998 resultados para BoT


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ersch. jährl.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"Reprinted from the Cornell Veterinarian, July, 1922"

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Partnerstwo publiczno-prywatne zyskuje coraz większą popularność w realizacji zadań publicznych, szczególnie w obszarze inwestycji infrastrukturalnych. W toku upowszechniania wykorzystania kapitału i wiedzy pochodzącej z sektora prywatnego do realizacji inwestycji, które dotychczas były domeną sektora publicznego wykształciły się różne modele partnerstwa. Jednym z najpowszechniejszych z nich jest model BOT, czyli build, operate and transfer, co w przekładzie na język polski oznacza buduj, eksploatuj i przekaż. Już samo rozwinięcie tego skrótu, wystarcza do opisania w sposób ogólny tej koncepcji. Polega ona na wykorzystaniu potencjału gospodarczego i organizacyjnego partnera prywatnego do budowy określonego obiektu użyteczności publicznej, następnie podmiot ten odzyskuje poniesione koszty i zapewnia sobie odpowiednią stopę zysku dzięki eksploatacji tego obiektu na podstawie udzielonej mu koncesji. Po wygaśnięciu koncesji prawa do eksploatacji obiektu wracają w posiadanie podmiotu publicznego. Niniejszy artykuł ma charakter poglądowy. Autor na wstępie przybliża podstawy prawne partnerstwa oraz status prawny jego uczestników. Następnie w oparciu o regulacje prawne przedstawiony zostaje proces realizacji przedsięwzięcia BOT, po czym określane są potencjalne korzyści i koszty płynące z zastosowania tego modelu.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ensuring the security of computers is a non-trivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emerged in the form of networks of hijacked zombie machines used to perform complex distributed attacks such as denial of service and to obtain sensitive data such as password information. These zombie machines are said to be infected with a dasiahotpsila - a malicious piece of software which is installed on a host machine and is controlled by a remote attacker, termed the dasiabotmaster of a botnetpsila. In this work, we use the biologically inspired dendritic cell algorithm (DCA) to detect the existence of a single hot on a compromised host machine. The DCA is an immune-inspired algorithm based on an abstract model of the behaviour of the dendritic cells of the human body. The basis of anomaly detection performed by the DCA is facilitated using the correlation of behavioural attributes such as keylogging and packet flooding behaviour. The results of the application of the DCA to the detection of a single hot show that the algorithm is a successful technique for the detection of such malicious software without responding to normally running programs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Malicious users try to compromise systems using new techniques. One of the recent techniques used by the attacker is to perform complex distributed attacks such as denial of service and to obtain sensitive data such as password information. These compromised machines are said to be infected with malicious software termed a “bot”. In this paper, we investigate the correlation of behavioural attributes such as keylogging and packet flooding behaviour to detect the existence of a single bot on a compromised machine by applying (1) Spearman’s rank correlation (SRC) algorithm and (2) the Dendritic Cell Algorithm (DCA). We also compare the output results generated from these two methods to the detection of a single bot. The results show that the DCA has a better performance in detecting malicious activities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Public Private Partnership (PPP) is a well established methodology for procuring public works projects. By incorporating the private sector’s expertise, efficiency, innovation, business sense, risk sharing, financing etc. into public works projects, the quality of public services and facilities can be uplifted. Like many jurisdictions, Hong Kong is also keen to take aboard this methodology which is so familiar but yet so distant. Although they have been one of the first jurisdictions to utilise the private sector in public works projects, their comfortable financial reserves has meant that there has been no urge to push the movement until recently. PPP has become increasingly popular amongst governments. The Hong Kong Special Administrative Region (HKSAR) government is no exception. Some of the more active works departments have commissioned studies to investigate the best ways to deliver these projects, others have even trialed the method themselves. The efficiency Unit of the HKSAR government has also become an active arm in conducting research in this area. Although so, the information that is currently available is still very broad. Building from their works there is a need to develop a best practice framework for implementing PPP projects in Hong Kong by incorporating international experiences. To develop a best practice framework will require thorough investigation into the benefits, difficulties and critical success factor of PPP. PPP should also be compared with other procurement methods. In order to do so it is important to clearly understand the local situation by an analysis of projects conducted to date. Lessons learnt can further be derived from other countries and incorporated to those derived locally. Finally the best conditions in terms of project nature, complexity, types, and scales for adopting PPP should be derived. The aim and objectives of this study were achieved via a comprehensive literature review, in-depth case analyses, interview survey with experts from both Hong Kong and overseas, and finally a large scale data collection was conducted via a questionnaire survey with PPP practitioners. These findings were further triangulated before they were used as the basis to form the best practice framework presented in this thesis. The framework was then further validated by PPP experts to ensure it is comprehensive, objective, reliable and practical. This study has presented a methodology that can be adopted for future studies. It has also updated our knowledge on the development trends of PPP as well as opened up the experiences of other jurisdictions. The findings have shown that the local industry is familiar with “what” should be done in PPP projects but they are unsure of “how” these goals can be achieved. This framework has allowed this further knowledge to be delivered to PPP practitioners. As a result, the development of this framework can help to resolve the current economic crisis by encouraging more developments and business opportunities for the private sector. In addition, the correct projects can be delivered by PPP, the advantages of PPP can be maximised, and the general public can benefit from the private sector’s participation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Botnets are large networks of compromised machines under the control of a bot master. These botnets constantly evolve their defences to allow the continuation of their malicious activities. The constant development of new botnet mitigation strategies and their subsequent defensive countermeasures has lead to a technological arms race, one which the bot masters have significant incentives to win. This dissertation analyzes the current and future states of the botnet arms race by introducing a taxonomy of botnet defences and a simulation framework for evaluating botnet techniques. The taxonomy covers current botnet techniques and highlights possible future techniques for further analysis under the simulation framework. This framework allows the evaluation of the effect techniques such as reputation systems and proof of work schemes have on the resources required to disable a peer-to-peer botnet. Given the increase in the resources required, our results suggest that the prospects of eliminating the botnet threat are limited.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Reputation and proof-of-work systems have been outlined as methods bot masters will soon use to defend their peer-to-peer botnets. These techniques are designed to prevent sybil attacks, such as those that led to the downfall of the Storm botnet. To evaluate the effectiveness of these techniques, a botnet that employed these techniques was simulated, and the amount of resources required to stage a successful sybil attack against it measured. While the proof-of-work system was found to increase the resources required for a successful sybil attack, the reputation system was found to lower the amount of resources required to disable the botnet.