Results for 'attacks'

1000+ found
Order:
  1. USC Football Notebook: Robey, McDonald Secondary Stalwarts.White House Confirms Cyber Attack - forthcoming - Hermes.
     
    Export citation  
     
    Bookmark  
  2. Milton F. lunch.Professions Under Attack - 1983 - In James Hamilton Schaub, Karl Pavlovic & M. D. Morris (eds.), Engineering Professionalism and Ethics. Krieger Pub. Co..
    No categories
     
    Export citation  
     
    Bookmark  
  3. Attacking the Bounds of cognition.Richard Menary - 2006 - Philosophical Psychology 19 (3):329-344.
    Recently internalists have mounted a counter-attack on the attempt to redefine the bounds of cognition. The counter-attack is aimed at a radical project which I call "cognitive integration," which is the view that internal and external vehicles and processes are integrated into a whole. Cognitive integration can be defended against the internalist counter arguments of Adams and Aizawa (A&A) and Rupert. The disagreement between internalists and integrationists is whether the manipulation of external vehicles constitutes a cognitive process. Integrationists think that (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   90 citations  
  4. Ang Attack on Titan ni Hajime Isayama Batay sa Iba't Ibang Pilosopikal na Pananaw.Mark Joseph Santos - 2022 - Dalumat E-Journal 8 (1):68-91.
    Dalawa sa mga hibla ng Pilosopiyang Filipino ay patungkol sa paggamit ng banyagang pilosopiya at pamimilosopiya sa wikang Filipino. Makatutulong ang dalawang ito tungo sa pagsasalin ng mga banyagang kaisipan sa talastasang bayan. Ang dalawang hiblang ito ang nais na ambagan ng kasalukuyang sanaysay, sa pamamagitan ng pagsasagawa ng rebyu sa isang halimbawa ng anime/manga na Hapon: ang Attack on Titan (AOT) ni Hajime Isayama. Gagamitin sa pagbasa ng AOT ang mga pilosopikal na pananaw ng ilang Aleman/Austrianong pilosoper/sikolohista na sina (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  5.  16
    The Attack of the Blob: Hannah Arendt’s Concept of the Social.Hanna Fenichel Pitkin - 1998 - University of Chicago Press.
    One of the most brilliant political theorists of our time, Hannah Arendt intended her work to liberate, to convince us that the power to improve our flawed arrangements is in our hands. At the same time, Arendt developed a metaphor of "the social" as an alien, appearing as if from outer space to gobble up human freedom; she blamed it—not us—for our public paralysis. In _The Attack of the Blob_, Hanna Pitkin seeks to resolve this seeming paradox by tracing Arendt's (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  6.  42
    Attack, disapproval, or withdrawal? The role of honour in anger and shame responses to being insulted.Patricia M. Rodriguez Mosquera, Agneta H. Fischer, Antony S. R. Manstead & Ruud Zaalberg - 2008 - Cognition and Emotion 22 (8):1471-1498.
    Insults elicit intense emotion. This study tests the hypothesis that one's social image, which is especially salient in honour cultures, influences the way in which one reacts to an insult. Seventy-seven honour-oriented and 72 non-honour oriented participants answered questions about a recent insult episode. Participants experienced both anger and shame in reaction to the insult. However, these emotions resulted in different behaviours. Anger led to verbal attack (i.e., criticising, insulting in return) among all participants. This relationship was explained by participants’ (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  7.  66
    The Attack of the Blob: Hannah Arendt’s Concept of the Social.Hanna Fenichel Pitkin - 1998 - University of Chicago Press.
    This book is thus a battle of wits. . . . [A] vivid sketch of the conflict between two basic outlooks."—Library Journal "[O]ne leaves this book feeling enriched and challenged.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   33 citations  
  8. The Attack on Liberalism.Mark R. Reiff - 2007 - In Michael D. A. Freeman & Ross Harrison (eds.), Law and Philosophy. Oxford University Press.
    Liberalism is today under attack. This attack is being fought along two fronts, and so appears to be coming from different directions, but it is actually coming exclusively from the right. One source is Islamic fundamentalism, and the other is American neo-conservatism, which in turn unites elements of Christian fundamentalism with elements of neo-Platonic political philosophy and neo-Aristotelian moral theory. Both Islamic fundamentalism and American neo-conservatism are perfectionist views, and while perfectionist attacks on liberalism are nothing new, there is (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  9. Attacking Character: Ad Hominem Argument and Virtue Epistemology.Heather Battaly - 2010 - Informal Logic 30 (4):361-390.
    The recent literature on ad hominem argument contends that the speaker’s character is sometimes relevant to evaluating what she says. This effort to redeem ad hominems requires an analysis of character that explains why and how character is relevant. I argue that virtue epistemology supplies this analysis. Three sorts of ad hominems that attack the speaker’s intellectual character are legitimate. They attack a speaker’s: (1) possession of reliabilist vices; or (2) possession of responsibilist vices; or (3) failure to perform intellectually (...)
    Direct download (13 more)  
     
    Export citation  
     
    Bookmark   22 citations  
  10. Experimental Attacks on Intuitions and Answers.John Bengson - 2012 - Philosophy and Phenomenological Research 86 (3):495-532.
  11. Attacking faulty reasoning: a practical guide to fallacy-free arguments.T. Edward Damer - 2009 - Belmont, CA: Wadsworth/Cengage Laerning.
    This text is designed to help students construct and evaluate arguments.
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  12.  11
    Attack upon Christendom.Søren Kierkegaard - 2020 - Princeton University Press.
    A religious diatribe written from within the Church against the established order of things in a presumably "Christian" land.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  13.  6
    The attack and defense games.Roman M. Sheremeta - 2019 - Behavioral and Brain Sciences 42.
    The attack-and-defense game is a game in which an attacker has an incentive to revise the status quo and a defender wants to protect it. The asymmetry in objectives creates incompatible interests and results in a mixed-strategy Nash equilibrium. However, this equilibrium could be heavily impacted by behavioral considerations.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  51
    Frankfurt's Attack on the Principle of Alternative Possibilities: A Further Look.David Widerker - 2000 - Noûs 34 (s14):181-201.
  15. Strategies of Character Attack.Fabrizio Macagno - 2013 - Argumentation 27 (4):1-33.
    Why are personal attacks so powerful? In political debates, speeches, discussions and campaigns, negative character judgments, aggressive charges and charged epithets are used for different purposes. They can block the dialogue, trigger value judgments and influence decisions; they can force the interlocutor to withdraw a viewpoint or undermine his arguments. Personal attacks are not only multifaceted dialogical moves, but also complex argumentative strategies. They can be considered as premises for further arguments based on signs, generalizations or consequences. They (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  16.  13
    Insider attack detection in database with deep metric neural network with Monte Carlo sampling.Gwang-Myong Go, Seok-Jun Bu & Sung-Bae Cho - 2022 - Logic Journal of the IGPL 30 (6):979-992.
    Role-based database management systems are most widely used for information storage and analysis but are known as vulnerable to insider attacks. The core of intrusion detection lies in an adaptive system, where an insider attack can be judged if it is different from the predicted role by performing classification on the user’s queries accessing the database and comparing it with the authorized role. In order to handle the high similarity of user queries for misclassified roles, this paper proposes a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  2
    Legislative Attack.Eyal Weizman - 2010 - Theory, Culture and Society 27 (6):11-32.
    Israel’s 22-day attack on Gaza in December 2008—January 2009 exposed a paradox: the attack was not only one of the most violent and destructive of Israel’s recent wars on the Palestinians and the one most strongly opposed by its critics, but also the one in which Israeli experts in international humanitarian law — the area of the law that regulates the conduct of war — were most closely involved. The article demonstrates how these facts are connected.
    Direct download  
     
    Export citation  
     
    Bookmark  
  18. Attacking authority.Matthews Steve - 2011 - Australian Journal of Professional and Applied Ethics 13 (2):59-70.
    The quality of our public discourse – think of the climate change debate for instance – is never very high. A day spent observing it reveals a litany of misrepresentation and error, argumentative fallacy, and a general lack of good will. In this paper I focus on a microcosmic aspect of these practices: the use of two types of argument – the argumentum ad hominem and appeal to authority – and a way in which they are related. Public debate is (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  3
    Terror Attacks and the Production of the Sacred.Thomas Clavel - 2017 - Philosophical Journal of Conflict and Violence 1 (2).
    Starting from René Girard and Philippe Muray’s thoughts on terrorism, the present paper introduces the hypothesis that the re-sacralization of the hyperfestive1 era is the unexpected but seemingly inevitable effect of jihadist attacks in Europe. These assumptions aim to shed new light on the Western rhetoric of commemorative events and media discourses.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  28
    Perception attack.Brian Massumi - 2008 - Multitudes 34 (3):74.
    When war becomes perception attack, and perception is attacked ecologically ; when the ecology is of experience dawning, and the dawning modulates what will become ; when that modulation inhabits an untimely, « eternitarian » lapse, and in that lapse we « recollect forward » a world of conflict ; when that forwarding of a world of conflict plies the « full spectrum », expressing itself as a force of life – then the machinery of war arrogates to itself ontoproductive (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21. Adversarial Attacks on Image Generation With Made-Up Words.Raphaël Millière - manuscript
    Text-guided image generation models can be prompted to generate images using nonce words adversarially designed to robustly evoke specific visual concepts. Two approaches for such generation are introduced: macaronic prompting, which involves designing cryptic hybrid words by concatenating subword units from different languages; and evocative prompting, which involves designing nonce words whose broad morphological features are similar enough to that of existing words to trigger robust visual associations. The two methods can also be combined to generate images associated with more (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  4
    Attack versus defense: A strategic rationale for role differentiation in conflict.Catherine Hafer - 2019 - Behavioral and Brain Sciences 42.
    Is there a strategic mechanism that explains role-contingent differences in conflict behavior? I sketch a theory in which differences in optimal behavior for attackers and defenders arise under initially symmetric conditions through the dynamic accumulation of differences in the distributions of traits in the subpopulations of potential opponents.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  14
    Resolving attacker-defender conflicts through intergroup negotiation.Nir Halevy - 2019 - Behavioral and Brain Sciences 42.
    The target article focuses on how attacker-defender conflicts are fought. This commentary complements it by considering how attacker-defender conflicts may be resolved at the bargaining table. I highlight multiple linkages between asymmetric intergroup conflict as modeled with the attacker-defender game and negotiation research and illustrate how the proposed model of attacker-defender conflicts can inspire new research on intergroup negotiation.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  24
    The Attack on Sovereignty: Liberalism and Democracy in Hayek, Foucault, and Lefort.Annabel Herzog - 2021 - Political Theory 49 (4):662-685.
    This essay examines and challenges some of the theoretical arguments of the neoliberal attack on the concept of popular sovereignty. I argue that in order to resist both the neoliberal reaction against popular power and the subsequent resurgence of populist rhetoric, we need to rework the concept of popular sovereignty. I focus on three groups of texts written in the early years of the neoliberal shift—namely, from the mid-1970s to early 1980s—which deal with the question of sovereignty: Hayek’s Law, Legislation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  18
    Interaction Attacks as Deceitful Connected and Automated Vehicle Behaviour.F. Fossa, Luca Paparusso & Francesco Braghin - 2024 - In S. Parkinson, A. Nikitas & M. Vallati (eds.), Deception in Autonomous Transport Systems. Threats, Impacts, and Mitigation Policies. Cham: Springer. pp. 147-162.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  26.  15
    Attack, Defense and Counter-Attack in the Inuit Duel Songs of Ammassalik.Christian Plantin - 2020 - Argumentation 35 (1):51-72.
    This study is based on a corpus of duel songs from the traditional Ammassalik culture, published by the anthropologists P.-É. Victor and J. Robert-Lamblin. In this culture, the duel is a moment in the development of a quarrel, originating in a conflictual event; one of the partners challenges the other to a song duel. Our study focuses upon the basic argumentative strategies of defense and counter attack used to reject the accusation. The charges range from what may seem to us (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  10
    Attacks on science.Lisa Idzikowski (ed.) - 2022 - New York: Greenhaven Publishing.
    Recent examples of attacks on science-such as climate change denial and anti-vaccination movements-demonstrate the danger of attacks on science. However, the negative impacts of these attacks must be weighed against other considerations, including the freedom of speech and religious expression and the assertion that some criticism is healthy for the scientific field. The viewpoints in this title consider the impacts of attacks on science, whether these attacks can be stopped, and how they can be prevented. (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  25
    The Attack on Methodological Solipsism.Jane Duran - 1994 - Philosophica 53:81-90.
  29.  90
    Attacking Profiles of the Best Ranked Teams From Elite Futsal Leagues.César Méndez, Bruno Gonçalves, Joao Santos, J. N. Ribeiro & Bruno Travassos - 2019 - Frontiers in Psychology 10.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  30.  7
    Attack on Government: Fear, Distrust, and Hatred in Public Life.David P. Levine - 2004 - Pitchstone Publishing.
    Distrust of government and a sense that government has failed are central features of public life in America. Attack on Government is a psychological study of these and related features of the way we experience government in the United States. The book considers such topics as the moral standing of government, the free market ideal, and the abuse of power.
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  50
    Rational Attack on Shulamith Firestone’s Radical Feminism.Ma Theresa T. Payongayong & Jeanette L. Yasol-Naval - 2008 - Proceedings of the Xxii World Congress of Philosophy 25:77-85.
    The paper will revolve around Shulamith Firestone’s claims that women’s biology is the root cause of prejudices against women and at the same time the basis for solutions that seek to end such prejudices. In the rational attack to these claims, it is argued that Firestone does not really debunk the patriarchal view but actually agrees with it. The attack focused on her avowed solution to the women problem that turns out to be defeatist in nature. In the attempt to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  52
    Innocent Attackers and Rights of Self-Defense.David R. Mapel - 2004 - Ethics and International Affairs 18 (1):81-86.
  33.  24
    The attack on distinctions.Giovanni Vailati - 1907 - Journal of Philosophy, Psychology and Scientific Methods 4 (26):701-709.
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  34. Hume’s attack on Newton’s philosophy.Eric Schliesser - 2009 - Enlightenment and Dissent 25:167-203.
    In this paper, I argue that major elements of Hume’s metaphysics and epistemology are not only directed at the inductive argument from design which seemed to follow from the success of Newton’s system, but also have far larger aims. They are directed against the authority of Newton’s natural philosophy; the claims of natural philosophy are constrained by philosophic considerations. Once one understands this, Hume’s high ambitions for a refashioned ‘true metaphysics’ or ‘first philosophy’, that is, Hume’s ‘Science of Human Nature’, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  35.  20
    A Mindsponge-Based Investigation into the Psycho-Religious Mechanism Behind Suicide Attacks.Quan-Hoang Vuong, Minh-Hoang Nguyen & Tam-Tri Le - 2021 - Sciendo.
    The book examines the psycho-religious mechanism behind the violent extremism of suicide attacks in the post-9/11 world. It employs the mindsponge concept, an original dataset, and original research results obtained from the authors' statistical investigations using the Hamiltonian Markov chain Monte Carlo technique. It provides insights and implications for policymakers and strategists in their efforts to engage in peace talks and reduce violent conflicts worldwide.
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  36.  4
    Acclaims, attacks and defences in Nigerian gubernatorial debate.Oluwateniola Oluwabukola Ajilore - 2015 - Discourse and Communication 9 (1):3-18.
    This study applies functional theory of campaign discourse proposed by William Benoit for United States political debates and the theory of illocutions to the televised governorship debate of Lagos State. As opposed to other studies that have applied it to the United States, Finland, etc., it applies this theory to an African political debate. It asserts as against others that candidates distinguish themselves from their opponents using the major functions of campaign discourse in a reversed order, that is, attacks, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  37.  14
    Attack of the anti-cloners.Caplan Arthur - 2002 - Free Inquiry 23 (1).
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  48
    Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.Marwan Albahar - 2019 - Science and Engineering Ethics 25 (4):993-1006.
    In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been as high as it (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39.  6
    Attack semantics and collective attacks revisited.Martin Caminada, Matthias König, Anna Rapberger & Markus Ulbricht - forthcoming - Argument and Computation:1-77.
    In the current paper we re-examine the concepts of attack semantics and collective attacks in abstract argumentation, and examine how these concepts interact with each other. For this, we systematically map the space of possibilities. Starting with standard argumentation frameworks (which consist of a directed graph with nodes and arrows) we briefly state both node semantics and arrow semantics (the latter a.k.a. attack semantics) in both their extensions-based form and labellings-based form. We then proceed with SETAFs (which consist of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40. Israel’s attack on gaza: some philosophical reflections [online].Peter Cave - 2024 - Daily Philosophy.
    The attachment for download here merely references my 5,500-word final and extended article, criticising those who seek to justify Israeli attacks on Gaza. The article is published online by Daily Philosophy, 5th January 2024, link shown below. -/- After a background of facts (probably well-known by readers concerned about the matters), the article examines typical arguments much used in the media as attempts to justify Israel’s determined destruction of Gaza, involving well over twenty thousand Palestinians killed, hundreds of thousands (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  44
    The Attack on Isocrates in the Phaedrus.R. L. Howland - 1937 - Classical Quarterly 31 (3-4):151-.
    The most famous and successful teacher of rhetoric at Athens in the fourth century was Isocrates, and he claimed for rhetoric an educational importance which Plato considered to be unmerited and misleading. He made rhetoric the basis of his whole educational system and claimed to teach his pupils to become not only good rhetoricians but good citizens. Plato attacked both aspects of this theory of education. In the Gorgias he exposed the claim of rhetoric to be considered valuable as an (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  42.  7
    Suicide attack martyrdoms.Adolf Tobeña - 2011 - In Barbara Oakley, Ariel Knafo, Guruprasad Madhavan & David Sloan Wilson (eds.), Pathological Altruism. Oxford University Press. pp. 207.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  43. Science Under Attack.Nicholas Maxwell - 2005 - The Philosopher’s Magazine 31:37-41.
    Science has been under attack ever since William Blake and Romantic movement. In our time, criticisms of modern science have led to Alan Sokal's spoof, and the so-called science wars. Both sides missed the point. Science deserves to be criticized for seriously misrepresenting its highly problematic aims, which have metaphysical, value and political assumptions associated with them. Instead of repressing these problematic aims, science ought rather to make them explicit, so that they can be critically assessed and, we may hope, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  44.  22
    ‘Attack of the Hybrid Swarm?’.Jennifer Welchman - 2015 - Ethics, Policy and Environment 18 (3):252-255.
    Rohwer and Marris’s exploration of grounds for a prima facie duty to preserve the genetic integrity of wild species makes two important contributions to the environmental ethics literature. While n...
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  47
    Perception Attack: Brief on War Time.Brian Massumi - 2010 - Theory and Event 13 (3).
  46.  9
    Inferring attack relations for gradual semantics.Nir Oren & Bruno Yun - 2023 - Argument and Computation 14 (3):327-345.
    A gradual semantics takes a weighted argumentation framework as input and outputs a final acceptability degree for each argument, with different semantics performing the computation in different manners. In this work, we consider the problem of attack inference. That is, given a gradual semantics, a set of arguments with associated initial weights, and the final desirable acceptability degrees associated with each argument, we seek to determine whether there is a set of attacks on those arguments such that we can (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  12
    How the Membrane Attack Complex Damages the Bacterial Cell Envelope and Kills Gram‐Negative Bacteria.Dennis J. Doorduijn, Suzan H. M. Rooijakkers & Dani A. C. Heesterbeek - 2019 - Bioessays 41 (10):1900074.
    The human immune system can directly lyse invading micro‐organisms and aberrant host cells by generating pores in the cell envelope, called membrane attack complexes (MACs). Recent studies using single‐particle cryoelectron microscopy have revealed that the MAC is an asymmetric, flexible pore and have provided a structural basis on how the MAC ruptures single lipid membranes. Despite these insights, it remains unclear how the MAC ruptures the composite cell envelope of Gram‐negative bacteria. Recent functional studies on Gram‐negative bacteria elucidate that local (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48. The attack on the historical method.Morton G. White - 1945 - Journal of Philosophy 42 (12):314-331.
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  49. Probabilistic interpretations of argumentative attacks: logical and experimental foundations.Niki Pfeifer & C. G. Fermüller - 2018 - In V. Kratochvíl & J. Vejnarová (eds.), 11th Workshop on Uncertainty Processing (WUPES'18). Prague, Czechia: pp. 141-152.
    We present an interdisciplinary approach to study systematic relations between logical form and attacks between claims in an argumentative framework. We propose to generalize qualitative attack principles by quantitative ones. Specifically, we use coherent conditional probabilities to evaluate the rationality of principles which govern the strength of argumentative attacks. Finally, we present an experiment which explores the psychological plausibility of selected attack principles.
    Direct download  
     
    Export citation  
     
    Bookmark  
  50. Christendom attacked.Conrad Bonifazi - 1953 - London,: Rockliff.
1 — 50 / 1000