نتایج جستجو برای: bad mouthing attack

تعداد نتایج: 110943  

Journal: :Journal of virology 2016
Hyoji Kim Hoyun Choi Suk Kyeong Lee

UNLABELLED Epstein-Barr virus (EBV) is a human gammaherpesvirus associated with a variety of tumor types. EBV can establish latency or undergo lytic replication in host cells. In general, EBV remains latent in tumors and expresses a limited repertoire of latent proteins to avoid host immune surveillance. When the lytic cycle is triggered by some as-yet-unknown form of stimulation, lytic gene ex...

2009
José Manuel Moya Juan Carlos Vallejo David Fraga Álvaro Araujo Daniel Villanueva Juan-Mariano de Goyeneche

Security in wireless sensor networks is difficult to achieve because of the resource limitations of the sensor nodes. We propose a trust-based decision framework for wireless sensor networks coupled with a non-deterministic routing protocol. Both provide a mechanism to effectively detect and confine common attacks, and, unlike previous approaches, allow bad reputation feedback to the network. T...

2010
Sara Kiesler Aniket Kittur

According to an old English saying, “one bad apple spoils the whole barrel.” In online communities there’s some truth to this notion. A stalker, thief, troll, or impersonator can ruin the community experience for the majority of members who respect the intent of the site and the feelings of others. Misbehavior need not be illegal to be destructive. People who consume benefits without giving any...

Journal: :isecure, the isc international journal of information security 0
m. safkhani computer engineering department, shahid rajaee teacher training university, tehran, iran n. bagheri electrical engineering department, shahid rajaee teacher training university, tehran, iran

recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probabilit...

2009
LISA TESSMAN Lisa Tessman

This paper draws on Card’s discussions of moral luck to consider the complicated moral life of people—described as pessimists—who accept the heavy knowledge of the predictability of the bad moral luck of oppression. The potential threat to ethics posed by this knowledge can be overcome by the pessimist whose resistance to oppression, even in the absence of hope, expresses a sense of still havin...

2017
F. Betül Durak Serge Vaudenay

The National Institute of Standards and Technology (NIST) recently published a Format-Preserving Encryption standard accepting two Feistel structure based schemes called FF1 and FF3. Particularly, FF3 is a tweakable block cipher based on an 8-round Feistel network. In CCS ̃2016, Bellare et. al. gave an attack to break FF3 (and FF1) with time and data complexity $O(Nˆ5\log(N))$, which is much lar...

Journal: :Collabra 2022

This study explores whether the speech motor system is involved in verbal rumination, a particular kind of inner speech. The simulation hypothesis considers as an action, accompanied by simulated percepts, that would such involve system. If so, we could expect rumination to be disrupted concurrent involvement apparatus. We recruited 106 healthy adults and measured their self-reported level befo...

Journal: :Personality & social psychology bulletin 2014
Angela M Legg Kate Sweeny

Information often comes as a mix of good and bad news, prompting the question, "Do you want the good news or the bad news first?" In such cases, news-givers and news-recipients differ in their concerns and considerations, thus creating an obstacle to ideal communication. In three studies, we examined order preferences of news-givers and news-recipients and the consequences of these preferences....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید