-
61
-
62
THE LEGAL REGIME OF NAMES EXCLUDED FROM PROTECTION BY INDICATIVE SIGNS
Published 2023-06-01Subjects: Get full text
Article -
63
-
64
İHMALİ HAREKETLERLE İŞLENEN DOLANDIRICILIK SUÇUNUN CEZALANDIRILMASI SORUNU
Published 2025-01-01Subjects: Get full text
Article -
65
CONDITION REGARDING PROTECTION BY INDICATIVE SIGNS
Published 2024-05-01Subjects: Get full text
Article -
66
Kişiselleştirme İllüzyonu ve Özgürlük Yanılsaması: Kültür Endüstrisi Bağlamında Talebe Bağlı Video Platformlarının İncelemesi
Published 2021-06-01Subjects: Get full text
Article -
67
Characteristic Parameter Optimization of Wireless Flaw Sensing System Based on Active Interference Suppression Algorithm
Published 2021-01-01“…Secondly, for the detection of chirp active deception jamming signals entering from the main lobe, a radar active deception jamming detection method based on the characteristic parameter matching of the harmonic components of active deception jamming signals is proposed. …”
Get full text
Article -
68
AntiGPS spoofing method for UAV based on LSTM-KF model
Published 2020-10-01“…A detection method of anti GPS deception of UAV was proposed for the problem that GPS signal of UAV was easy to be interfered and deceived,which combined deep learning and Kalman filter.The dynamic model of UAV flight was predicted from the flight state of UAV by using long short-term memory network,and the dynamic adjustment of Kalman filter and dynamic model was used to identify GPS deception.In order to resist the interference of GPS deception signal,this method did not need to increase the hardware overhead of the receiver,and was easy to realize.The experimental results show that the method has higher accuracy and lower false alarm rate for the recognition of GPS signals,and can effectively enhance the UAV's ability to resist GPS deception interference.…”
Get full text
Article -
69
Cleptobiosis in Social Insects
Published 2012-01-01“…Cleptobionts can succeed by deception or by force, and we review the literature on cleptobiosis by deception or force in social insects. …”
Get full text
Article -
70
“Looking on darkness which the blind do see”: the Figure of the Blind Girl in Dickens and the Dickensian
Published 2016-06-01“…The article focuses on the theme of blindness in Dickens’s American Notes (1842) and in The Cricket on the Hearth (1845): sight impairment is treated as a vehicle to carry the reader from landscape to inscape, staging at once truth and deception, blindness and insight. Such dramatic irony is also the leitmotif of Wilkie Collins’s Poor Miss Finch (1872) and is fully acknowledged in André Gide’s La Symphonie pastorale (1919). …”
Get full text
Article -
71
Observer-Based PID Security Control for Discrete-Time T-S Fuzzy Systems under Distributed Dynamic Event-Triggered Mechanism
Published 2022-01-01“…This study addresses the observer-based proportional-integral-derivative (PID) security control problem for nonlinear discrete-time fuzzy systems subject to deception attacks. In order to reduce the burden of communication, a distributed dynamic event-triggered mechanism (DETM) is proposed, and each sensor node is equipped with an event-trigger generator. …”
Get full text
Article -
72
Strategy of container migration and honeypot deployment based on signal game in cloud environment
Published 2022-06-01“…Multi-tenant coexistence and resource sharing in the SaaS cloud pose serious security risks.On the one hand, soft isolation of logical namespaces is easy to be bypassed or broken.On the other hand, it is easy to be subjected to co-resident attacks due to sharing of the host operating system and underlying physical resources.Therefore it poses a serious threat to data availability, integrity and confidentiality in the container cloud.Given the problem that SaaS cloud services are vulnerable to container escape and side-channel equivalent resident attack, network deception technology increases the uncertainty of the cloud environment and reduces the effectiveness of attack by hiding the business function and characteristic attributes of the executor.Aiming at the security threat caused by the co-resident attack, combining dynamic migration and virtual honeypot security technology, the economical and reasonable network deception method was studied.Specifically, a container migration and honeypot deployment strategy based on the signal game was proposed.According to the security threat analysis, container migration and honeypot were used as defense methods.The former improved the undetectability of the system based on the idea of moving to target defense, while the latter confused attackers by placing decoy containers or providing false services.Furthermore, since network reconnaissance was the pre-step of the network attack chain, the attack and defense process was modeled as a two-person signal game with incomplete information.The sender chose to release a signal according to his type, and the receiver could only obtain the signal released by the sender but could not determine the type.Then, a game tree was constructed for the complete but imperfect information dynamic game, and the costs and benefits of different strategy combinations were set.The optimal deception strategy was determined by equilibrium analysis of attack-defense model.Experimental results show that the proposed strategy can effectively improve system security.Besides, it can also reduce container migration frequency and defense cost.…”
Get full text
Article -
73
Blockchain-based hierarchical and multi-level smart service transaction supervision framework for crowdsourcing logistics
Published 2020-06-01“…In view of the security threats such as forgery,deception,privacy disclosure and non-traceability caused by the lack of transaction supervision for crowdsourcing logistics in the modern service industry,a blockchain-based hierarchical and multi-level smart service transaction supervision framework for crowdsourcing logistics was proposed.Firstly,the framework adopted the two-stage supervision system:one was the National Authorized Certification Center for the supervision of logistics service platform,the other was the logistics service platform for the supervision of crowdsourcing logistics participation.Later,under the framework of the supervision system,the functions of crowd contract,legal and anonymous identity authentication,intelligent transaction matching,anomaly data analysis and detection,privacy protection and traceability were realized.Then,through the security analysis and transaction supervision component software,the security controllability and operational efficiency of the transaction supervision architecture were verified.Finally,the software component was run on the real crowdsourcing logistics enterprise platform for the actual measurement.The measurement results show that the proposed hierarchical and multi-level smart service transaction supervision framework is safe and controllable.The framework can protect the privacy of users and data,prevent forgery and deception,and realize the auditability and traceability of behaviors and data of users.…”
Get full text
Article -
74
Strategic insights into penalty kick execution: A comprehensive analysis of observable behaviors in the German Bundesliga
Published 2024-06-01“…Through analysis of the kicker's running pattern, deception actions, gaze behavior, and kicking technique, football practitioners may attempt to determine the kicker's favored approach, and ultimately the penalty kick strategy, so they can inform coaching staff and players.…”
Get full text
Article -
75
True or False? Defining the Fake in Chinese Porcelain
Published 2019-06-01“…This is falsifying for profit. However, deception can also be a form of aesthetics or even a necessity. …”
Get full text
Article -
76
Archéologies révolutionnaires. Regards croisés sur la Tunisie et l’Égypte (2011-2013)
Published 2014-07-01“…Constantly alternating between urgency and expectation, enthusiasm and deception, certainty and doubt, these events have deeply impacted the rhythms of life and perceptions of history. …”
Get full text
Article -
77
Some New Constructions of Authentication Codes with Arbitration and Multi-Receiver from Singular Symplectic Geometry
Published 2011-01-01“…Assuming that the encoding rules are chosen according to a uniform probability distribution, the probabilities of success for different types of deception are also computed.…”
Get full text
Article -
78
Peculiarities of the investigation of frauds disguised as civil legal relations
Published 2023-07-01“…It has been noted that the courts recognize as a legal basis for the detention of a person suspected of committing fraud, only collected evidence of the use of deception or abuse of trust during the acquisition of property or the right to it. …”
Get full text
Article -
79
A security authentication scheme in RFID system for smart park
Published 2016-02-01“…The new protocol could effectively resist attacks of re-transmission,tracking,deception,cloning and de-synchronizationand,and it had high security and practicability.…”
Get full text
Article -
80
Une copie de L’Origine du monde par René Magritte ?
Published 2019-12-01“…For more than 20 years, the copy of The origin of the world of Courbet, which Joseph-Marie Lo Duca attributed to René Magritte, has duped historians and amateurs. Although the deception was unmasked, the date of realization, the context of realization and the author of this copy remained unknown. …”
Get full text
Article