic malicieux. Le but est de rejeter suffisamment de trafic d’attaque pour maintenir la stabilité du réseau tout en préservant le trafic légitime. La solution prend en compte des informations sur l’attaque, mais aussi les ressources réseaux. Considérant que les opérateurs réseaux n’ont pas une même visibilité sur leur réseau, nous étudions l’impact de contraintes opérationnelles sur l’efficacité d’une contre mesure régulièrement recommandée, le filtrage par liste noire. Les critères d’évaluation sont le niveau d’information sur l’attaque ainsi que sur le trafic réseau. Nous formulons des scénarios auxquels chaque opérateur peut s’identifier. Nous démontrons que la l’algorithme de génération des listes noires doit être choisi avec précaution afin de maximiser l’efficacité du filtrage / Massive Denial of Service attacks represent a genuine threat for Internet service, but also significantly impact network service providers and even threat the Internet stability. There is a pressing need to control damages caused by such attacks. Numerous works have been carried out, but were unable to combine the need for mitigation, the obligation to provide continuity of service and network constraints. Proposed countermeasures focus on authenticating legitimate traffic, filtering malicious traffic, making better use of interconnection between network equipment or absorbing attack with the help of available resources. In this thesis, we propose a damage control mechanism against volumetric Denial of Services. Based on a novel attack signature and with the help of Multiprotocol Label Switching (MPLS) network functions, we isolate malicious from legitimate traffic. We apply a constraint-based forwarding to malicious traffic. The goal is to discard enough attack traffic to sustain network stability while preserving legitimate traffic. It is not only aware of attack details but also network resource, especially available bandwidth. Following that network operators do not have equal visibility on their network, we also study the impact of operational constraints on the efficiency of a commonly recommended countermeasure, namely blacklist filtering. The operational criteria are the level of information about the attack and about the traffic inside the network. We then formulate scenario which operators can identify with. We demonstrate that the blacklist generation algorithm should be carefully chosen to fit the operator context while maximizing the filtering efficiency

Page generated in 0.0547 seconds