The authors thank the discusser for his interest and careful review of the paper and his valuable comments. They also welcome this discussion,because it gives the authors the opportunity to clarify several points whic...The authors thank the discusser for his interest and careful review of the paper and his valuable comments. They also welcome this discussion,because it gives the authors the opportunity to clarify several points which were not explained in sufficient detail in the paper,due展开更多
The authors thank the discusser for the additional information,which is provided related to the historical interventions of the church through the centuries. This information was known to the authors,however they deci...The authors thank the discusser for the additional information,which is provided related to the historical interventions of the church through the centuries. This information was known to the authors,however they decided not to include it in the paper because of lack of space.Additional details regarding the retrofit展开更多
Nowadays, many scholars would like to use evidence derived from elicitation and introspection in their research. Both elicitation and introspection are common methods of data collection. The essay discusses the useful...Nowadays, many scholars would like to use evidence derived from elicitation and introspection in their research. Both elicitation and introspection are common methods of data collection. The essay discusses the usefulness and pitfall of elicitation and introspection. It finds out that both elicitation and introspection have their own advantages and disadvantages.展开更多
Cloud computing plays an important role in today’s Internet environment,which meets the requirements of scalability,security and reliability by using virtualization technologies.Container technology is one of the two...Cloud computing plays an important role in today’s Internet environment,which meets the requirements of scalability,security and reliability by using virtualization technologies.Container technology is one of the two mainstream virtualization solutions.Its lightweight,high deployment efficiency make container technology widely used in large-scale cloud computing.While container technology has created huge benefits for cloud service providers and tenants,it cannot meet the requirements of security monitoring and management from a tenant perspective.Currently,tenants can only run their security monitors in the target container,but it is not secure because the attacker is able to detect and compromise the security monitor.In this paper,a secure external monitoring approach is proposed to monitor target containers in another management container.The management container is transparent for target containers,but it can obtain the executing information of target containers,providing a secure monitoring environment.Security monitors running inside management containers are secure for the cloud host,since the management containers are not privileged.We implement the transparent external management containers by performing the one-way isolation of processes and files.For process one-way isolation,we leverage Linux namespace technology to let management container become the parent of target containers.By mounting the file system of target container to that of the management container,file system one-way isolation is achieved.Compared with the existing host-based monitoring approach,our approach is more secure and suitable in the cloud environment.展开更多
The thesis of the paper,which is the object of this Discussion,is that the considerable damage suffered by the Basilica,after the earthquake of L’Aquila in 2009,was the exclusive result of the intervention of seismic...The thesis of the paper,which is the object of this Discussion,is that the considerable damage suffered by the Basilica,after the earthquake of L’Aquila in 2009,was the exclusive result of the intervention of seismic improvement of the naves,made in 2000;such展开更多
The present paper discusses introspective methods in applied linguistics. Introspective methods are ways of eliciting self-reflections from respondent. Two special techniques of introspective methods, namely, Think-al...The present paper discusses introspective methods in applied linguistics. Introspective methods are ways of eliciting self-reflections from respondent. Two special techniques of introspective methods, namely, Think-aloud and Retrospective in?terview are presented. Furthermore, an evaluation of these methods is also provided.展开更多
The going global strategy of Chinese literature is a vital part of the going global strategy of Chinese culture. In recent years,the Chinese government has launched and strongly supported a series of activities and pr...The going global strategy of Chinese literature is a vital part of the going global strategy of Chinese culture. In recent years,the Chinese government has launched and strongly supported a series of activities and projects to promote this strategy,but little effect has been produced. Starting from analyzing the predicament and reasons of the current strategy,the essay suggests four strategic paths: enhancing the overall strength of the country to promote the international influence of Chinese culture,strengthening cultural awareness and cultural introspection,integrating the nationality and cosmopolitan of literature and establishing a market-oriented literary translation mechanism.展开更多
This article presents an asset-based security system where security practitioners build their systems based on information they own and not solicited by observing attackers’behavior.Current security solutions rely on...This article presents an asset-based security system where security practitioners build their systems based on information they own and not solicited by observing attackers’behavior.Current security solutions rely on information coming from attackers.Examples are current monitoring and detection security solutions such as intrusion prevention/detection systems and firewalls.This article envisions creating an imbalance between attackers and defenders in favor of defenders.As such,we are proposing to flip the security game such that it will be led by defenders and not attackers.We are proposing a security system that does not observe the behavior of the attack.On the contrary,we draw,plan,and follow up our own protection strategy regardless of the attack behavior.The objective of our security system is to protect assets rather than protect against attacks.Virtual machine introspection is used to intercept,inspect,and analyze system calls.The system callbased approach is utilized to detect zero-day ransomware attacks.The core idea is to take advantage of Xen and DRAKVUF for system call interception,and leverage system calls to detect illegal operations towards identified critical assets.We utilize our vision by proposing an asset-based approach to mitigate zero-day ransomware attacks.The obtained results are promising and indicate that our prototype will achieve its goals.展开更多
Research in virtualization technology has gained significant developments in recent years, which brings not only opportunities to the forensic community, but challenges as well. This paper discusses the potential role...Research in virtualization technology has gained significant developments in recent years, which brings not only opportunities to the forensic community, but challenges as well. This paper discusses the potential roles of virtualization in digital forensics, examines the recent progresses which use the virtualization techniques to support modem computer forensics. The influences on digital forensics caused by virtualization technology are identified. Tools and methods in common digital forensic practices are analyzed, and experiences of our practice and reflections in this field are shared.展开更多
<p align="justify"> <span style="font-family:Verdana;"></span>This double blind randomized clinical trial with 84 participants, revealed that mental patients diagnosed with narcis...<p align="justify"> <span style="font-family:Verdana;"></span>This double blind randomized clinical trial with 84 participants, revealed that mental patients diagnosed with narcissism, and narcissistic celebrities mirror each other’s paranoid, obsessive and histrionic symptomatology, grandiosity, manipulative charm, and inner emptiness. Elite narcissists manifested insidious sadism in the absence of depressive affect, while the narcissistic patients were differentiated by their depressive and masochistic symptomatology. Elite narcissists demonstrated advanced empathic skills, contradicting past literature. However, their empathic advantage appeared void of compassion, merely employed as a self-serving tactic to exploit, intimidate and subordinate. Both experimental narcissistic groups evidenced more prevalent psychopathology, yet, higher achievement, efficacy and ambition than their reciprocal control groups, confirming the narcissists’ finesse in concealing psychopathology under the brilliance of their pseudosuperiority. The main danger is the affinity between masochism and sadism, bonding low and high functioning narcissistic counterparts to endlessly feed from each-others’ pathology, forming dysfunctional interpersonal relationships, cults or disintegrating societies. This sadomasochistic dependency also reflects several countries’ authoritarian trends, where narcissistic constituents’ unyielding loyalty elevates idolized leaders to power, preluding the establishment of toxic tyrannical governments. </p>展开更多
The vigorous development of the Internet is changing all aspects of our lives.Today’s“Internet plus”concept has played a vital role in the economic field with its unique advantages.In the cultural field,it still in...The vigorous development of the Internet is changing all aspects of our lives.Today’s“Internet plus”concept has played a vital role in the economic field with its unique advantages.In the cultural field,it still influences people’s spiritual and cultural life in a unique way.The free,open,and equal nature of the Internet provides an unprecedented broad platform for contemporary art criticism,and also frees it from the monopoly of a few authorities,entering the artistic life of the general public with a more humane and new attitude.This has played a certain guiding role in artistic creation,appreciation,dissemination,and popularization.展开更多
Starting from an etymological analysis of rape in the Indo-European language family,we want to trace the historical and semantic roots of this lexeme,in order to review its semantic and pragmatic development in the pe...Starting from an etymological analysis of rape in the Indo-European language family,we want to trace the historical and semantic roots of this lexeme,in order to review its semantic and pragmatic development in the perception of Italian speakers.Our aim is to read and understand the rape victim socio-cultural stigma in collective imagination.It is therefore possible to reconstruct the lexical,socio-semiotic,and narrative domain anticipating the phenomenology of victim blaming,which characterizes the media narratives of sexual violence.The victimological profile,socially expected and culturally accepted,seems to support the original semantic connotation of the Latin word stuprum,that is“corruption of virginity”,“contamination of purity”.Many typical mainstream discourses examined,through special“gender lenses”,provide portraits of imperfect,ambiguous,unreliable victims because they are deemed guilty of not being holy enough.展开更多
文摘The authors thank the discusser for his interest and careful review of the paper and his valuable comments. They also welcome this discussion,because it gives the authors the opportunity to clarify several points which were not explained in sufficient detail in the paper,due
文摘The authors thank the discusser for the additional information,which is provided related to the historical interventions of the church through the centuries. This information was known to the authors,however they decided not to include it in the paper because of lack of space.Additional details regarding the retrofit
文摘Nowadays, many scholars would like to use evidence derived from elicitation and introspection in their research. Both elicitation and introspection are common methods of data collection. The essay discusses the usefulness and pitfall of elicitation and introspection. It finds out that both elicitation and introspection have their own advantages and disadvantages.
基金This paper is supported by National Natural Science Foundation of China(http://www.nsfc.gov.cn/)under Grant No.61872111,and Sichuan Science and Technology Program(http://kjt.sc.gov.cn/)under Grant No.2019YFSY0049 which are both received by L.Ye.
文摘Cloud computing plays an important role in today’s Internet environment,which meets the requirements of scalability,security and reliability by using virtualization technologies.Container technology is one of the two mainstream virtualization solutions.Its lightweight,high deployment efficiency make container technology widely used in large-scale cloud computing.While container technology has created huge benefits for cloud service providers and tenants,it cannot meet the requirements of security monitoring and management from a tenant perspective.Currently,tenants can only run their security monitors in the target container,but it is not secure because the attacker is able to detect and compromise the security monitor.In this paper,a secure external monitoring approach is proposed to monitor target containers in another management container.The management container is transparent for target containers,but it can obtain the executing information of target containers,providing a secure monitoring environment.Security monitors running inside management containers are secure for the cloud host,since the management containers are not privileged.We implement the transparent external management containers by performing the one-way isolation of processes and files.For process one-way isolation,we leverage Linux namespace technology to let management container become the parent of target containers.By mounting the file system of target container to that of the management container,file system one-way isolation is achieved.Compared with the existing host-based monitoring approach,our approach is more secure and suitable in the cloud environment.
文摘The thesis of the paper,which is the object of this Discussion,is that the considerable damage suffered by the Basilica,after the earthquake of L’Aquila in 2009,was the exclusive result of the intervention of seismic improvement of the naves,made in 2000;such
文摘The present paper discusses introspective methods in applied linguistics. Introspective methods are ways of eliciting self-reflections from respondent. Two special techniques of introspective methods, namely, Think-aloud and Retrospective in?terview are presented. Furthermore, an evaluation of these methods is also provided.
基金The study has been supported by Center for Translation Studies of Guangdong University of Foreign Studies(Fund No.CTS201711B).
文摘The going global strategy of Chinese literature is a vital part of the going global strategy of Chinese culture. In recent years,the Chinese government has launched and strongly supported a series of activities and projects to promote this strategy,but little effect has been produced. Starting from analyzing the predicament and reasons of the current strategy,the essay suggests four strategic paths: enhancing the overall strength of the country to promote the international influence of Chinese culture,strengthening cultural awareness and cultural introspection,integrating the nationality and cosmopolitan of literature and establishing a market-oriented literary translation mechanism.
基金This project is funded by King Abdulaziz City for Science and Technology(KACST)under the National Science,Technology,and Innovation Plan(Project Number 11-INF1657-04).
文摘This article presents an asset-based security system where security practitioners build their systems based on information they own and not solicited by observing attackers’behavior.Current security solutions rely on information coming from attackers.Examples are current monitoring and detection security solutions such as intrusion prevention/detection systems and firewalls.This article envisions creating an imbalance between attackers and defenders in favor of defenders.As such,we are proposing to flip the security game such that it will be led by defenders and not attackers.We are proposing a security system that does not observe the behavior of the attack.On the contrary,we draw,plan,and follow up our own protection strategy regardless of the attack behavior.The objective of our security system is to protect assets rather than protect against attacks.Virtual machine introspection is used to intercept,inspect,and analyze system calls.The system callbased approach is utilized to detect zero-day ransomware attacks.The core idea is to take advantage of Xen and DRAKVUF for system call interception,and leverage system calls to detect illegal operations towards identified critical assets.We utilize our vision by proposing an asset-based approach to mitigate zero-day ransomware attacks.The obtained results are promising and indicate that our prototype will achieve its goals.
文摘Research in virtualization technology has gained significant developments in recent years, which brings not only opportunities to the forensic community, but challenges as well. This paper discusses the potential roles of virtualization in digital forensics, examines the recent progresses which use the virtualization techniques to support modem computer forensics. The influences on digital forensics caused by virtualization technology are identified. Tools and methods in common digital forensic practices are analyzed, and experiences of our practice and reflections in this field are shared.
文摘<p align="justify"> <span style="font-family:Verdana;"></span>This double blind randomized clinical trial with 84 participants, revealed that mental patients diagnosed with narcissism, and narcissistic celebrities mirror each other’s paranoid, obsessive and histrionic symptomatology, grandiosity, manipulative charm, and inner emptiness. Elite narcissists manifested insidious sadism in the absence of depressive affect, while the narcissistic patients were differentiated by their depressive and masochistic symptomatology. Elite narcissists demonstrated advanced empathic skills, contradicting past literature. However, their empathic advantage appeared void of compassion, merely employed as a self-serving tactic to exploit, intimidate and subordinate. Both experimental narcissistic groups evidenced more prevalent psychopathology, yet, higher achievement, efficacy and ambition than their reciprocal control groups, confirming the narcissists’ finesse in concealing psychopathology under the brilliance of their pseudosuperiority. The main danger is the affinity between masochism and sadism, bonding low and high functioning narcissistic counterparts to endlessly feed from each-others’ pathology, forming dysfunctional interpersonal relationships, cults or disintegrating societies. This sadomasochistic dependency also reflects several countries’ authoritarian trends, where narcissistic constituents’ unyielding loyalty elevates idolized leaders to power, preluding the establishment of toxic tyrannical governments. </p>
文摘The vigorous development of the Internet is changing all aspects of our lives.Today’s“Internet plus”concept has played a vital role in the economic field with its unique advantages.In the cultural field,it still influences people’s spiritual and cultural life in a unique way.The free,open,and equal nature of the Internet provides an unprecedented broad platform for contemporary art criticism,and also frees it from the monopoly of a few authorities,entering the artistic life of the general public with a more humane and new attitude.This has played a certain guiding role in artistic creation,appreciation,dissemination,and popularization.
文摘Starting from an etymological analysis of rape in the Indo-European language family,we want to trace the historical and semantic roots of this lexeme,in order to review its semantic and pragmatic development in the perception of Italian speakers.Our aim is to read and understand the rape victim socio-cultural stigma in collective imagination.It is therefore possible to reconstruct the lexical,socio-semiotic,and narrative domain anticipating the phenomenology of victim blaming,which characterizes the media narratives of sexual violence.The victimological profile,socially expected and culturally accepted,seems to support the original semantic connotation of the Latin word stuprum,that is“corruption of virginity”,“contamination of purity”.Many typical mainstream discourses examined,through special“gender lenses”,provide portraits of imperfect,ambiguous,unreliable victims because they are deemed guilty of not being holy enough.