LEADER 01571nam--2200397---450- 001 990001100670203316 005 20100616100521.0 010 $a88-495-0111-0 035 $a000110067 035 $aUSA01000110067 035 $a(ALEPH)000110067USA01 035 $a000110067 100 $a20021114d2000----km-y0enga50------ba 101 0 $aita 102 $aIT 105 $ay|||z|||001yy 200 1 $aCollegamento volontario tra contratti nel sistema dell'ordinamento giuridico$esostanza economica e natura giuridica degli autoregolamenti complessi$fFilippo Maisto 210 $aNapoli$cEdizioni Scientifiche Italiane$dcopyr. 2000 215 $a275 p.$d24 cm 225 2 $aPubblicazioni della facoltą di economia$fUniversitą degli studi del Sannio$iSezione giuridico-sociale$v14 410 1$12001$aPubblicazioni della facoltą di economia$fUniversitą degli studi del Sannio$iSezione giuridico-sociale$v15 606 0 $aContratti collegati 676 $a346.4502 700 1$aMAISTO,$bFilippo$0437933 801 0$aIT$bSalbc$cISBD 912 $a990001100670203316 951 $aXXX.A. Coll. 140/ 11 (X 29 XXVI 15)$b34195 G.$cXXX.A. Coll. 140/ 11 (X 29)$d00097913 959 $aBK 969 $aGIU 979 $aMARIA$b10$c20021114$lUSA01$h0956 979 $aCHIARA$b90$c20030203$lUSA01$h1128 979 $aPATRY$b90$c20040406$lUSA01$h1716 979 $aRSIAV2$b90$c20100616$lUSA01$h1005 979 $aCHIARA$b90$c20110301$lUSA01$h1438 996 $aCollegamento volontario tra contratti nel sistema dell'ordinamento giuridico$9253878 997 $aUNISA LEADER 02788nam 2200589 a 450 001 9910451559803321 005 20200520144314.0 010 $a1-281-29506-X 010 $a9786611295066 010 $a1-84714-315-6 035 $a(CKB)1000000000408469 035 $a(EBL)436479 035 $a(OCoLC)290594175 035 $a(SSID)ssj0000231773 035 $a(PQKBManifestationID)11220482 035 $a(PQKBTitleCode)TC0000231773 035 $a(PQKBWorkID)10207461 035 $a(PQKB)10463506 035 $a(MiAaPQ)EBC436479 035 $a(Au-PeEL)EBL436479 035 $a(CaPaEBR)ebr10224712 035 $a(CaONFJC)MIL129506 035 $a(OCoLC)893334210 035 $a(EXLCZ)991000000000408469 100 $a20060726d2006 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aQuine on meaning$b[electronic resource] /$fEve Gaudet 210 $aLondon ;$aNew York $cContinuum$dc2006 215 $a1 online resource (156 p.) 225 1 $aContinuum studies in American philosophy 300 $aDescription based upon print version of record. 311 $a0-8264-8720-3 320 $aIncludes bibliographical references and index. 327 $aContents; Acknowledgments; 1 Introduction; 2 Factuality and Physicalism; 3 Fact of the Matter and Truth; 4 The Indeterminacy Thesis; 5 Behaviorism, Neurology and Indeterminacy of Translation; 6 Indeterminacy of Translation and Underdetermination of Theory; 7 Chomsky's Misunderstanding; 8 Rorty's Misunderstanding; 9 Friedman's Misunderstanding; 10 Fųllesdal and Gibson Get it Right; 11 Cognitive Science's Denial of the Asymmetry; 12 Conclusion; Index; A; B; C; D; E; F; G; H; I; L; M; N; O; P; R; S; T; U; V; W 330 $aWillard Van Orman Quine was certainly the greatest analytic philosopher of the second half of the twentieth century. Born in 1908, he held the Edgar Pierce Chair of Philosophy at Harvard University from 1956 to 2000. He made highly important contributions to such areas as mathematical logic, set theory, the philosophy of language, and the philosophy of logic. His best known works include From a Logical Point of View, Ontological Relativity and Other Essays, and his most influential Word and Object.One of Quine's central doctrines is the 'indeterminacy of translation' - the assertion that there 410 0$aContinuum studies in American philosophy. 606 $aMeaning (Philosophy) 608 $aElectronic books. 615 0$aMeaning (Philosophy) 676 $a121/.68092 700 $aGaudet$b Eve$0967591 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910451559803321 996 $aQuine on meaning$92196914 997 $aUNINA LEADER 05045nam 22006255 450 001 9910855382203321 005 20250426010141.0 010 $a9783031575372 010 $a3031575377 024 7 $a10.1007/978-3-031-57537-2 035 $a(CKB)31801666800041 035 $a(MiAaPQ)EBC31305359 035 $a(Au-PeEL)EBL31305359 035 $a(DE-He213)978-3-031-57537-2 035 $a(MiAaPQ)EBC31574280 035 $a(Au-PeEL)EBL31574280 035 $a(EXLCZ)9931801666800041 100 $a20240424d2024 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFoundations and Practice of Security $e16th International Symposium, FPS 2023, Bordeaux, France, December 11?13, 2023, Revised Selected Papers, Part I /$fedited by Mohamed Mosbah, Florence Sčdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, Joaquin Garcia-Alfaro 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (468 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14551 311 08$a9783031575365 311 08$a3031575369 320 $aIncludes bibliographical references and index. 327 $aAI and Cybersecurity -- An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection -- Securing Smart Vehicles through Federated Learning -- Using Reed-Muller Codes for Classification with Rejection and Recovery -- Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection -- Security Analysis -- Practices for Assessing the Security Level of Solidity Smart Contracts -- Effectiveness of Binary-Level CFI Techniques -- A Small World?Privacy Preserving IoT Device-type Fingerprinting with Small Datasets -- URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber -- Phishing and Social Network -- Does the Anchoring Effect Influence Individuals' Anti-Phishing Behavior? -- IntelliTweet: a Multifaceted Feature Approach to Detect Malicious Tweets -- Web Scams Detection System -- Vulnerabilities and Exploits -- VulMAE: Graph Masked Autoencoders for VulnerabilityDetection from Source and Binary Codes -- Analysis of Cryptographic CVEs: Lessons Learned and Perspectives -- A BERT-Based Framework for Automated Extraction of Indicators of Compromise from Security Incident Reports -- Enhancing Code Security Through Open-source Large Language Models: A Comparative Study -- Network and System Threat -- Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations -- Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware -- Automated Attacker Behaviour Classification Using Threat Intelligence Insights -- UDP state manipulation: description of a Packet Filtering vulnerability in Stateful firewalls -- Malware Analysis -- Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code -- On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr -- Original Entry Pointdetection based on graph similarity -- Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure -- Security Design -- Hardening Systems Against Data Corruption Attacks at Design Time -- Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols -- A shared key recovery attack on a masked implementation of CRYSTALS-Kyber's encapsulation algorithm -- Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response. 330 $aThis book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Security, FPS 2023, held in Bordeaux, France, during December 11?13, 2023. The 27 regular and 8 short papers presented in this book were carefully reviewed and selected from 80 submissions. The papers have been organized in the following topical sections: Part I: AI and cybersecurity, security analysis, phishing and social network, vulnerabilities and exploits, network and system threat, malware analysis. Part II : security design, short papers. . 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14551 606 $aData protection 606 $aComputer engineering 606 $aComputer networks 606 $aData and Information Security 606 $aComputer Engineering and Networks 606 $aComputer Communication Networks 615 0$aData protection. 615 0$aComputer engineering. 615 0$aComputer networks. 615 14$aData and Information Security. 615 24$aComputer Engineering and Networks. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aMosbah$b Mohamed 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910855382203321 996 $aFoundations and Practice of Security$94159644 997 $aUNINA