Results 91 to 100 of about 27,657 (209)
Inter-domain routing security mechanism for crossing autonomous system alliance
Through studying and analyzing SE-BGP (security enhanced BGP),it was found that it couldn’t validate the cross-alliance AS (autonomous system) and defense the self-launched active attack.To solve the security problems,two-layer cross-alliance ...
Ling-jing KONG +3 more
doaj +2 more sources
Interest-based RDF Update Propagation
Many LOD datasets, such as DBpedia and LinkedGeoData, are voluminous and process large amounts of requests from diverse applications. Many data products and services rely on full or partial local LOD replications to ensure faster querying and processing.
B Schandl +7 more
core +1 more source
Bounding the Bias of Tree-Like Sampling in IP Topologies
It is widely believed that the Internet's AS-graph degree distribution obeys a power-law form. Most of the evidence showing the power-law distribution is based on BGP data.
Cohen, Reuven +2 more
core +2 more sources
ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking
Prefix hijacking is a common phenomenon in the Internet that often causes routing problems and economic losses. In this demo, we propose ARTEMIS, a tool that enables network administrators to detect and mitigate prefix hijacking incidents, against their ...
Chaviaras, Gavriil +3 more
core +1 more source
Research on Blockchain-Based Inter-Domain Routing Security Enhancement [PDF]
The border gateway protocol (BGP) is currently the de facto interdomain routing standard in the Internet, with its security based on the authenticity and integrity of autonomous systems (AS) identities and paths.
WANG Qun, LI Fujuan, NI Xueli, XIA Lingling, MA Zhuo
doaj +1 more source
Cosmology in beyond-generalized Proca theories
The beyond-generalized Proca theories are the extension of second-order massive vector-tensor theories (dubbed generalized Proca theories) with two transverse vector modes and one longitudinal scalar besides two tensor polarizations.
Kase, Ryotaro +2 more
core +1 more source
Measures of Self-similarity of BGP Updates and Implications for Securing BGP [PDF]
Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate the contents of the BGP update message. The additional task of validation of these credentials when processing BGP messages will entail significant additional processing overheads.
openaire +1 more source
A Survey of Advanced Border Gateway Protocol Attack Detection Techniques
The Internet’s default inter-domain routing system, the Border Gateway Protocol (BGP), remains insecure. Detection techniques are dominated by approaches that involve large numbers of features, parameters, domain-specific tuning, and training, often ...
Ben A. Scott +2 more
doaj +1 more source
Seismic strategy for predicting highly profitable wells in the fractured-vuggy carbonate reservoirs
Aiming at the problems of “high but unstable production” and low success ratio in highly profitable well prediction of the Ordovician fractured-vuggy carbonate reservoirs of the Tarim Basin, based on their features of small size, huge burial depth and ...
Ping YANG +4 more
doaj +1 more source
Accelerating the tuning process for optimizing DNN operators by ROFT model
Deep neural networks (DNNs) are computationally intensive and optimized in different ways. Some compiler optimizations for DNNs could achieve performance almost the same as, or even better than, manual optimizations.
ZiChuan He +5 more
doaj +1 more source

