نتایج جستجو برای: legitimate

تعداد نتایج: 10391  

2006
Morton Swimmer Ian Whalley Barry Leiba Nathaniel S. Borenstein

The existance of networks of ‘bots’ raises the possibility of a new type of spam that breaks the current paradigm of spam defense, in which the defence acts purely as a filter. This spam, which we call parasitic spam, looks to a filter very much like spam with scraped text, but contains instead legitimate content going from a legitimate sender to a legitimate recipient. In this problem statemen...

1997
Thomas Tobin George D. Mundy

Modern analytical tests, including those for legitimate therapeutic medications, can be extremely sensitive. Because of this, ineffective traces or residues of a number of legitimate therapeutic medications can be detected for significant periods after the pharmacological effects of the medications have dissipated. This review outlines both the mechanisms and the information base that the perfo...

2015
Ali Yusny Daud Osman Ghazali Mohd Nizam Omar

A stepping-stone connection has always been assumed as an intrusion since the first research on stepping-stone connections twenty years ago. However, not all stepping-stone connections are malicious. This paper proposes an enhanced stepping-stone detection (SSD) technique which is capable to identify legitimate connections from stepping-stone connections. Stepping-stone connections are identifi...

2012
Karim O. Elish Barbara G. Ryder

This paper describes an efficient approach for identifying malicious Android mobile applications through specialized static program analysis. Our solution performs offline analysis and enforces the normal properties of legitimate dataflow patterns to identify programs that violate these properties. To demonstrate the feasibility of our user-centric dependence analysis, we implement a tool to ge...

2006
Masahiro Yasugi Tasuku Hiraishi Taiichi Yuasa

We propose a new language concept called “L-closures” for a running program to legitimately inspect/modify the contents of its execution stack. L-closures are lightweight lexical closures created by evaluating nested function definitions. A lexical closure can access the lexicallyscoped variables in the creation-time environment and indirect calls to it provide legitimate stack access. By using...

2004
Jack M. Balkin Frank Michelman

When people gather to celebrate the contributions of a preeminent scholar like Frank Michelman, the most likely focus of discussion will be the important papers that scholar wrote in years past that have helped define a field and have taken on a canonical status. Frank has certainly written his share of those, and in a number of different areas of legal study. But there is special enjoyment in ...

2007
Stephen A. Leybourne

This paper considers the evolving literature on Organizational Improvisation, considering a number of different perspectives relating to its use and acceptance within a typology of modern management styles. Cunha et al.’s (1999) work is identified as a starting point, and particular attention is given to the gradual integration of improvisational working styles into the lexicon of management th...

Journal: :Clinical chemistry 2009
John E M Midgley Nic D Christofides

In the history of clinical immunoassay, even up to the present day, no group of tests has been subjected to more scrutiny and controversy than analog-type freeanalyte assays (1– 4 ). Unfortunately, inappropriate design of many experiments has led users to an incorrect perspective of how analog assays work. An analysis of the important series of studies by Nelson and coworkers (5–10 ) shows that...

Journal: :CoRR 2011
Tobias Opthof Loet Leydesdorff

Tobias Opthof 1,2 & Loet Leydesdorff 3 Abstract In reaction to a previous critique (Opthof & Leydesdorff, 2010), the Center for Science and Technology Studies (CWTS) in Leiden proposed to change their old “crown” indicator in citation analysis into a new one. Waltman et al. (2011a) argue that this change does not affect rankings at various aggregated levels. However, CWTS data is not publicly a...

Journal: :American journal of law & medicine 2006
Donald deKieffer

Over the past five years, there have been over 140 reported incidents of counterfeit and mislabeled drugs being sold by legitimate pharmacies in the United States. Thousands of patients have consumed these medications, sometimes with dire consequences. The extent of counterfeits in the legitimate market, however, is unknown. It is certain that the detected incidents of fakes are a fraction of t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید