Erratum to: Using Natural-Kind Essentialism to Defend Dispositionalism

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Delay to Defend Against Database Extraction

For many data providers, the “crown jewels” of their business are the data that they have organized. If someone could copy their entire database, it would be a competitive catastrophe. Yet, a data provider is in the business of providing data, so access to the database cannot be restricted entirely. How is the data provider to permit legitimate access to users who request access to small portio...

متن کامل

To Defend or Not To Defend: That’s the Question

Enterococcus faecalis is an opportunistic pathogen and is one of the leading causes of nosocomial infections. E. faecalis harbors a number of antibiotic resistance genes, and most of these are present on mobile genetic elements (MGEs) that can be disseminated within the species, as well as to other members of the human microflora. In an article by Price and colleagues [V. J. Price et al., mSphe...

متن کامل

Erratum to: Armentum: a hybrid direct search optimization methodology

In the original publication of this article unfortunately the co-authors were omitted. The two co-authors are displayed now.

متن کامل

Hijacking .NET to Defend PowerShell

With the rise of attacks using PowerShell in the recent months, there has not been a comprehensive solution for monitoring or prevention. Microsoft recently released the AMSI solution for PowerShell v5, however this can also be bypassed. This paper focuses on repurposing various stealthy runtime .NET hijacking techniques implemented for PowerShell attacks for defensive monitoring of PowerShell....

متن کامل

Using Random Bit Authentication to Defend IEEE 802.11 DoS Attacks

IEEE 802.11 networks are insecure. Wired Equivalent Privacy (WEP), the security mechanism used in 802.11, was proved to be vulnerable. IEEE 802.11i, the security enhancement, concentrates only on integrity and confidentiality of transmitted frames. Either version did not properly handle the network availability. Because management frames are not authenticated, {802.11, 802.11i} networks are sus...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Erkenntnis

سال: 2013

ISSN: 0165-0106,1572-8420

DOI: 10.1007/s10670-013-9534-4