Academic literature on the topic 'Rançon'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Rançon.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Rançon"
Tillier, Mathieu, and Naïm Vanthieghem. "La rançon du serment." Revue des mondes musulmans et de la Méditerranée, no. 140 (December 30, 2016): 14013–24. http://dx.doi.org/10.4000/remmm.9603.
Full textDiot, Élisabeth. "La rançon du succès ?" La Presse Médicale 38, no. 2 (February 2009): 334. http://dx.doi.org/10.1016/j.lpm.2008.12.005.
Full textMoorehead, Caroline, and Pauline Toulet. "La rançon ou la mort." Books N° 106, no. 4 (April 8, 2020): 52–54. http://dx.doi.org/10.3917/books.106.0052.
Full textHayem, Gilles. "Statines et muscles : la rançon du succès." Revue du Rhumatisme 69, no. 5 (May 2002): 470–72. http://dx.doi.org/10.1016/s1169-8330(02)00323-x.
Full textFeliu i Montfort, Gaspar. "El pes econòmic de la remença i dels mals usos." Anuario de Estudios Medievales 22, no. 1 (April 2, 2020): 145. http://dx.doi.org/10.3989/aem.1992.v22.1067.
Full textLee, Scott. "Obsession et rachat: “Enlèvement avec rançon” d’Yves Ravey." Studi Francesi, no. 193 (LXV | I) (June 1, 2021): 58–74. http://dx.doi.org/10.4000/studifrancesi.43259.
Full textRémy, Gérard. "La violence et la rançon payée au démon." Recherches de Science Religieuse 91, no. 1 (2003): 45. http://dx.doi.org/10.3917/rsr.031.0045.
Full textFéron, Élise. "Irlande du Nord : le radicalisme comme rançon de la paix ?" Critique internationale 22, no. 1 (2004): 17. http://dx.doi.org/10.3917/crii.022.0017.
Full textDaumas, Louis, and François Soleiman. "Le taux d'intérêt : prix du temps, rançon de la patience." Regards croisés sur l'économie 29, no. 2 (May 12, 2022): 79–84. http://dx.doi.org/10.3917/rce.029.0079.
Full textKaiser, Wolfgang. "L'économie de la rançon en Méditerranée occidentale (xvie-xviie siècle)." Hypothèses 10, no. 1 (2007): 359. http://dx.doi.org/10.3917/hyp.061.0359.
Full textDissertations / Theses on the topic "Rançon"
Palisse, Aurélien. "Analyse et détection de logiciels de rançon." Thesis, Rennes 1, 2019. http://www.theses.fr/2019REN1S003/document.
Full textThis phD thesis takes a look at ransomware, presents an autonomous malware analysis platform and proposes countermeasures against these types of attacks. Our countermeasures are real-time and are deployed on a machine (i.e., end-hosts). In 2013, the ransomware become a hot subject of discussion again, before becoming one of the biggest cyberthreats beginning of 2015. A detailed state of the art for existing countermeasures is included in this thesis. This state of the art will help evaluate the contribution of this thesis in regards to the existing current publications. We will also present an autonomous malware analysis platform composed of bare-metal machines. Our aim is to avoid altering the behaviour of analysed samples. A first countermeasure based on the use of a cryptographic library is proposed, however it can easily be bypassed. It is why we propose a second generic and agnostic countermeasure. This time, compromission indicators are used to analyse the behaviour of process on the file system. We explain how we configured this countermeasure in an empiric way to make it useable and effective. One of the challenge of this thesis is to collate performance, detection rate and a small amount of false positive. To finish, results from a user experience are presented. This experience analyses the user's behaviour when faced with a threat. In the final part, I propose ways to enhance our contributions but also other avenues that could be explored
Dallaire, Marc. "Les jeunes de la rue, la rançon d'une fausse liberté." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0017/MQ56397.pdf.
Full textVeilleux, Denis. "La motorisation, ou, "La rançon du progrès" : tramways, véhicules-moteurs et circulation (Montréal, 1900-1930)." Thesis, McGill University, 1998. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=35641.
Full textThis negotiation related to both the space available in the street and the movement of vehicles. Concerning space, the omnipresence of tramways and their installations along with the parking of motor vehicles, particularly in the downtown area of Montreal, led to suggestions of wide boulevards and subway systems as possible solutions. The fact that tramways had priority in traffic and could not be passed by motor vehicles constituted major obstacles for motorists anxious to benefit from the motor car. By the end of the 1920s, conflicts were so intense that the notion of progress was used to promote both the motor vehicle and the tramway.
These conflicts over the sharing of streets had other implications. First, different sections of Montreal's elite favoured one technology over the other. On the one hand, motorists were well organized. At the same time, tramway concerns were determined to protect their monopoly. This animosity within the elite was intensified by antimonopoly feelings and by dissatisfaction with tramway service. Finally, traffic problems multiplied with motorization: deaths, accidents, law suits and downtown congestion. Traffic became an important preoccupation leading to an increase in police forces and the establishment of numerous organizations dedicated to traffic management.
The popular classes of Montreal were not excluded from these conflicts among the elites. Generally speaking, the entire population was forced to take sides with one group of promoters or the other. Motorization then appears as a factor of division within social classes as well as a phenomenon transcending the barriers between them.
Mammadov, Khalid. "La Cour européenne des droits de l'homme, de réforme en réforme : la rançon d'un succès ?" Thesis, Strasbourg, 2014. http://www.theses.fr/2014STRAA031.
Full textThe European Court of Human Rights, since the 1990s, recognizes an unprecedented extension of its competence ratione personae and ratione loci. In order to face this exceptional phenomenon new instruments are required. The purpose of this study is the examination of new techniques adapted by the Court to maintain the level of protection of human rights guaranteed by the Convention. Other organs and Member States of the Council of Europe participated actively to the efforts in order to conserve the excellent level for the protection of human rights in Europe. These are specific areas having been reviewed and valued in terms of their contribution and sometimes their disadvantages. Prepared in a particular space-time, this study would ask in the future to be completed and assessed from this angle
Lollia, Fabrice. "Aide à la décision en situation de crise. Les nouvelles technologies pour la prévention sécuritaire des entreprises : limites et opportunités." Thesis, Paris Est, 2019. http://www.theses.fr/2019PESC0031.
Full textThe current security context shows difficulties for the company in the protection of these employees (expatriates, business travelers). Previously known risks such as kidnapping against perdition are developing and experiencing new human forms that material and immaterial. Indeed, the kidnapping that is human, material or immaterial knows many forms of appearance and adapts according to The esperancy is followed against it in terms of responsibility. It is therefore only an omnipresent risk of which only one proactive attitude could be to reduce the risk. After studying, the kidnapping against deployment and its theoretical contributions. We were analyzed using part of the reading grid of the situational semiotics of Alex Mucchielli. Throughout this page in search action used method on main-exploration exploration with a situation Method that is most suitable for studying the field of security. We then created a digital solution Application of prevention for expatriates and corporate travelers (APSEV) to give a concrete and operational meaning to our work. This solution has been tested and validated as a protection mission at the Embassy of France in Afghanistan. But beyond its creation we explored its impact in the embassy in terms of human interaction. Accepted by some who feel protected and denied by others who feel guarded. This new security technology is disturbing because of its geolocation activity, whose meaning varies from one individual to another. The security problem of kidnapping against ransom can only be solved by the creation of a suitable geolocalisation digital solution without taking into account the effects on human interactions that will make it suitable for use
Bosco, Michele. "Ragion di Stato e salvezza dell’anima. Il riscatto dei cristiani captivi in Maghreb attraverso le redenzioni mercedarie (1575 - 1725)." Thesis, Paris, EHESS, 2017. http://www.theses.fr/2017EHES0037.
Full textThe aim of this work is to analyse the captives redemptions' mechanism, through the study of the specific case of Mercedarians ransoming expeditions to North Africa. We have compared this mechanism with the ones pursued by other ransoming institutions in the Italian and Iberian areas, in order to let economics logics and juridical laws emerge that regulated te ransoming process. After a general introduction on the principal aspects that phenomenon entailed, a chapter of the tesis is dedicated to the analysis of four redemption missions, conducted by the religious Order of Our Lady of Mercy during a period of a century and half, precisely between 1575 and 1723
Con l’obiettivo di far luce sulle dinamiche economiche e sui meccanismi istituzionali che regolavano il riscatto dei cristiani captivi in Maghreb nei secoli centrali dell’età moderna, l’autore si propone di ricostruire l’attività redentrice di uno dei protagonisti indiscussi di quel commercio: l’Ordine di Nostra Signora della Mercede. Al fine di illustrane le specificità, l’autore presenta dapprima un quadro complessivo del fenomeno dei riscatti di captivi tra i secoli XVI e XVIII, inserendolo nel più generale contesto del Mediterraneo e della guerra da corsa combattuta tra le sue sponde. Successivamente, traccia una storia sintetica dell’Ordine della Mercede e della sua diffusione e progressivo sviluppo nei contesti italiano e iberico - con un occhio anche alla realtà dell’America spagnola - e attenta all’aspetto teologico e alla trattatistica giustificativa prodotta dai Mercedari stessi. Analizza, poi, a livello procedurale le missioni di redenzione condotte dai religiosi dell’Ordine a cavallo tra il tardo Cinquecento e il primo Settecento, ne traccia i contorni giuridici e normativi e mira a far emergere le ragioni economiche e politiche che le muovevano. A tal fine, prende in esame quattro esempi di redenzioni di captivi attraverso lo studio di altrettanti libri di conto: l’ampio arco cronologico di riferimento - un secolo e mezzo, dal 1575 al 1723 - consente all’autore di evidenziare i cambiamenti intercorsi a livello procedurale nei riscatti, così come in merito al loro finanziamento e alla destinazione d’uso delle elemosine di volta in volta raccolte. Il modus operandi delle redenzioni mercedarie è quindi messo a confronto con quello di altre istituzioni, laiche e statali, dedite al riscatto dei captivi in area italiana ed iberica e, anche qui, nell’intento di far emergere le logiche economiche, le istanze politiche e gli interessi nazionali e locali che vi sottostavano.La tesi difende l’idea che i religiosi della Mercede, nella loro opera della redenzione dei captivi, non fossero liberi di agire autonomamente e secondo le prerogative dettate dal proprio Ordine, ma che fossero, al contrario, strettamente vincolati a istruzioni date loro dal governo spagnolo e da privati cittadini, essendo questi ultimi i principali finanziatori delle loro missioni di riscatto. Sostiene, insomma, l’idea che l’azione umanitaria dei religiosi rispondesse, in realtà, più a logiche economiche e agli interessi della politica che non a quelli di una carità cristiana indifferente ai confini nazionali. Per tale ragione, l’autore, prendendo spunto dall’osservatorio specifico delle redenzioni mercedarie, giunge a ipotizzare che il commercio dei captivi in età moderna abbia potuto giocare un ruolo di «catalizzatore» di processi ben più ampi e complessi, come il progressivo distacco delle politiche assistenziali degli Stati dalla sfera religiosa, e che abbia potuto accelerare il graduale e controverso imporsi di sentimenti di appartenenza nazionale a scapito di altri, più tradizionali, legati alle comunità confessionali
Sanon, Grégoire. "La politique des programmes télévisuels en Afrique Noire francophone : originalité ou rançon d'une assistance étrangère ? : cas du Burkina Faso et de la côte d'Ivoire." Paris 1, 1997. http://www.theses.fr/1997PA010588.
Full textEmery, Arnaud. "L'otage en sauvetage : étude juridique." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSE3006.
Full textHostage-taking began when man realized that he could manipulate the emotional bond between two individuals in order to force their hand and obtain an advantage. Hostage-taking is a crime extremely old and complex. It has started to fascinate our societies so much since victims have begun to be regularly sacrificed by kidnappers and negotiating authorities alike. Unlike the extraordinary media frenzy they generate, these crises seem to arouse relative indifference among lawyers and doctrine. This subject, which seems to elude the law, touches on its raison d'être: the protection of the weakest, the search for the common good and peace.This research work attempts to lay the groundwork for legal reflection on issues ranging from the use of armed force in rescue operations, to the legality of ransoms, to crisis negotiation and the role of the judge. The hypotheses put forward are systematically compared with the opinions of the operators met in the course of this work. Finally, the author takes a forward-looking look at the legal framework surrounding hostage rescue operations. Through this prism, this thesis questions the limits of the rule of law and the anti-terrorist apparatus of our societies
Moussaileb, Routa. "Log analysis for malicious software detection." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0211.
Full textRansomware remains the number one cyberthreat for individuals, enterprises, and governments. Malware’s aftermath can cause irreversible casualties if the requirements of the attackers are not met in time. This thesis targets Windows ransomware. It affects users’ data and undermines many public services. Four stages of this malware attack are defined: delivery, deployment, destruction, and dealing. The corresponding countermeasures are assigned to each phase of the attack and clustered according to the techniques used. This thesis presents three contributions. The first detection mechanism is located in the file system layer. It is based on the system traversal that is sufficient to highlight the malicious behavior. This thesis proposes also an analysis of the network traffic. It is generated by collected ransomware samples to perform a packet-level detection. A study of the ransom notes is made to define where it takes place in a ransomware workflow. The last contribution provides an insight into plausible attacks, especially Doxware. A quantification model that explores the Windows file system in search of valuable data is presented. It is based on the term frequency-inverse document frequency solution provided in the literature for information retrieval. Honeypot techniques are also used to protect the sensitive files of the users. Finally, this thesis provides future perspectives granting a better roadmap for researchers
Windisch, David. "Random walks, disconnection and random interlacements /." [S.l.] : [s.n.], 2009. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=18343.
Full textBooks on the topic "Rançon"
Conrad, Lauren. La rançon de la gloire. Varennes, Québec, Canada: AdA éditions, 2014.
Find full textLa rançon de la gloire: Les surnoms de nos politiques. Paris: Éditions du Seuil, 2012.
Find full textInna, Touré, ed. La rançon de la désobéissance: Et autres contes du Mali. Paris: Présence africaine, 2011.
Find full textBook chapters on the topic "Rançon"
Tengour, Habib. "La rançon de l’exil." In Nous autres, 189–94. Chihab Éditions, 2016. http://dx.doi.org/10.3917/chihab.khan.2016.01.0189.
Full text"La rançon de Brennus ou la naissance de la pensée impériale canadienne." In L’empire en marche. Des peuples sans qualités, de Vienne à Ottawa, 364–90. Presses de l'Université Laval, 2019. http://dx.doi.org/10.2307/j.ctv1h0p4x4.30.
Full textFonvieille-Vojtovic, Aline. "1948 - 1961. La rançon du succès : une personnalité nationale déstabilisée dans son fief." In Paul Ramadier (1888-1961), 377. Éditions de la Sorbonne, 1993. http://dx.doi.org/10.4000/books.psorbonne.69114.
Full textSamuel, JP, A. Burgart, SH Wootton, D. Magnus, JD Lantos, and JE Tyson. "Randomized n-of-1 Trials: Quality Improvement, Research, or Both?" In Pediatric Collections: Ethics Rounds: A Casebook in Pediatric Bioethics, 163–67. American Academy of Pediatrics, 2019. http://dx.doi.org/10.1542/9781610023672-part05-random.
Full text"Los cinco rangos y su origen en el rango sin rango." In Los cinco rangos del maestro zen Tosan, 27–34. Herder, 2012. http://dx.doi.org/10.2307/j.ctvt9k1m3.5.
Full text"Introduction of Part I." In Random Walk in Random and Non-Random Environments, 9–11. WORLD SCIENTIFIC, 2013. http://dx.doi.org/10.1142/9789814447515_0001.
Full text"Distributions." In Random Walk in Random and Non-Random Environments, 13–21. WORLD SCIENTIFIC, 2013. http://dx.doi.org/10.1142/9789814447515_0002.
Full text"Recurrence and the Zero-One Law." In Random Walk in Random and Non-Random Environments, 23–26. WORLD SCIENTIFIC, 2013. http://dx.doi.org/10.1142/9789814447515_0003.
Full text"From the Strong Law of Large Numbers to the Law of Iterated Logarithm." In Random Walk in Random and Non-Random Environments, 27–33. WORLD SCIENTIFIC, 2013. http://dx.doi.org/10.1142/9789814447515_0004.
Full text"Lévy Classes." In Random Walk in Random and Non-Random Environments, 35–47. WORLD SCIENTIFIC, 2013. http://dx.doi.org/10.1142/9789814447515_0005.
Full textConference papers on the topic "Rançon"
Narimanov, Evgenii. "To Be Determined." In Photonic Metamaterials: From Random to Periodic. Washington, D.C.: OSA, 2007. http://dx.doi.org/10.1364/meta.2007.md1.
Full textScherer, Axel. "To Be Determined." In Photonic Metamaterials: From Random to Periodic. Washington, D.C.: OSA, 2007. http://dx.doi.org/10.1364/meta.2007.tuc2.
Full textMiller, David A. B. "Limit to the performance of optical components." In Photonic Metamaterials: From Random to Periodic. Washington, D.C.: OSA, 2006. http://dx.doi.org/10.1364/meta.2006.tua4.
Full textPendry, JB. "Metamaterials - An Overview." In Photonic Metamaterials: From Random to Periodic. Washington, D.C.: OSA, 2006. http://dx.doi.org/10.1364/meta.2006.ma1.
Full textZhang, Xiang. "Plasmonic MetaMaterials and Optical Super Lens." In Photonic Metamaterials: From Random to Periodic. Washington, D.C.: OSA, 2006. http://dx.doi.org/10.1364/meta.2006.ma2.
Full textRiyopoulos, S. "EM momentum conservation and shear radiation forces exerted on left-handedmaterial interfaces." In Photonic Metamaterials: From Random to Periodic. Washington, D.C.: OSA, 2006. http://dx.doi.org/10.1364/meta.2006.wd23.
Full textLiu, H., and X.-P. Zhao. "Chemical route prepared magnetic structure at infrared frequencies." In Photonic Metamaterials: From Random to Periodic. Washington, D.C.: OSA, 2006. http://dx.doi.org/10.1364/meta.2006.wd24.
Full textPark, W., E. Schonbrun, Q. Wu, Y. Yamashita, C. J. Summers, M. Tinker, Y. Cui, and J. B. Lee. "Negative refraction in Si-based 2-dimensional slab photonic crystal structures." In Photonic Metamaterials: From Random to Periodic. Washington, D.C.: OSA, 2006. http://dx.doi.org/10.1364/meta.2006.ma3.
Full textLinden, S., C. M. Soukoulis, G. Dolling, N. Feth, C. Enkrich, M. W. Klein, and M. Wegener. "“Artificial magnetism” and low-loss negative-index metamaterials at telecommunication frequencies." In Photonic Metamaterials: From Random to Periodic. Washington, D.C.: OSA, 2006. http://dx.doi.org/10.1364/meta.2006.ma4.
Full textShvets, Gennady, Dmitry Korobkin, Yaroslav A. Urzhumov, and Michael A. Shapiro. "Spatial dispersion in metallic meta-materials." In Photonic Metamaterials: From Random to Periodic. Washington, D.C.: OSA, 2006. http://dx.doi.org/10.1364/meta.2006.ma5.
Full textReports on the topic "Rançon"
Reed, John. Random Radar. Fort Belvoir, VA: Defense Technical Information Center, November 2007. http://dx.doi.org/10.21236/ada480122.
Full textPiperaki, K., A. Stasinopoulos, D. Anglos, S. H. Anastasiadis, and E. P. Giannelis. Nanocomposite Random Lasers. Fort Belvoir, VA: Defense Technical Information Center, November 2002. http://dx.doi.org/10.21236/ada408870.
Full textTepikian, S. RANDOM SEXTUPOLE CORRECTION. Office of Scientific and Technical Information (OSTI), August 1988. http://dx.doi.org/10.2172/1150503.
Full textBarker, E. B., and J. M. Kelsey. Recommendation for random number generation using deterministic random bit generators. Gaithersburg, MD: National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.sp.800-90a.
Full textBarker, Elaine B., and John M. Kelsey. Recommendation for Random Number Generation Using Deterministic Random Bit Generators. National Institute of Standards and Technology, June 2015. http://dx.doi.org/10.6028/nist.sp.800-90ar1.
Full textClough, Stuart B., Sukant Tripathy, Xiao-Fang Sun, Bradley J. Orchard, and Gary Wnek. A Comment on Random Versus Non-Random Defect Placement in Polyacetylane. Fort Belvoir, VA: Defense Technical Information Center, October 1988. http://dx.doi.org/10.21236/ada200807.
Full textMudaliar, Saba. Microwave Scattering from a Random Medium Layer with a Random Interface. Fort Belvoir, VA: Defense Technical Information Center, August 1992. http://dx.doi.org/10.21236/ada274009.
Full textBarker, E. B., and J. M. Kelsey. Recommendation for random number generation using deterministic random bit generators (revised). Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-90.
Full textBarker, E. B., and J. M. Kelsey. Recommendation for random number generation using deterministic random bit generators (revised). Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-90r.
Full textGraves, Todd L. Automatic step size selection in randon walk Metropolis algorithms. Office of Scientific and Technical Information (OSTI), March 2011. http://dx.doi.org/10.2172/1057119.
Full text