121 resultados para distributed denial-of-service attack


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the recent Australian decision in Cubillo and Gunner v The Commonwealth ( ‘Cubillo 3’ ), the Full Court of the Federal Court dismissed an appeal by the Aboriginal claimants seeking damages for, inter alia, their removal from their families and detention at certain Aboriginal institutions. The removal and detention of the plaintiffs was held to be lawful in the earlier determination of O’Loughlin J because it was, inter alia, believed to be in the [then] child’s best interests and, as the plaintiffs bore the onus of proof, they had failed to show that they were taken without the consent of their parents/guardians. This decision was based upon the factual finding that ‘at the relevant times, there was no general policy in force in the Northern Territory supporting the indiscriminate removal and detention of part-Aboriginal children, irrespective of the personal circumstances of each child’. The Full Court did not comment on O’Loughlin J’s assertion that the policy of removing part-Aboriginal children, as asserted by the plaintiffs, could not be maintained. Moreover, the Full Court in fact joined O’Loughlin J in trying to distance their findings from the broader issue of the legal rights of members of the Stolen Generation, emphasising that they were only concerned with the particular circumstances of the two plaintiffs/appellants. This case comment is not aimed at evaluating the specific legal issues raised by the plaintiffs’ claims in this case or reviewing the history of the Stolen Generation, but rather seeks to examine O’Loughlin J’s comment as to the absence of a policy of indiscriminate removal and detention of part-Aboriginal children in a bid to determine the parameters intended by the court. It will be seen that, at its broadest, the statement is quite inflammatory and may be seen as a denial of the Stolen Generation. It will be submitted that this was not intended by the court. At its narrowest, the statement is merely an assertion that the particular plaintiffs failed to prove their cases. It will be submitted that, whilst this clearly was the view of the court, O’Loughlin J’s statement does have broader implications which, it will be contended, are not warranted.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Inequalities in health and wellbeing within low socioeconomic (SES)  environments are well documented. Factors inherent to the health care system itself, such as inaccessible, inflexible or inappropriate seroiceprovision, contribute to the poorer health status ofresidents oflow SES areas. This paper explores the issues ofseroice provision in low SES areas, documenting the perceptions of seroice providers about the seroice needs of residents, in order to understand the systemic factors that negatively impact on health and wellbeing. A total of54 health and welfare seroice providers from two adjacent low SES suburbs within regional Victoria were interoiewed using qualitative research methods. Keyfindings indicate that successful navigation of health care seroices by residents within these low SES environments is being impeded by issues ofaccess, a lack ofappropriate early interoention options or measures, and general resident disempowerment. Central to the improvement of seroice provision is the need for seroices to become economically, geographically and culturally accessible. In particular, the importance of community involvement in health planning and health promoting seroices must be reflected in the ethos ofseroice provision.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Many terrorist attacks are accomplished by bringing explosive devices hidden in ordinary-looking objects to public places. In such case, it is almost impossible to distinguish a terrorist from ordinary people just from the isolated appearance. However, valuable clues might be discovered through analyzing a series of actions of the same person. Abnormal behaviors of object fetching, deposit, or exchange in public places might indicate potential attacks. Based on the widely equipped CCTV surveillance systems at the entrance of many public places, this paper proposes an algorithm to detect such abnormal behaviors for early warning of terrorist attack.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Research consistently demonstrates the strategic benefits of providing quality in service delivery (Tse and Wilton 1988; Anderson and Zeithaml 1984). However, to deliver a quality service, it is first necessary to determine the level of quality expectations that consumers have for a particular service industry. This paper examines whether quality expectations vary across services based on their degree of total intangibility. A controlled, repeated measures design is utilised, whereby subjects are each asked to evaluate three services that vary in their degree of intangibility. Contrary to past findings, results indicate that consumer expectations for service quality do not vary with the level of intangibility of the service.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents a conceptual model and propositions outlining how, in a service recovery encounter, service guarantees (unconditional and specific) operate in conjunction with other organisational recovery variables (guarantee facilitation and service provider concern), to influence customers’ justice perceptions and subsequent satisfaction evaluations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Anecdotal evidence suggests that service guarantees and personal requests by service workers encourage customers to voice following failure. However, empirical support for these tactics in facilitating complaints to the organisation is limited. To address this deficiency, a 3 (guarantee treatment: none, unconditional or combined) x 2 (personal request to voice: yes or no) x 2 (failure severity: minor or major) full factorial, between subjects experiment was conducted in a restaurant context. Findings suggest that offering a service guarantee, regardless of whether it is unconditional or combined, can encourage voice. Severity of the failure was also found to be associated with voice. Surprisingly, however, a personal request to voice was not related to customers’ voice intentions. Implications of the findings are discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Radio Frequency Identification (RFID) system is a remote identification technology which is taking the place of barcodes to become electronic tags of an object. However, its radio transmission nature is making it vulnerable in terms of security. Recently, research proposed that an RFID tag can contain malicious code which might spread viruses, worms and other exploits to middleware and back-end systems. This paper is proposing a framework which will provide protection from malware and ensure the data privacy of a tag. The framework will use a sanitization technique with a mutual authentication in the reader level. This will ensure that any malicious code in the tag is identified. If the tag is infected by malicious code it will stop execution of the code in the RFIF system. Here shared unique parameters are used for authentication. It will be capable of protecting an RFID system from denial of service (DOS) attack, forward security and rogue reader better than existing protocols. The framework is introducing a layer concept on a smart reader to reduce coupling between different tasks. Using this framework, the RFID system will be protected from malware and also the privacy of the tag will be ensured.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Over the last seven decades, Papua New Guinea (PNG) has grown from a disparate collection of traditional societies loosely governed by its neighbour, Australia, to a thriving, developing state. The story of how PNG came to lose its colonial shackles and gain independence is one of collective endeavour, as the tiny group of Papua New Guineans who gathered in the dusty streets of Port Moresby transformed into the leaders of the new nation. One of them was the young teacher, Ebia Olewale, who in his own journey from the village to the nation experienced many triumphs and tragedies. PNG’s story – from the village to the world – is retold in this book, through the experiences of Ebia Olewale.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A good intrusion system gives an accurate and efficient classification results. This ability is an essential functionality to build an intrusion detection system. In this paper, we focused on using various training functions with feature selection to achieve high accurate results. The data we used in our experiments are NSL-KDD. However, the training and testing time to build the model is very high. To address this, we proposed feature selection based on information gain, which can detect several attack types with high accurate result and low false rate. Moreover, we executed experiments to category each of the five classes (probe, denial of service (DoS), user to super-user (U2R), and remote to local (R2L), normal). Our proposed outperform other state-of-art methods.