Results 91 to 100 of about 27,657 (209)

Inter-domain routing security mechanism for crossing autonomous system alliance

open access: yesTongxin xuebao, 2014
Through studying and analyzing SE-BGP (security enhanced BGP),it was found that it couldn’t validate the cross-alliance AS (autonomous system) and defense the self-launched active attack.To solve the security problems,two-layer cross-alliance ...
Ling-jing KONG   +3 more
doaj   +2 more sources

Interest-based RDF Update Propagation

open access: yes, 2015
Many LOD datasets, such as DBpedia and LinkedGeoData, are voluminous and process large amounts of requests from diverse applications. Many data products and services rely on full or partial local LOD replications to ensure faster querying and processing.
B Schandl   +7 more
core   +1 more source

Bounding the Bias of Tree-Like Sampling in IP Topologies

open access: yes, 2006
It is widely believed that the Internet's AS-graph degree distribution obeys a power-law form. Most of the evidence showing the power-law distribution is based on BGP data.
Cohen, Reuven   +2 more
core   +2 more sources

ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking

open access: yes, 2017
Prefix hijacking is a common phenomenon in the Internet that often causes routing problems and economic losses. In this demo, we propose ARTEMIS, a tool that enables network administrators to detect and mitigate prefix hijacking incidents, against their ...
Chaviaras, Gavriil   +3 more
core   +1 more source

Research on Blockchain-Based Inter-Domain Routing Security Enhancement [PDF]

open access: yesJisuanji kexue yu tansuo
The border gateway protocol (BGP) is currently the de facto interdomain routing standard in the Internet, with its security based on the authenticity and integrity of autonomous systems (AS) identities and paths.
WANG Qun, LI Fujuan, NI Xueli, XIA Lingling, MA Zhuo
doaj   +1 more source

Cosmology in beyond-generalized Proca theories

open access: yes, 2017
The beyond-generalized Proca theories are the extension of second-order massive vector-tensor theories (dubbed generalized Proca theories) with two transverse vector modes and one longitudinal scalar besides two tensor polarizations.
Kase, Ryotaro   +2 more
core   +1 more source

Measures of Self-similarity of BGP Updates and Implications for Securing BGP [PDF]

open access: yes, 2007
Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate the contents of the BGP update message. The additional task of validation of these credentials when processing BGP messages will entail significant additional processing overheads.
openaire   +1 more source

A Survey of Advanced Border Gateway Protocol Attack Detection Techniques

open access: yesSensors
The Internet’s default inter-domain routing system, the Border Gateway Protocol (BGP), remains insecure. Detection techniques are dominated by approaches that involve large numbers of features, parameters, domain-specific tuning, and training, often ...
Ben A. Scott   +2 more
doaj   +1 more source

Seismic strategy for predicting highly profitable wells in the fractured-vuggy carbonate reservoirs

open access: yesPetroleum Exploration and Development, 2013
Aiming at the problems of “high but unstable production” and low success ratio in highly profitable well prediction of the Ordovician fractured-vuggy carbonate reservoirs of the Tarim Basin, based on their features of small size, huge burial depth and ...
Ping YANG   +4 more
doaj   +1 more source

Accelerating the tuning process for optimizing DNN operators by ROFT model

open access: yesScientific Reports
Deep neural networks (DNNs) are computationally intensive and optimized in different ways. Some compiler optimizations for DNNs could achieve performance almost the same as, or even better than, manual optimizations.
ZiChuan He   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy