Results for 'Malware attack'

961 found
Order:
  1.  20
    MalSEIRS: Forecasting Malware Spread Based on Compartmental Models in Epidemiology.Isabella Martínez Martínez, Andrés Florián Quitián, Daniel Díaz-López, Pantaleone Nespoli & Félix Gómez Mármol - 2021 - Complexity 2021:1-19.
    Over the last few decades, the Internet has brought about a myriad of benefits to almost every aspect of our daily lives. However, malware attacks have also widely proliferated, mainly aiming at legitimate network users, resulting in millions of dollars in damages if proper protection and response measures are not settled and enforced. In this context, the paper at hand proposes MalSEIRS, a novel dynamic model, to predict malware distribution in a network based on the SEIRS epidemiological model. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  46
    Beta-Hebbian Learning to enhance unsupervised exploratory visualizations of Android malware families.Nuño Basurto, Diego García-Prieto, Héctor Quintián, Daniel Urda, José Luis Calvo-Rolle & Emilio Corchado - 2024 - Logic Journal of the IGPL 32 (2):306-320.
    As it is well known, mobile phones have become a basic gadget for any individual that usually stores sensitive information. This mainly motivates the increase in the number of attacks aimed at jeopardizing smartphones, being an extreme concern above all on Android OS, which is the most popular platform in the market. Consequently, a strong effort has been devoted for mitigating mentioned incidents in recent years, even though few researchers have addressed the application of visualization techniques for the analysis of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  3. The Ethics of Cyberwarfare.Randall R. Dipert - 2010 - Journal of Military Ethics 9 (4):384-410.
    The paper addresses several issues in the morality of cyberwar and cyberwarfare, defined as one nation's attacks on the governmental or civilian information systems of another nation. It sketches the diverse technical ways in which an attack may occur, including denial-of-service attacks and the insertion of various forms of malware. It argues that existing international law and widely discussed principles of Just War Theory do not straightforwardly apply to cyberwarfare, and many forms of cyberwarfare differ from previous forms (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   23 citations  
  4.  56
    An ontology of suspicious software behavior.André Grégio, Rodrigo Bonacin, Antonio Carlos de Marchi, Olga Fernanda Nabuco & Paulo Lício de Geus - 2016 - Applied ontology 11 (1):29-49.
    Malicious programs have been the main actors in complex, sophisticated attacks against nations, governments, diplomatic agencies, private institutions and people. Knowledge about malicious program...
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  5.  8
    Study of infostealers using Graph Neural Networks.Álvaro Bustos-Tabernero, Daniel López-Sánchez, Angélica González-Arrieta & Paulo Novais - forthcoming - Logic Journal of the IGPL.
    Cybersecurity technology has the ability to detect malware through a variety of methods, such as signature recognition, logical rules or the identification of known malware stored in a database or public source. However, threat actors continuously try to create new variants of existing malware by obfuscating or altering parts of the code to evade detection by antivirus engines. Infostealers are one of the most common malicious programs aimed at obtaining personal or banking information from an infected system (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  19
    Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment.S. S. Sujatha & S. Immaculate Shyla - 2019 - Journal of Intelligent Systems 29 (1):1626-1642.
    In cloud security, intrusion detection system (IDS) is one of the challenging research areas. In a cloud environment, security incidents such as denial of service, scanning, malware code injection, virus, worm, and password cracking are getting usual. These attacks surely affect the company and may develop a financial loss if not distinguished in time. Therefore, securing the cloud from these types of attack is very much needed. To discover the problem, this paper suggests a novel IDS established on (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  33
    Cyber security threats: A never-ending challenge for e-commerce.Xiang Liu, Sayed Fayaz Ahmad, Muhammad Khalid Anser, Jingying Ke, Muhammad Irshad, Jabbar Ul-Haq & Shujaat Abbas - 2022 - Frontiers in Psychology 13.
    This study explores the challenge of cyber security threats that e-commerce technology and business are facing. Technology applications for e-commerce are attracting attention from both academia and industry. It has made what was not possible before for the business community and consumers. But it did not come all alone but has brought some challenges, and cyber security challenge is one of them. Cyber security concerns have many forms, but this study focuses on social engineering, denial of services, malware, and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  67
    Society under threat… but not from AI.Ajit Narayanan - 2013 - AI and Society 28 (1):87-94.
    25 years ago, when AI & Society was launched, the emphasis was, and still is, on dehumanisation and the effects of technology on human life, including reliance on technology. What we forgot to take into account was another very great danger to humans. The pervasiveness of computer technology, without appropriate security safeguards, dehumanises us by allowing criminals to steal not just our money but also our confidential and private data at will. Also, denial-of-service attacks prevent us from accessing the information (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  32
    On Malfunction, Mechanisms and Malware Classification.Giuseppe Primiero, Frida J. Solheim & Jonathan M. Spring - 2019 - Philosophy and Technology 32 (2):339-362.
    Malware has been around since the 1980s and is a large and expensive security concern today, constantly growing over the past years. As our social, professional and financial lives become more digitalised, they present larger and more profitable targets for malware. The problem of classifying and preventing malware is therefore urgent, and it is complicated by the existence of several specific approaches. In this paper, we use an existing malware taxonomy to formulate a general, language independent (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  10.  27
    Moral Status for Malware! The Difficulty of Defining Advanced Artificial Intelligence.Miranda Mowbray - 2021 - Cambridge Quarterly of Healthcare Ethics 30 (3):517-528.
    The suggestion has been made that future advanced artificial intelligence (AI) that passes some consciousness-related criteria should be treated as having moral status, and therefore, humans would have an ethical obligation to consider its well-being. In this paper, the author discusses the extent to which software and robots already pass proposed criteria for consciousness; and argues against the moral status for AI on the grounds that human malware authors may design malware to fake consciousness. In fact, the article (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  51
    On Fingerprinting of Public Malware Analysis Services.Alvaro Botas, Ricardo J. Rodríguez, Vicente Matellan, Juan F. Garcia, M. T. Trobajo & Miguel V. Carriegos - 2020 - Logic Journal of the IGPL 28 (4):473-486.
    Automatic public malware analysis services provide controlled, isolated and virtual environments to analyse malicious software samples. Unfortunately, malware is currently incorporating techniques to recognize execution onto a virtual or sandbox environment; when an analysis environment is detected, malware behaves as a benign application or even shows no activity. In this work, we present an empirical study and characterization of automatic PMAS, considering 26 different services. We also show a set of features that allow to easily fingerprint these (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Milton F. lunch.Professions Under Attack - 1983 - In James Hamilton Schaub, Karl Pavlovic & M. D. Morris, Engineering professionalism and ethics. Malabar, Fla.: Krieger Pub. Co..
    No categories
     
    Export citation  
     
    Bookmark  
  13. USC Football Notebook: Robey, McDonald Secondary Stalwarts.White House Confirms Cyber Attack - forthcoming - Hermes.
     
    Export citation  
     
    Bookmark  
  14.  32
    Delving into Android Malware Families with a Novel Neural Projection Method.Rafael Vega Vega, Héctor Quintián, Carlos Cambra, Nuño Basurto, Álvaro Herrero & José Luis Calvo-Rolle - 2019 - Complexity 2019:1-10.
    Present research proposes the application of unsupervised and supervised machine-learning techniques to characterize Android malware families. More precisely, a novel unsupervised neural-projection method for dimensionality-reduction, namely, Beta Hebbian Learning, is applied to visually analyze such malware. Additionally, well-known supervised Decision Trees are also applied for the first time in order to improve characterization of such families and compare the original features that are identified as the most important ones. The proposed techniques are validated when facing real-life Android (...) data by means of the well-known and publicly available Malgenome dataset. Obtained results support the proposed approach, confirming the validity of BHL and DTs to gain deep knowledge on Android malware. (shrink)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  25
    An Empirical Evaluation of Supervised Learning Methods for Network Malware Identification Based on Feature Selection.C. Manzano, C. Meneses, P. Leger & H. Fukuda - 2022 - Complexity 2022:1-18.
    Malware is a sophisticated, malicious, and sometimes unidentifiable application on the network. The classifying network traffic method using machine learning shows to perform well in detecting malware. In the literature, it is reported that this good performance can depend on a reduced set of network features. This study presents an empirical evaluation of two statistical methods of reduction and selection of features in an Android network traffic dataset using six supervised algorithms: Naïve Bayes, support vector machine, multilayer perceptron (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  27
    Using Dalvik opcodes for malware detection on android.José Gaviria de la Puerta & Borja Sanz - 2017 - Logic Journal of the IGPL 25 (6):938-948.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17.  39
    Study of the malware SCIRS model with different incidence rates.A. Martín del Rey, J. D. Hernández Guillén & G. Rodríguez Sánchez - 2019 - Logic Journal of the IGPL 27 (2):202-213.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  19
    Multi-agent reinforcement learning based algorithm detection of malware-infected nodes in IoT networks.Marcos Severt, Roberto Casado-Vara, Ángel Martín del Rey, Héctor Quintián & Jose Luis Calvo-Rolle - forthcoming - Logic Journal of the IGPL.
    The Internet of Things (IoT) is a fast-growing technology that connects everyday devices to the Internet, enabling wireless, low-consumption and low-cost communication and data exchange. IoT has revolutionized the way devices interact with each other and the internet. The more devices become connected, the greater the risk of security breaches. There is currently a need for new approaches to algorithms that can detect malware regardless of the size of the network and that can adapt to dynamic changes in the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  32
    Gaining deep knowledge of Android malware families through dimensionality reduction techniques.Rafael Vega Vega, Héctor Quintián, José Luís Calvo-Rolle, Álvaro Herrero & Emilio Corchado - 2019 - Logic Journal of the IGPL 27 (2):160-176.
  20.  9
    Applying highly space efficient blacklisting to mobile malware.Marián Kühnel & Ulrike Meyer - 2016 - Logic Journal of the IGPL 24 (6):971-981.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  19
    Key features for the characterization of Android malware families.Javier Sedano, Silvia González, Camelia Chira, Álvaro Herrero, Emilio Corchado & José Ramón Villar - 2017 - Logic Journal of the IGPL 25 (1):54-66.
  22. Experimental Attacks on Intuitions and Answers.John Bengson - 2012 - Philosophy and Phenomenological Research 86 (3):495-532.
    This paper poses a constructive, evenhanded challenge to the idea that recent experimental work shows intuitions to be epistemically problematic. It is a challenge because it suggests that these experimental attacks neglect a considerable gap between intuitions and answers, and this neglect implies that we are at the present time unwarranted in drawing any negative conclusions about intuition’s epistemic status from the relevant empirical studies. The challenge is evenhanded because it does not load the dice by invoking an overly narrow (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   67 citations  
  23. Attacking the Bounds of cognition.Richard Menary - 2006 - Philosophical Psychology 19 (3):329-344.
    Recently internalists have mounted a counter-attack on the attempt to redefine the bounds of cognition. The counter-attack is aimed at a radical project which I call "cognitive integration," which is the view that internal and external vehicles and processes are integrated into a whole. Cognitive integration can be defended against the internalist counter arguments of Adams and Aizawa (A&A) and Rupert. The disagreement between internalists and integrationists is whether the manipulation of external vehicles constitutes a cognitive process. Integrationists (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   96 citations  
  24. Ang Attack on Titan ni Hajime Isayama Batay sa Iba't Ibang Pilosopikal na Pananaw.Mark Joseph Santos - 2022 - Dalumat E-Journal 8 (1):68-91.
    Dalawa sa mga hibla ng Pilosopiyang Filipino ay patungkol sa paggamit ng banyagang pilosopiya at pamimilosopiya sa wikang Filipino. Makatutulong ang dalawang ito tungo sa pagsasalin ng mga banyagang kaisipan sa talastasang bayan. Ang dalawang hiblang ito ang nais na ambagan ng kasalukuyang sanaysay, sa pamamagitan ng pagsasagawa ng rebyu sa isang halimbawa ng anime/manga na Hapon: ang Attack on Titan (AOT) ni Hajime Isayama. Gagamitin sa pagbasa ng AOT ang mga pilosopikal na pananaw ng ilang Aleman/Austrianong pilosoper/sikolohista na (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  25. Attacking Character: Ad Hominem Argument and Virtue Epistemology.Heather Battaly - 2010 - Informal Logic 30 (4):361-390.
    The recent literature on ad hominem argument contends that the speaker’s character is sometimes relevant to evaluating what she says. This effort to redeem ad hominems requires an analysis of character that explains why and how character is relevant. I argue that virtue epistemology supplies this analysis. Three sorts of ad hominems that attack the speaker’s intellectual character are legitimate. They attack a speaker’s: (1) possession of reliabilist vices; or (2) possession of responsibilist vices; or (3) failure to (...)
    Direct download (13 more)  
     
    Export citation  
     
    Bookmark   23 citations  
  26.  29
    A Mindsponge-Based Investigation into the Psycho-Religious Mechanism Behind Suicide Attacks.Quan-Hoang Vuong, Minh-Hoang Nguyen & Tam-Tri Le - 2021 - Sciendo.
    The book examines the psycho-religious mechanism behind the violent extremism of suicide attacks in the post-9/11 world. It employs the mindsponge concept, an original dataset, and original research results obtained from the authors' statistical investigations using the Hamiltonian Markov chain Monte Carlo technique. It provides insights and implications for policymakers and strategists in their efforts to engage in peace talks and reduce violent conflicts worldwide.
    Direct download  
     
    Export citation  
     
    Bookmark   15 citations  
  27.  16
    Attack semantics and collective attacks revisited.Martin Caminada, Matthias König, Anna Rapberger & Markus Ulbricht - forthcoming - Argument and Computation.
    In the current paper we re-examine the concepts of attack semantics and collective attacks in abstract argumentation, and examine how these concepts interact with each other. For this, we systematically map the space of possibilities. Starting with standard argumentation frameworks (which consist of a directed graph with nodes and arrows) we briefly state both node semantics and arrow semantics (the latter a.k.a. attack semantics) in both their extensions-based form and labellings-based form. We then proceed with SETAFs (which consist (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  28. Strategies of Character Attack.Fabrizio Macagno - 2013 - Argumentation 27 (4):1-33.
    Why are personal attacks so powerful? In political debates, speeches, discussions and campaigns, negative character judgments, aggressive charges and charged epithets are used for different purposes. They can block the dialogue, trigger value judgments and influence decisions; they can force the interlocutor to withdraw a viewpoint or undermine his arguments. Personal attacks are not only multifaceted dialogical moves, but also complex argumentative strategies. They can be considered as premises for further arguments based on signs, generalizations or consequences. They involve tactics (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  29.  57
    Attack, disapproval, or withdrawal? The role of honour in anger and shame responses to being insulted.Patricia M. Rodriguez Mosquera, Agneta H. Fischer, Antony S. R. Manstead & Ruud Zaalberg - 2008 - Cognition and Emotion 22 (8):1471-1498.
    Insults elicit intense emotion. This study tests the hypothesis that one's social image, which is especially salient in honour cultures, influences the way in which one reacts to an insult. Seventy-seven honour-oriented and 72 non-honour oriented participants answered questions about a recent insult episode. Participants experienced both anger and shame in reaction to the insult. However, these emotions resulted in different behaviours. Anger led to verbal attack (i.e., criticising, insulting in return) among all participants. This relationship was explained by (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  30. The Attack on Liberalism.Mark R. Reiff - 2007 - In Michael D. A. Freeman & Ross Harrison, Law and philosophy. New York: Oxford University Press.
    Liberalism is today under attack. This attack is being fought along two fronts, and so appears to be coming from different directions, but it is actually coming exclusively from the right. One source is Islamic fundamentalism, and the other is American neo-conservatism, which in turn unites elements of Christian fundamentalism with elements of neo-Platonic political philosophy and neo-Aristotelian moral theory. Both Islamic fundamentalism and American neo-conservatism are perfectionist views, and while perfectionist attacks on liberalism are nothing new, there (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  31.  26
    The attack and defense games.Roman M. Sheremeta - 2019 - Behavioral and Brain Sciences 42.
    The attack-and-defense game is a game in which an attacker has an incentive to revise the status quo and a defender wants to protect it. The asymmetry in objectives creates incompatible interests and results in a mixed-strategy Nash equilibrium. However, this equilibrium could be heavily impacted by behavioral considerations.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  17
    Attack on identity. (Russian culture as an existential threat to Ukraine).Oleh Bilyi - 2022 - Filosofska Dumka (Philosophical Thought) 4:145-160.
    The article deals with the role of Russian culture in the period of the RF war against Ukraine. The history is considered as the basic structure that shapes the discursive foundation of identity. Historical narratives as well as the cultural background of imperial identity and risks of the full scale representation of Russian culture in the Ukrainian social consciousness are analyzed. The two tendencies are also comprehended — junk science foundation of geopolitical projects and devalu- ation of the historically formed (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  29
    Insider attack detection in database with deep metric neural network with Monte Carlo sampling.Gwang-Myong Go, Seok-Jun Bu & Sung-Bae Cho - 2022 - Logic Journal of the IGPL 30 (6):979-992.
    Role-based database management systems are most widely used for information storage and analysis but are known as vulnerable to insider attacks. The core of intrusion detection lies in an adaptive system, where an insider attack can be judged if it is different from the predicted role by performing classification on the user’s queries accessing the database and comparing it with the authorized role. In order to handle the high similarity of user queries for misclassified roles, this paper proposes a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  36
    The Attack on Sovereignty: Liberalism and Democracy in Hayek, Foucault, and Lefort.Annabel Herzog - 2021 - Political Theory 49 (4):662-685.
    This essay examines and challenges some of the theoretical arguments of the neoliberal attack on the concept of popular sovereignty. I argue that in order to resist both the neoliberal reaction against popular power and the subsequent resurgence of populist rhetoric, we need to rework the concept of popular sovereignty. I focus on three groups of texts written in the early years of the neoliberal shift—namely, from the mid-1970s to early 1980s—which deal with the question of sovereignty: Hayek’s Law, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  9
    Acclaims, attacks and defences in Nigerian gubernatorial debate.Oluwateniola Oluwabukola Ajilore - 2015 - Discourse and Communication 9 (1):3-18.
    This study applies functional theory of campaign discourse proposed by William Benoit for United States political debates and the theory of illocutions to the televised governorship debate of Lagos State. As opposed to other studies that have applied it to the United States, Finland, etc., it applies this theory to an African political debate. It asserts as against others that candidates distinguish themselves from their opponents using the major functions of campaign discourse in a reversed order, that is, attacks, defences (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  36.  25
    Attack, Defense and Counter-Attack in the Inuit Duel Songs of Ammassalik.Christian Plantin - 2020 - Argumentation 35 (1):51-72.
    This study is based on a corpus of duel songs from the traditional Ammassalik culture, published by the anthropologists P.-É. Victor and J. Robert-Lamblin. In this culture, the duel is a moment in the development of a quarrel, originating in a conflictual event; one of the partners challenges the other to a song duel. Our study focuses upon the basic argumentative strategies of defense and counter attack used to reject the accusation. The charges range from what may seem to (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  13
    Attacks on science.Lisa Idzikowski (ed.) - 2022 - New York: Greenhaven Publishing.
    Recent examples of attacks on science-such as climate change denial and anti-vaccination movements-demonstrate the danger of attacks on science. However, the negative impacts of these attacks must be weighed against other considerations, including the freedom of speech and religious expression and the assertion that some criticism is healthy for the scientific field. The viewpoints in this title consider the impacts of attacks on science, whether these attacks can be stopped, and how they can be prevented. It also examines the role (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  49
    Perception attack.Brian Massumi - 2008 - Multitudes 34 (3):74.
    When war becomes perception attack, and perception is attacked ecologically ; when the ecology is of experience dawning, and the dawning modulates what will become ; when that modulation inhabits an untimely, « eternitarian » lapse, and in that lapse we « recollect forward » a world of conflict ; when that forwarding of a world of conflict plies the « full spectrum », expressing itself as a force of life – then the machinery of war arrogates to itself (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39.  13
    Legislative Attack.Eyal Weizman - 2010 - Theory, Culture and Society 27 (6):11-32.
    Israel’s 22-day attack on Gaza in December 2008—January 2009 exposed a paradox: the attack was not only one of the most violent and destructive of Israel’s recent wars on the Palestinians and the one most strongly opposed by its critics, but also the one in which Israeli experts in international humanitarian law (IHL) — the area of the law that regulates the conduct of war — were most closely involved. The article demonstrates how these facts are connected.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  66
    Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.Marwan Albahar - 2019 - Science and Engineering Ethics 25 (4):993-1006.
    In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been as high as it is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41. Attacking authority.Matthews Steve - 2011 - Australian Journal of Professional and Applied Ethics 13 (2):59-70.
    The quality of our public discourse – think of the climate change debate for instance – is never very high. A day spent observing it reveals a litany of misrepresentation and error, argumentative fallacy, and a general lack of good will. In this paper I focus on a microcosmic aspect of these practices: the use of two types of argument – the argumentum ad hominem and appeal to authority – and a way in which they are related. Public debate is (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  42. The Attack of the Blob: Hannah Arendt’s Concept of the Social.Hanna Fenichel Pitkin - 1998 - University of Chicago Press.
    This book is thus a battle of wits. . . . [A] vivid sketch of the conflict between two basic outlooks."—Library Journal "[O]ne leaves this book feeling enriched and challenged.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   34 citations  
  43. Science Under Attack.Nicholas Maxwell - 2005 - The Philosopher’s Magazine 31:37-41.
    Science has been under attack ever since William Blake and Romantic movement. In our time, criticisms of modern science have led to Alan Sokal's spoof, and the so-called science wars. Both sides missed the point. Science deserves to be criticized for seriously misrepresenting its highly problematic aims, which have metaphysical, value and political assumptions associated with them. Instead of repressing these problematic aims, science ought rather to make them explicit, so that they can be critically assessed and, we may (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  44.  24
    The attack and defense mechanisms: Perspectives from behavioral economics and game theory.Subhasish M. Chowdhury - 2017 - Behavioral and Brain Sciences 42.
    This commentary complements the article by De Dreu and Gross from the perspectives of behavioral economics and game theory. It aims to provide a bridge between psychology/neuroscience research and economics research in attack-and-defense by stipulating relevant literature, clarifying theoretical structures, and suggesting improvements in experimental designs and possible further investigations.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45. (1 other version) Probabilistic interpretations of argumentative attacks: logical and experimental foundations.Niki Pfeifer & C. G. Fermüller - 2018 - In V. Kratochvíl & J. Vejnarová, 11th Workshop on Uncertainty Processing (WUPES'18). pp. 141-152.
    We present an interdisciplinary approach to study systematic relations between logical form and attacks between claims in an argumentative framework. We propose to generalize qualitative attack principles by quantitative ones. Specifically, we use coherent conditional probabilities to evaluate the rationality of principles which govern the strength of argumentative attacks. Finally, we present an experiment which explores the psychological plausibility of selected attack principles.
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  68
    The Attack on Isocrates in the Phaedrus.R. L. Howland - 1937 - Classical Quarterly 31 (3-4):151-.
    The most famous and successful teacher of rhetoric at Athens in the fourth century was Isocrates, and he claimed for rhetoric an educational importance which Plato considered to be unmerited and misleading. He made rhetoric the basis of his whole educational system and claimed to teach his pupils to become not only good rhetoricians but good citizens. Plato attacked both aspects of this theory of education. In the Gorgias he exposed the claim of rhetoric to be considered valuable as an (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  47.  20
    Inferring attack relations for gradual semantics.Nir Oren & Bruno Yun - 2023 - Argument and Computation 14 (3):327-345.
    A gradual semantics takes a weighted argumentation framework as input and outputs a final acceptability degree for each argument, with different semantics performing the computation in different manners. In this work, we consider the problem of attack inference. That is, given a gradual semantics, a set of arguments with associated initial weights, and the final desirable acceptability degrees associated with each argument, we seek to determine whether there is a set of attacks on those arguments such that we can (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  48.  6
    Terror Attacks and the Production of the Sacred.Thomas Clavel - 2017 - Philosophical Journal of Conflict and Violence 1 (2).
    Starting from René Girard and Philippe Muray’s thoughts on terrorism, the present paper introduces the hypothesis that the re-sacralization of the hyperfestive1 era is the unexpected but seemingly inevitable effect of jihadist attacks in Europe. These assumptions aim to shed new light on the Western rhetoric of commemorative events and media discourses.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  49.  11
    Attack versus defense: A strategic rationale for role differentiation in conflict.Catherine Hafer - 2019 - Behavioral and Brain Sciences 42.
    Is there a strategic mechanism that explains role-contingent differences in conflict behavior? I sketch a theory in which differences in optimal behavior for attackers and defenders arise under initially symmetric conditions through the dynamic accumulation of differences in the distributions of traits in the subpopulations of potential opponents.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  30
    Resolving attacker-defender conflicts through intergroup negotiation.Nir Halevy - 2019 - Behavioral and Brain Sciences 42.
    The target article focuses on how attacker-defender conflicts are fought. This commentary complements it by considering how attacker-defender conflicts may be resolved at the bargaining table. I highlight multiple linkages between asymmetric intergroup conflict as modeled with the attacker-defender game and negotiation research and illustrate how the proposed model of attacker-defender conflicts can inspire new research on intergroup negotiation.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 961