Results for ' attack'

1000+ found
Order:
  1. USC Football Notebook: Robey, McDonald Secondary Stalwarts.White House Confirms Cyber Attack - forthcoming - Hermes.
     
    Export citation  
     
    Bookmark  
  2. Milton F. lunch.Professions Under Attack - 1983 - In James Hamilton Schaub, Karl Pavlovic & M. D. Morris (eds.), Engineering Professionalism and Ethics. Krieger Pub. Co..
    No categories
     
    Export citation  
     
    Bookmark  
  3. Attacking faulty reasoning: a practical guide to fallacy-free arguments.T. Edward Damer - 2009 - Belmont, CA: Wadsworth/Cengage Laerning.
    This text is designed to help students construct and evaluate arguments.
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  4. Attacking Character: Ad Hominem Argument and Virtue Epistemology.Heather Battaly - 2010 - Informal Logic 30 (4):361-390.
    The recent literature on ad hominem argument contends that the speaker’s character is sometimes relevant to evaluating what she says. This effort to redeem ad hominems requires an analysis of character that explains why and how character is relevant. I argue that virtue epistemology supplies this analysis. Three sorts of ad hominems that attack the speaker’s intellectual character are legitimate. They attack a speaker’s: (1) possession of reliabilist vices; or (2) possession of responsibilist vices; or (3) failure to (...)
    Direct download (13 more)  
     
    Export citation  
     
    Bookmark   22 citations  
  5. Experimental Attacks on Intuitions and Answers.John Bengson - 2012 - Philosophy and Phenomenological Research 86 (3):495-532.
  6. Attacking the Bounds of cognition.Richard Menary - 2006 - Philosophical Psychology 19 (3):329-344.
    Recently internalists have mounted a counter-attack on the attempt to redefine the bounds of cognition. The counter-attack is aimed at a radical project which I call "cognitive integration," which is the view that internal and external vehicles and processes are integrated into a whole. Cognitive integration can be defended against the internalist counter arguments of Adams and Aizawa (A&A) and Rupert. The disagreement between internalists and integrationists is whether the manipulation of external vehicles constitutes a cognitive process. Integrationists (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   90 citations  
  7.  16
    The Attack of the Blob: Hannah Arendt’s Concept of the Social.Hanna Fenichel Pitkin - 1998 - University of Chicago Press.
    One of the most brilliant political theorists of our time, Hannah Arendt intended her work to liberate, to convince us that the power to improve our flawed arrangements is in our hands. At the same time, Arendt developed a metaphor of "the social" as an alien, appearing as if from outer space to gobble up human freedom; she blamed it—not us—for our public paralysis. In _The Attack of the Blob_, Hanna Pitkin seeks to resolve this seeming paradox by tracing (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  8.  4
    Acclaims, attacks and defences in Nigerian gubernatorial debate.Oluwateniola Oluwabukola Ajilore - 2015 - Discourse and Communication 9 (1):3-18.
    This study applies functional theory of campaign discourse proposed by William Benoit for United States political debates and the theory of illocutions to the televised governorship debate of Lagos State. As opposed to other studies that have applied it to the United States, Finland, etc., it applies this theory to an African political debate. It asserts as against others that candidates distinguish themselves from their opponents using the major functions of campaign discourse in a reversed order, that is, attacks, defences (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  9. The Attack on Liberalism.Mark R. Reiff - 2007 - In Michael D. A. Freeman & Ross Harrison (eds.), Law and Philosophy. Oxford University Press.
    Liberalism is today under attack. This attack is being fought along two fronts, and so appears to be coming from different directions, but it is actually coming exclusively from the right. One source is Islamic fundamentalism, and the other is American neo-conservatism, which in turn unites elements of Christian fundamentalism with elements of neo-Platonic political philosophy and neo-Aristotelian moral theory. Both Islamic fundamentalism and American neo-conservatism are perfectionist views, and while perfectionist attacks on liberalism are nothing new, there (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  10.  48
    Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.Marwan Albahar - 2019 - Science and Engineering Ethics 25 (4):993-1006.
    In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been as high as it is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  6
    Attack semantics and collective attacks revisited.Martin Caminada, Matthias König, Anna Rapberger & Markus Ulbricht - forthcoming - Argument and Computation:1-77.
    In the current paper we re-examine the concepts of attack semantics and collective attacks in abstract argumentation, and examine how these concepts interact with each other. For this, we systematically map the space of possibilities. Starting with standard argumentation frameworks (which consist of a directed graph with nodes and arrows) we briefly state both node semantics and arrow semantics (the latter a.k.a. attack semantics) in both their extensions-based form and labellings-based form. We then proceed with SETAFs (which consist (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12. Ang Attack on Titan ni Hajime Isayama Batay sa Iba't Ibang Pilosopikal na Pananaw.Mark Joseph Santos - 2022 - Dalumat E-Journal 8 (1):68-91.
    Dalawa sa mga hibla ng Pilosopiyang Filipino ay patungkol sa paggamit ng banyagang pilosopiya at pamimilosopiya sa wikang Filipino. Makatutulong ang dalawang ito tungo sa pagsasalin ng mga banyagang kaisipan sa talastasang bayan. Ang dalawang hiblang ito ang nais na ambagan ng kasalukuyang sanaysay, sa pamamagitan ng pagsasagawa ng rebyu sa isang halimbawa ng anime/manga na Hapon: ang Attack on Titan (AOT) ni Hajime Isayama. Gagamitin sa pagbasa ng AOT ang mga pilosopikal na pananaw ng ilang Aleman/Austrianong pilosoper/sikolohista na (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  13.  65
    The Attack of the Blob: Hannah Arendt’s Concept of the Social.Hanna Fenichel Pitkin - 1998 - University of Chicago Press.
    This book is thus a battle of wits. . . . [A] vivid sketch of the conflict between two basic outlooks."—Library Journal "[O]ne leaves this book feeling enriched and challenged.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   33 citations  
  14.  40
    Attack, disapproval, or withdrawal? The role of honour in anger and shame responses to being insulted.Patricia M. Rodriguez Mosquera, Agneta H. Fischer, Antony S. R. Manstead & Ruud Zaalberg - 2008 - Cognition and Emotion 22 (8):1471-1498.
    Insults elicit intense emotion. This study tests the hypothesis that one's social image, which is especially salient in honour cultures, influences the way in which one reacts to an insult. Seventy-seven honour-oriented and 72 non-honour oriented participants answered questions about a recent insult episode. Participants experienced both anger and shame in reaction to the insult. However, these emotions resulted in different behaviours. Anger led to verbal attack (i.e., criticising, insulting in return) among all participants. This relationship was explained by (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  15.  19
    The Attack on Sovereignty: Liberalism and Democracy in Hayek, Foucault, and Lefort.Annabel Herzog - 2021 - Political Theory 49 (4):662-685.
    This essay examines and challenges some of the theoretical arguments of the neoliberal attack on the concept of popular sovereignty. I argue that in order to resist both the neoliberal reaction against popular power and the subsequent resurgence of populist rhetoric, we need to rework the concept of popular sovereignty. I focus on three groups of texts written in the early years of the neoliberal shift—namely, from the mid-1970s to early 1980s—which deal with the question of sovereignty: Hayek’s Law, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  11
    Attack upon Christendom.Søren Kierkegaard - 2020 - Princeton University Press.
    A religious diatribe written from within the Church against the established order of things in a presumably "Christian" land.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  17.  14
    Attack of the anti-cloners.Caplan Arthur - 2002 - Free Inquiry 23 (1).
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  11
    Attack on identity. (Russian culture as an existential threat to Ukraine).Oleh Bilyi - 2022 - Filosofska Dumka (Philosophical Thought) 4:145-160.
    The article deals with the role of Russian culture in the period of the RF war against Ukraine. The history is considered as the basic structure that shapes the discursive foundation of identity. Historical narratives as well as the cultural background of imperial identity and risks of the full scale representation of Russian culture in the Ukrainian social consciousness are analyzed. The two tendencies are also comprehended — junk science foundation of geopolitical projects and devalu- ation of the historically formed (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19. An attack upon revelation in semantics.Campbell Crockett - 1959 - Journal of Philosophy 56 (3):103-111.
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  20.  14
    Attack, Defense and Counter-Attack in the Inuit Duel Songs of Ammassalik.Christian Plantin - 2020 - Argumentation 35 (1):51-72.
    This study is based on a corpus of duel songs from the traditional Ammassalik culture, published by the anthropologists P.-É. Victor and J. Robert-Lamblin. In this culture, the duel is a moment in the development of a quarrel, originating in a conflictual event; one of the partners challenges the other to a song duel. Our study focuses upon the basic argumentative strategies of defense and counter attack used to reject the accusation. The charges range from what may seem to (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21. Christendom attacked.Conrad Bonifazi - 1953 - London,: Rockliff.
  22.  31
    Attack of the Memes! How cultural parasites can subvert human interests.Maarten Boudry & Steije Hofhuis - unknown
    Are there any such things as mind viruses? By analogy with biological parasites, such cultural items supposed to subvert or harm the interests of their host. Most popularly, this notion has been associated with Richard Dawkins’ concept of the “selfish meme”. To unpack this claim, we first clear some conceptual ground around the notion of cultural adaptation and units called ‘memes’. We then formulate Millikan’s challenge: how can cultural items develop novel purposes of their own, cross-cutting or subverting human purposes? (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  23. The Attack on Substance: Descartes to Hume.Edwin B. Allaire - 1964 - Dialogue 3 (3):284-287.
  24.  89
    Attacking Profiles of the Best Ranked Teams From Elite Futsal Leagues.César Méndez, Bruno Gonçalves, Joao Santos, J. N. Ribeiro & Bruno Travassos - 2019 - Frontiers in Psychology 10.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  25. Israel’s attack on gaza: some philosophical reflections [online].Peter Cave - 2024 - Daily Philosophy.
    The attachment for download here merely references my 5,500-word final and extended article, criticising those who seek to justify Israeli attacks on Gaza. The article is published online by Daily Philosophy, 5th January 2024, link shown below. -/- After a background of facts (probably well-known by readers concerned about the matters), the article examines typical arguments much used in the media as attempts to justify Israel’s determined destruction of Gaza, involving well over twenty thousand Palestinians killed, hundreds of thousands suffering (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  6
    The attack and defense games.Roman M. Sheremeta - 2019 - Behavioral and Brain Sciences 42.
    The attack-and-defense game is a game in which an attacker has an incentive to revise the status quo and a defender wants to protect it. The asymmetry in objectives creates incompatible interests and results in a mixed-strategy Nash equilibrium. However, this equilibrium could be heavily impacted by behavioral considerations.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  4
    Is Floridi’s Attack on Traditional Theories of Knowledge Successful? In relation to the Gettier Problem -. 반재선 - 2020 - Cheolhak-Korean Journal of Philosophy 142:151-170.
    플로리디는 믿음을 중심으로 지식을 분석하는 전통적인 지식이론이 게티어 문제를 해결할 수 없다고 주장한다. 그 논거는 게티어 문제가 협공의 문제로 모델화될 수 있으며, 협공의 문제는 해결될 수 없는 것으로 이미 증명되었다는 것이다. 하지만 게티어 문제와 협공의 문제는 상이한 논리적 구조를 갖고 있다. 따라서 이 둘이 동일한 방식으로 모델화될 수 있다는 플로리디의 주장은 잘못되었다. 그러므로 전통적인 지식이론에 대한 플로리디의 비판은 성공적이지 못하다.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  8
    Eros’ attack on κτηματα: A note on sophocles, antigone 782.Emilio Capettini - 2018 - Classical Quarterly 68 (2):408-414.
    Ἔρως ἀνίκατε μάχαν, 781Ἔρως, ὃς ἐν κτήμασι πίπτεις,ὃς ἐν μαλακαῖς παρειαῖςνεάνιδος ἐννυχεύεις,φοιτᾷς δ’ ὑπερπόντιος ἔν τ’ 785ἀγρονόμοις αὐλαῖς·Love invincible in battle, Love who falls upon ktêmata, you who spend the night upon the soft cheeks of a girl, and travel over the sea and through the huts of dwellers in the wild.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29. Strategies of Character Attack.Fabrizio Macagno - 2013 - Argumentation 27 (4):1-33.
    Why are personal attacks so powerful? In political debates, speeches, discussions and campaigns, negative character judgments, aggressive charges and charged epithets are used for different purposes. They can block the dialogue, trigger value judgments and influence decisions; they can force the interlocutor to withdraw a viewpoint or undermine his arguments. Personal attacks are not only multifaceted dialogical moves, but also complex argumentative strategies. They can be considered as premises for further arguments based on signs, generalizations or consequences. They involve tactics (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  30.  18
    A Mindsponge-Based Investigation into the Psycho-Religious Mechanism Behind Suicide Attacks.Quan-Hoang Vuong, Minh-Hoang Nguyen & Tam-Tri Le - 2021 - Sciendo.
    The book examines the psycho-religious mechanism behind the violent extremism of suicide attacks in the post-9/11 world. It employs the mindsponge concept, an original dataset, and original research results obtained from the authors' statistical investigations using the Hamiltonian Markov chain Monte Carlo technique. It provides insights and implications for policymakers and strategists in their efforts to engage in peace talks and reduce violent conflicts worldwide.
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  31.  10
    Attacks on science.Lisa Idzikowski (ed.) - 2022 - New York: Greenhaven Publishing.
    Recent examples of attacks on science-such as climate change denial and anti-vaccination movements-demonstrate the danger of attacks on science. However, the negative impacts of these attacks must be weighed against other considerations, including the freedom of speech and religious expression and the assertion that some criticism is healthy for the scientific field. The viewpoints in this title consider the impacts of attacks on science, whether these attacks can be stopped, and how they can be prevented. It also examines the role (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  32. Attacking authority.Matthews Steve - 2011 - Australian Journal of Professional and Applied Ethics 13 (2):59-70.
    The quality of our public discourse – think of the climate change debate for instance – is never very high. A day spent observing it reveals a litany of misrepresentation and error, argumentative fallacy, and a general lack of good will. In this paper I focus on a microcosmic aspect of these practices: the use of two types of argument – the argumentum ad hominem and appeal to authority – and a way in which they are related. Public debate is (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  18
    The attack and defense mechanisms: Perspectives from behavioral economics and game theory.Subhasish M. Chowdhury - 2019 - Behavioral and Brain Sciences 42.
    This commentary complements the article by De Dreu and Gross from the perspectives of behavioral economics and game theory. It aims to provide a bridge between psychology/neuroscience research and economics research in attack-and-defense by stipulating relevant literature, clarifying theoretical structures, and suggesting improvements in experimental designs and possible further investigations.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  3
    Terror Attacks and the Production of the Sacred.Thomas Clavel - 2017 - Philosophical Journal of Conflict and Violence 1 (2).
    Starting from René Girard and Philippe Muray’s thoughts on terrorism, the present paper introduces the hypothesis that the re-sacralization of the hyperfestive1 era is the unexpected but seemingly inevitable effect of jihadist attacks in Europe. These assumptions aim to shed new light on the Western rhetoric of commemorative events and media discourses.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  35.  28
    Perception attack.Brian Massumi - 2008 - Multitudes 34 (3):74.
    When war becomes perception attack, and perception is attacked ecologically ; when the ecology is of experience dawning, and the dawning modulates what will become ; when that modulation inhabits an untimely, « eternitarian » lapse, and in that lapse we « recollect forward » a world of conflict ; when that forwarding of a world of conflict plies the « full spectrum », expressing itself as a force of life – then the machinery of war arrogates to itself (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  42
    The Attack on Isocrates in the Phaedrus.R. L. Howland - 1937 - Classical Quarterly 31 (3-4):151-.
    The most famous and successful teacher of rhetoric at Athens in the fourth century was Isocrates, and he claimed for rhetoric an educational importance which Plato considered to be unmerited and misleading. He made rhetoric the basis of his whole educational system and claimed to teach his pupils to become not only good rhetoricians but good citizens. Plato attacked both aspects of this theory of education. In the Gorgias he exposed the claim of rhetoric to be considered valuable as an (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  37.  7
    Attack on Government: Fear, Distrust, and Hatred in Public Life.David P. Levine - 2004 - Pitchstone Publishing.
    Distrust of government and a sense that government has failed are central features of public life in America. Attack on Government is a psychological study of these and related features of the way we experience government in the United States. The book considers such topics as the moral standing of government, the free market ideal, and the abuse of power.
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  12
    Insider attack detection in database with deep metric neural network with Monte Carlo sampling.Gwang-Myong Go, Seok-Jun Bu & Sung-Bae Cho - 2022 - Logic Journal of the IGPL 30 (6):979-992.
    Role-based database management systems are most widely used for information storage and analysis but are known as vulnerable to insider attacks. The core of intrusion detection lies in an adaptive system, where an insider attack can be judged if it is different from the predicted role by performing classification on the user’s queries accessing the database and comparing it with the authorized role. In order to handle the high similarity of user queries for misclassified roles, this paper proposes a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  39.  4
    Attack versus defense: A strategic rationale for role differentiation in conflict.Catherine Hafer - 2019 - Behavioral and Brain Sciences 42.
    Is there a strategic mechanism that explains role-contingent differences in conflict behavior? I sketch a theory in which differences in optimal behavior for attackers and defenders arise under initially symmetric conditions through the dynamic accumulation of differences in the distributions of traits in the subpopulations of potential opponents.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  14
    Resolving attacker-defender conflicts through intergroup negotiation.Nir Halevy - 2019 - Behavioral and Brain Sciences 42.
    The target article focuses on how attacker-defender conflicts are fought. This commentary complements it by considering how attacker-defender conflicts may be resolved at the bargaining table. I highlight multiple linkages between asymmetric intergroup conflict as modeled with the attacker-defender game and negotiation research and illustrate how the proposed model of attacker-defender conflicts can inspire new research on intergroup negotiation.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41. Adversarial Attacks on Image Generation With Made-Up Words.Raphaël Millière - manuscript
    Text-guided image generation models can be prompted to generate images using nonce words adversarially designed to robustly evoke specific visual concepts. Two approaches for such generation are introduced: macaronic prompting, which involves designing cryptic hybrid words by concatenating subword units from different languages; and evocative prompting, which involves designing nonce words whose broad morphological features are similar enough to that of existing words to trigger robust visual associations. The two methods can also be combined to generate images associated with more (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  6
    The attack on value in 20th century art.Robert Boyers - 1989 - History of European Ideas 11 (1-6):481-491.
  43.  9
    Inferring attack relations for gradual semantics.Nir Oren & Bruno Yun - 2023 - Argument and Computation 14 (3):327-345.
    A gradual semantics takes a weighted argumentation framework as input and outputs a final acceptability degree for each argument, with different semantics performing the computation in different manners. In this work, we consider the problem of attack inference. That is, given a gradual semantics, a set of arguments with associated initial weights, and the final desirable acceptability degrees associated with each argument, we seek to determine whether there is a set of attacks on those arguments such that we can (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  50
    Rational Attack on Shulamith Firestone’s Radical Feminism.Ma Theresa T. Payongayong & Jeanette L. Yasol-Naval - 2008 - Proceedings of the Xxii World Congress of Philosophy 25:77-85.
    The paper will revolve around Shulamith Firestone’s claims that women’s biology is the root cause of prejudices against women and at the same time the basis for solutions that seek to end such prejudices. In the rational attack to these claims, it is argued that Firestone does not really debunk the patriarchal view but actually agrees with it. The attack focused on her avowed solution to the women problem that turns out to be defeatist in nature. In the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  2
    Legislative Attack.Eyal Weizman - 2010 - Theory, Culture and Society 27 (6):11-32.
    Israel’s 22-day attack on Gaza in December 2008—January 2009 exposed a paradox: the attack was not only one of the most violent and destructive of Israel’s recent wars on the Palestinians and the one most strongly opposed by its critics, but also the one in which Israeli experts in international humanitarian law — the area of the law that regulates the conduct of war — were most closely involved. The article demonstrates how these facts are connected.
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  82
    Semantics for Higher Level Attacks in Extended Argumentation Frames Part 1: Overview.Dov M. Gabbay - 2009 - Studia Logica 93 (2-3):357 - 381.
    In 2005 the author introduced networks which allow attacks on attacks of any level. So if a → b reads a attacks 6, then this attack can itself be attacked by another node c. This attack itself can attack another node d. This situation can be iterated to any level with attacks and nodes attacking other attacks and other nodes. In this paper we provide semantics (of extensions) to such networks. We offer three different approaches to obtaining (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  47.  7
    Suicide attack martyrdoms.Adolf Tobeña - 2011 - In Barbara Oakley, Ariel Knafo, Guruprasad Madhavan & David Sloan Wilson (eds.), Pathological Altruism. Oxford University Press. pp. 207.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  48.  58
    Socrates' Attack on Intellectualism in the "Charmides".Voula Tsouna - 1997 - Apeiron 30 (4):63 - 78.
  49.  49
    Innocent Attackers and Rights of Self-Defense.David R. Mapel - 2004 - Ethics and International Affairs 18 (1):81-86.
  50. When the disease attacks. Anonymous - 1996 - Philosophy and Culture 23 (7):1827-1831.
    No categories
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000