• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 158
  • 30
  • 17
  • 17
  • 12
  • 11
  • 6
  • 5
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 309
  • 123
  • 54
  • 46
  • 43
  • 36
  • 34
  • 33
  • 32
  • 31
  • 31
  • 29
  • 26
  • 26
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Classification of Denial in Sex Offenders; an Investigation of Response Styles

Cruise, Keith R. 05 1900 (has links)
Standard psychological assessment instruments have not produced consistent results by which decisions can be made regarding the appropriate placement and legal disposition of an individual who has committed a sexual offense. The purpose of the present study was to systematically investigate deception and dissimulation as measured by three assessment instruments commonly utilized with sex offenders. A denial classification system was utilized in order to classify offenders into categories based on their level of admission to the legal system. The four group classification system did not produce significant differences on all measures of deception and dissimulation. Contrary to previous research, admitters were found to respond more defensively than deniers on one of the assessment instruments. In addition, partial deniers were identified as responding significantly differently from both admitters and deniers on a separate instrument. The differences found suggest that sex offenders' level of deception is multifaceted. Difficulties in identifying classificatory strategies and implications for theoretical conceptions of denial within this population are discussed.
32

Trestněprávní a kriminologické aspekty kyberkriminality se zaměřením na útoky typu odepření služby / Criminal and criminological aspects of cybercrime with a focus on denial of service attacks

Přívozník, Lukáš January 2019 (has links)
Criminal and criminological aspects of cybercrime with a focus on denial of service attacks Abstract The aim of this master thesis is to analyze the criminal law assessment of denial of service (DoS) cyber-attacks and related criminological aspects. The author deals with the technical characteristics and typology of this type of attack. He analyzes its individual variants, as the way of performing the attack, that is reflected in its criminal assessment. The thesis also describes the facts concerning the largest series of DoS attacks that occurred in the Czech Republic in 2013. Next, the author deals with the criminological aspects of cybercrime, namely its expansion and latency, the perpetrators and victims of the denial of service attack and related prevention, including techniques and methods of defense against this attack. In the main part of the thesis, the author analyzes the criminal law aspects of this specific type of crime. The thesis deals with the development of law in this area at international level, within the European Union and at national level. It also deals with the analysis of the factual situation of cybercrime provided for in Sections 230 to 232 of the Criminal Code and the criminal law assessment of individual variants of the attack. The thesis deals with related problematic points,...
33

Post-capitalism, post-growth, post-consumerism? Eco-political hopes beyond sustainability

Blühdorn, Ingolfur 03 1900 (has links) (PDF)
As a road map for a structural transformation of socially and ecologically self-destructive consumer societies, the paradigm of sustainability is increasingly regarded as a spent force. Yet, its exhaustion seems to coincide with the rebirth of several ideas reminiscent of earlier, more radical currents of eco-political thought: liberation from capitalism, consumerism and the logic of growth. May the exhaustion of the sustainability paradigm finally re-open the intellectual and political space for the big push beyond the established socio-economic order? Looking from the perspective of social and eco-political theory, this article argues that the new narratives (and social practices) of postcapitalism, degrowth and post-consumerism cannot plausibly be read as signalling a new eco-political departure. It suggests that beyond the exhaustion of the sustainability paradigm, we are witnessing, more than anything, the further advancement of the politics of unsustainability - and that in this politics the new narratives of hope may themselves be playing a crucial role.
34

Anomaly detection via high-dimensional data analysis on web access data.

January 2009 (has links)
Suen, Ho Yan. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2009. / Includes bibliographical references (leaves 99-104). / Abstract also in Chinese. / Abstract --- p.i / Acknowledgement --- p.iv / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Motivation --- p.1 / Chapter 1.2 --- Organization --- p.4 / Chapter 2 --- Literature Review --- p.6 / Chapter 2.1 --- Related Works --- p.6 / Chapter 2.2 --- Background Study --- p.7 / Chapter 2.2.1 --- World Wide Web --- p.7 / Chapter 2.2.2 --- Distributed Denial of Service Attack --- p.11 / Chapter 2.2.3 --- Tools for Dimension Reduction --- p.13 / Chapter 2.2.4 --- Tools for Anomaly Detection --- p.20 / Chapter 2.2.5 --- Receiver operating characteristics (ROC) Analysis --- p.22 / Chapter 3 --- System Design --- p.25 / Chapter 3.1 --- Methodology --- p.25 / Chapter 3.2 --- System Overview --- p.27 / Chapter 3.3 --- Reference Profile Construction --- p.31 / Chapter 3.4 --- Real-time Anomaly Detection and Response --- p.32 / Chapter 3.5 --- Chapter Summary --- p.34 / Chapter 4 --- Reference Profile Construction --- p.35 / Chapter 4.1 --- Web Access Logs Collection --- p.35 / Chapter 4.2 --- Data Preparation --- p.37 / Chapter 4.3 --- Feature Extraction and Embedding Engine (FEE Engine) --- p.40 / Chapter 4.3.1 --- Sub-Sequence Extraction --- p.42 / Chapter 4.3.2 --- Hash Function on Sub-sequences (optional) --- p.45 / Chapter 4.3.3 --- Feature Vector Construction --- p.46 / Chapter 4.3.4 --- Diffusion Wavelets Embedding --- p.47 / Chapter 4.3.5 --- Numerical Example of Feature Set Reduction --- p.49 / Chapter 4.3.6 --- Reference Profile and Further Use of FEE Engine --- p.50 / Chapter 4.4 --- Chapter Summary --- p.50 / Chapter 5 --- Real-time Anomaly Detection and Response --- p.52 / Chapter 5.1 --- Session Filtering and Data Preparation --- p.54 / Chapter 5.2 --- Feature Extraction and Embedding --- p.54 / Chapter 5.3 --- Distance-based Outlier Scores Calculation --- p.55 / Chapter 5.4 --- Anomaly Detection and Response --- p.56 / Chapter 5.4.1 --- Length-Based Anomaly Detection Modules --- p.56 / Chapter 5.4.2 --- Characteristics of Anomaly Detection Modules --- p.59 / Chapter 5.4.3 --- Dynamic Threshold Adaptation --- p.60 / Chapter 5.5 --- Chapter Summary --- p.63 / Chapter 6 --- Experimental Results --- p.65 / Chapter 6.1 --- Experiment Datasets --- p.65 / Chapter 6.1.1 --- Normal Web Access Logs --- p.66 / Chapter 6.1.2 --- Attack Data Generation --- p.68 / Chapter 6.2 --- ROC Curve Construction --- p.70 / Chapter 6.3 --- System Parameters Selection --- p.71 / Chapter 6.4 --- Performance of Anomaly Detection --- p.82 / Chapter 6.4.1 --- Performance Analysis --- p.85 / Chapter 6.4.2 --- Performance in defending DDoS attacks --- p.87 / Chapter 6.5 --- Computation Requirement --- p.91 / Chapter 6.6 --- Chapter Summary --- p.95 / Chapter 7 --- Conclusion and Future Work --- p.96 / Bibliography --- p.99
35

A good woman : silencing the self, rumination and depression in romantic relationships

Fernando, Ruwani Kumari, n/a January 2006 (has links)
"Rumination" and "Silencing the Self" have both been theorised to explain women�s greater vulnerability to depression. Rumination (Nolen-Hoeksema, e.g., 1987, 1991) refers to a passive focus on mood and symptoms, while Silencing the Self (Jack, 1991) refers to the socially-based belief that, broadly speaking, one should actively suppress one�s negative emotions and thoughts within romantic relationships. This thesis proposes that frequent suppression of negative emotional material within romantic relationships (self-silencing) makes that material more likely to be a target for rumination, resulting in greater depressed mood and depressive symptoms. It seems paradoxical that the more one tries to suppress one�s thoughts, the more one thinks about them. Wenzlaff and Luxton (2003) have demonstrated that frequent suppression may make material more accessible and a more likely target of rumination. Study 1 was a pilot investigation. It was found that self-silencing (the broad construct) and thought suppression (a narrower construct) were related, and that both were positively correlated with rumination. Furthermore, thought suppression contributed to the relationship between self-silencing and rumination for women. It was hypothesised that the more women suppress their negative feelings in romantic relationships (what Jack, 1991, describes as "Silencing the Self"), the more they will ruminate about these feelings and experience symptoms of depression. In Studies 2 and 3, the correlations among rumination, self-silencing and depression in adults and high school students were investigated. There were positive correlations among all the measured variables for adults and teenage girls, supporting the hypotheses. Regression analyses showed that for female adults and teenagers, rumination and self-silencing made unique, additive contributions to the prediction of depressive symptoms. In Studies 4 and 5, the causal relationship among self-silencing, rumination and depressed mood was investigated. Participants were asked either to write about a sad event that had happened in their relationships, or a typical (neutral) event. In Study 4, participants were also instructed to write either factually about these events, or to write in a ruminative way about them. Participants� chronic tendencies to self-silence were measured and they were classed as "high" or "low" self-silencers based on a median split. Female participants who chronically self-silenced more frequently and who ruminated experienced the most dramatic decrease in mood. In Study 5 participants wrote factually or suppressed their feelings about sad or neutral events and their tendency to ruminate was measured. Participants were divided into "high" and "low" ruminators based on a median split of their rumination scores. There was no support for the alternative hypothesis that chronic ruminators who suppressed would report depressed mood. Study 6 confirmed that in women, the combination of both chronic self-silencing in romantic relationships and acute rumination resulted in more severe symptoms of depression. Participants were e-mailed daily for one month about their self-silencing, rumination and negative mood. Chronic self-silencing, rumination and depressive symptoms were measured at the start and end of the month. Again, the combination of chronic self-silencing and acute rumination emerged as a better predictor of depressive symptoms than either variable alone. The six studies reported in this thesis support the hypothesis that self-silencing and rumination together explain short term negative mood as well as depressive symptoms even after one month. These studies explain why certain women are more likely to experience depressed mood in the context of romantic relationships. In particular, the combination of being a high self-silencer and ruminating makes one especially vulnerable to depressed mood and depressive symptoms. Clinically, there are already interventions targeted at rumination that are effective in reducing distress. However, the current research demonstrates that self-silencing may also be a promising target for intervention. Self-silencing is based on a wider understanding of the social context of depression. By targeting self-silencing, as well as rumination, depression may be more effectively treated.
36

Predicting Forgiveness in Women Experiencing Intimate Partner Violence

Gilbert, Sarah Elizabeth 01 May 2011 (has links)
Several theories have attempted to explain the stay/leave decisions of women experiencing intimate partner violence (IPV). One recent study suggests that women’s intent to return to their abusive partners was related to forgiveness of the abuse; consequently, this study aims to identify factors that may make women more likely to forgive IPV. It was hypothesized that commitment, specifically both personal dedication and constraint commitment (Stanley & Markman, 1992), would predict forgiveness and that denial of injury would mediate the relation between commitment and forgiveness, as women may be more likely to deny the severity of the abuse in order to reduce the experienced dissonance that arises from being committed to an unhealthy relationship. Finally, it was hypothesized that silencing the self (Jack, 1991) would moderate the relation between personal dedication and denial of injury. Results generally supported the hypothesis that denial of injury would mediate the relation between commitment and forgiveness. Silencing the self was not found to be a moderator. These findings, limitations, and future directions are discussed.
37

Detecting Remote Attacks

Han, Wang-tzu 30 July 2004 (has links)
With the advanced technology, our life has improved, however, it also brings the new model of crime events. Because the intrusion technique and intrusion tools are developed day by day, many computer crimes such as overstep system authority, intrusion events, computer crime, and network attack incidents are happening everywhere and everyday. In fact, those kinds of animus attack behaviors are troublesome problems. Staffs of network management may have to read security advisory, which is sent out by security organization. For example, they have to subscribe advisories for Computer Emergency Response Team or security mail list to continuously accumulate their security information. In addition, in the security protect system, they may need to spend huge fund to purchase firewall system, intrusion detection system, antivirus system and other related security protect systems. These attack behaviors have been evolved from one computer attacked to heavy attack by new intrusion model such as worm to proceed large scale spread attacking recently. Furthermore, each attack use different communication protocol and port, which is aimed at the system vulnerability, it is not easy to detect these attacks. If we can observe the variation of network traffic to detect the unusual hosts, for controlling the usage of network or occurring extraordinary phenomenon, it could help network managers to discover and solve network attack problems in time. Lately, many intrusion events have been happened increasingly, and the denial-of-service has become the most serious network event of the Computer Crime and Security Survey of FBI/CSI in 2003. Therefore, in various attacking types, we choose vulnerability scan and denial-of-service as our research direction. This research extend to develop IPAudit[16], a network traffic monitor system, which is to detect hosts flows traffic of the local area network. We establish network attack rules by using data miningclassification (C4.5) to analyze attack data, and we estimate the correctness percentage of classification. This study also uses different attack applications for the same attack type to process the cross experiment. The result has shown that the technology of data mining classification (C4.5) can help us to forecast efficiently the same attack type events.
38

China's Maritime Strategy in South Pacific Region

Wang, Shwu-bo 28 June 2005 (has links)
The South Pacific Ocean is an area easily to be disregarded, although it possesses a very significant value of the military strategy.Contemporary,the South Pacific arena has become an important part of Chinese maritime Strategy.The reform and opening up in China bring the growth of economics and trade and the extension of national power for about twenty years, meanwhile, the state suffers from the demands of energy,the dispute of sovereignty,and the problems of the defensive screen of the American Containment Policy in East.Under such circumstances, China formulates a concrete and distinct military strategy in order to strive for the interests of the sea.On this purpose, China chooses the South Pacific area to be a part of Chinese strategic arrangements.According to the strategy, as soon as China invades the defensive screen of the American Containment Policy in east, an American military will be presence. Therefore, China can depend on its base and military power in the South Pacific area to prevent from the presence of an American military and delay it for the strategic purpose of the sea denial.
39

Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet Marking

Dube, Raghav 17 February 2005 (has links)
The use of Internet has revolutionized the way information is exchanged, changed business paradigms and put mission critical and sensitive systems online. Any dis- ruption of this connectivity and the plethora of services provided results in significant damages to everyone involved. Denial of Service (DoS) attacks are becoming increas- ingly common and are the cause of lost time and revenue. Flooding type DoS attacks use spoofed IP addresses to disguise the attackers. This makes identification of the attackers extremely difficult. This work proposes a new scheme that allows the victim of a DoS attack to identify the correct origin of the malicious traffic. The suggested mechanism requires routers to mark packets using adjusted probabilistic marking. This results in a lower number of packet-markings required to identify the traffic source. Unlike many related works, we use the existing IPv4 header structure to incorporate these markings. We simulate and test our algorithms using real Internet trace data to show that our technique is fast, and works successfully for a large number of distributed attackers.
40

Mail-Filter-Funktionen

Leuschner, Jens 27 February 2002 (has links) (PDF)
Im Rahmen dieser Studienarbeit wird untersucht, welche Lösungen es momentan zur Filterung von Email mit unerwünschten Schadensfunktionen auf Mailservern gibt. Dabei werden sowohl offene als auch proprietäre Lösungen betrachtet und die momentanen Randbedingungen der TU Chemnitz beachtet.

Page generated in 0.0394 seconds