-
1
Ransomed by God into His household: interpreting the ransom imagery in 1 Peter within the economic context of its author and addressees
Published 2013-12-01“… 1 Peter 1:18 states: “You know that you were ransomed ...” (NRSV). This article offers an interpretation of the ransom image in 1 Peter within the economic context of the author and addressees, taking into consideration the relevant structure of economics (the geography and demography of the areas identified in the address of 1 Peter) and relevant performance of economics (production, distribution and consumption) in the area where the addressees of 1 Peter lived. …”
Get full text
Article -
2
Le Ransom Center écrit une nouvelle page de l’histoire des archives photographiques
Published 2014-01-01Get full text
Article -
3
Femmes dans la guerre (XIVe-XVe siècles) : un rôle caché par les sources ?
Published 2004-02-01Subjects: Get full text
Article -
4
Vente et rançonnement du butin humain des armées romaines à l’époque des conquêtes (264 av. J.-C. – 117 ap. J.-C.)
Published 2014-12-01Subjects: Get full text
Article -
5
THE CONSEQUENCES OF KIDNAPPING ON THE COMMUNITY: A CASE STUDY OF ZURMI, ZAMFARA STATE
Published 2024-12-01Subjects: Get full text
Article -
6
-
7
Song Melody and Speech Tone Conflict in Translated Yorùbá Christian Hymns
Published 2022-07-01Subjects: “…Keywords: Translation, Yoruba hymns, speech tone, J. J. Ransome-Kuti, Rev. A. T. Ola Olude.…”
Get full text
Article -
8
Je suis un zombie : Études récentes sur Richard Matheson et le mort-vivant
Published 2013-12-01Get full text
Article -
9
-
10
The Influence of Prior Obstetrical History on Current 17-Hydroxyprogesterone Caproate Use
Published 2011-01-01Get full text
Article -
11
-
12
-
13
The Transcultural Diabetes Nutrition Algorithm: A Canadian Perspective
Published 2014-01-01Get full text
Article -
14
Satellite microglia: marker of traumatic brain injury and regulator of neuronal excitability
Published 2025-01-01Get full text
Article -
15
-
16
-
17
The NANOGrav 15 Yr Data Set: Removing Pulsars One by One from the Pulsar Timing Array
Published 2025-01-01Get full text
Article -
18
Survey of software anomaly detection based on deception
Published 2022-02-01“…Advanced persistent threats (APT) will use vulnerabilities to automatically load attack code and hide attack behavior, and exploits code reuse to bypass the non-executable stack & heap protection, which is an essential threat to network security.Traditional control flow integrity and address space randomization technologies have effectively prevented the pace of APT.However, the complexity of the software and the evolution of attacks make the software still being vulnerable.For this reason, deception defense with resources as bait is an indispensable supplement for network security.The trapping mechanism consists of bait design and attack detection, which infer possible unauthorized access or malicious attacks by sensing the interaction behavior with the bait.According to the three types of bait, which are file, data and code, the automatic construction scheme of bait is designed and deployed, and the effectiveness of bait is measured from the aspects of believability, detectability and enticement, etc.Ransom ware detection based on deception defense focuses on the deployment location of bait files, and in the area of vulnerability detection, code reuse attacks are detected by injecting bait code.Research work related to the implementation of deception defense in each phase of APT attacks was introduced, and the mechanism of deception defense from bait type, bait generation, bait deployment, and bait measurement was described.Simultaneously, deception defense applications in ransom ware detection, vulnerability detection, and Web security were analyzed.In response to the shortcomings of existing ransom ware detection research in terms of bait file design and deployment, a dynamic update method of bait for ransom ware detection was proposed.The deception defense challenges were discussed and hoped that deception defense can provide theoretical and technical support for discovering unknown attacks and attack attribution.…”
Get full text
Article -
19
Prix des captifs, prix des esclaves : l’estimation du « prix de l’Homme » dans l’Antiquité tardive
Published 2014-12-01“…Latin, unlike ancient Greek, makes no distinction between the price of a slave and the ransom paid for a captive. Furthermore, the price of captives was generally the same as the ransom for comparable individuals. …”
Get full text
Article -
20
Notes on sufficient conditions for a graph to be Hamiltonian
Published 1991-01-01Get full text
Article