Listing 1 - 10 of 13 | << page >> |
Sort by
|
Choose an application
This open access book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, held in Beijing, China, in AJuly 2021. The 14 papers presented were carefully reviewed and selected from 51 submissions. The papers are organized according to the following topical sections: data security; privacy protection; anomaly detection; traffic analysis; social network security; vulnerability detection; text classification.
Computer security --- Computer networking & communications --- Coding theory & cryptology --- Network security --- Artificial intelligence --- Software Engineering --- artificial intelligence --- authentication --- computer hardware --- computer networks --- computer security --- computer systems --- cryptography --- data communication systems --- data mining --- data security --- databases --- information retrieval --- network protocols --- network security --- privacy --- signal processing --- telecommunication networks --- telecommunication systems --- Seguretat de les xarxes d'ordinadors --- Teoria de la codificació
Choose an application
Choose an application
This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition.
Computer security --- Computer networking & communications --- Artificial intelligence --- Legal aspects of IT --- Network security --- application service layer --- artificial intelligence --- communication systems --- computer crime --- computer networks --- computer security --- computer systems --- cryptography --- cyber security --- data communication systems --- data security --- databases --- machine learning --- network protocols --- network security --- privacy --- signal processing --- telecommunication networks --- telecommunication systems
Choose an application
This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition.
application service layer --- artificial intelligence --- communication systems --- computer crime --- computer networks --- computer security --- computer systems --- cryptography --- cyber security --- data communication systems --- data security --- databases --- machine learning --- network protocols --- network security --- privacy --- signal processing --- telecommunication networks --- telecommunication systems
Choose an application
This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition.
Computer security --- Computer networking & communications --- Artificial intelligence --- Legal aspects of IT --- Network security --- application service layer --- artificial intelligence --- communication systems --- computer crime --- computer networks --- computer security --- computer systems --- cryptography --- cyber security --- data communication systems --- data security --- databases --- machine learning --- network protocols --- network security --- privacy --- signal processing --- telecommunication networks --- telecommunication systems --- application service layer --- artificial intelligence --- communication systems --- computer crime --- computer networks --- computer security --- computer systems --- cryptography --- cyber security --- data communication systems --- data security --- databases --- machine learning --- network protocols --- network security --- privacy --- signal processing --- telecommunication networks --- telecommunication systems
Choose an application
This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence analysis, vulnerability, artificial intelligence security, IPv6 risk research, cybersecurity policy and regulation research, big data analysis and industrial security.
Computer security. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer science --- Computer security
Choose an application
Choose an application
Analogy is the mean between univocation and equivocation. When things are named analogously, the analogous term has more than one meaning, but these meanings are somehow associated. “Being” when said of substance and accidents are such an analogous term. The issue of the analogy of “being” can be traced back to Aristotle. In Metaphysics IV, Aristotle points out that “being” when said of substance and accidents are either univocal or equivocal. Rather, it applies to both of them with reference to substance. The substance is its primary reference, whereas accidents are secondarily or derivatively referred to, as it is named so because of its association with substance. Such a way of using a term is later named signification per prius et posterius, which later develops into the analogy of attribution. Scotus argues against signification per prius et posterius, claiming that one could find no means between univocation and equivocation. He admits the existence of metaphysical analogy but denies analogy in the logical sense. One reason is that, according to Scotus, only univocal terms can be used as the middle term of a syllogism. When analogous terms are used in inference, they will cause the fallacy of equivocation. Such fallacy occurs when one term in a single inference has more than one meaning. For example, in the following argument, Every simple perfection is in God. Wisdom is a kind of simple perfection. Therefore, [wisdom is in God.] “Wisdom” is supposed to be an analogous term, as creaturely wisdom and the wisdom of God are different but somehow related, e.g., the latter is the source of the former. One difficulty of this interpretation is the fallacy of equivocation: The term “wisdom” in the minor signifies creaturely wisdom, whereas “wisdom” in the conclusion signifies divine wisdom. Supposing that Scotus is right, analogical unities are not strong enough to avoid the fallacy of equivocation, then the argument would be invalid. Cajetan agrees with Scotus that the analogy of attribution is in fact a kind of equivocation. However, in his De Nominum Analogia, he argues that a true mean between univocation and equivocation does exist, and that is the analogy of proportionality. “Being” is exactly a proportionally analogous term. In the analogy of proportionality, the concepts signified by the analogous term are proportionally the same. This thesis aims to analyze Cajetan’s theory of analogy based on his De Nominum Analogia. It will first introduce the origin of the problem of analogy, and historical debates around the issue. Then, we will see Scotus’s view on these issues. After that, we will focus on Cajetan’s three-fold division of analogy, his definition of the analogy of proportionality, and how he uses this notion to answer the difficulties proposed by Scotus. Besides, some further issues will be explored, such as whether Cajetan has distinguishes the analogy of attribution and the analogy of proportionality according to extrinsic denomination and intrinsic denomination, and whether Cajetan has therefore confused the order of logic and the order of metaphysics. (15566 Words)
Choose an application
Choose an application
This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- applicatiebeheer --- apps --- informatica --- computerbeveiliging --- computernetwerken --- architectuur (informatica) --- netwerk management
Listing 1 - 10 of 13 | << page >> |
Sort by
|