نتایج جستجو برای: keywords victim

تعداد نتایج: 1984901  

Journal: :Astronomy & Geophysics 2011

Journal: :Crossing Borders: Student Reflections on Global Social Issues 2019

Journal: :The Musical Times and Singing Class Circular 1886

Journal: :Journal of Interpersonal Violence 2015

Journal: :Intellectual and developmental disabilities 2007
Shunit Reiter Noam Lapidot-Lefler

Harassment and bullying among 186 students with intellectual disabilities, ages 12 to 21 years, in special education schools were examined. The differences between bullies and victims in terms of social adjustment and social skills were investigated. No prototypes characterizing differences in social skills were found between the three subgroups: victim, bully, and victim-bully. However, bullie...

Journal: :CoRR 2015
Hrishikesh Deshpande

Today, internet and web services have become an inseparable part of our lives. Hence, ensuring continuous availability of service has become imperative to the success of any organization. But these services are often hampered by constant threats from myriad types of attacks. One such attack is called distributed denial of service attack that results in issues ranging from temporary slowdown of ...

2013
Jarrod Trevathan Trina Myers

Social networking is one of the most successful and popular tools to emerge from the Web 2.0 era. However, the increased interconnectivity and access to peoples’ personal lives and information has created a plethora of opportunities for the nefarious side of human nature to manifest. This paper categorizes and describes the major types of anti-social behavior and criminal activity that can aris...

Journal: :JIPS 2011
HyoJin Kim Ramachandra Bhargav Chitti JooSeok Song

Mobile ad hoc networks are expected to be widely used in the near future. However, they are susceptible to various security threats because of their inherent characteristics. Malicious flooding attacks are one of the fatal attacks on mobile ad hoc networks. These attacks can severely clog an entire network, as a result of clogging the victim node. If collaborative multiple attacks are conducted...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید