Results 181 to 190 of about 37,863 (232)
Coccolithophore blooms boost particle fluxes in the Nordic Seas
Rasse R, Neukermans G.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Using BGP Features Towards Identifying Type of BGP Anomaly
2021 International Congress of Advanced Technology and Engineering (ICOTEN), 2021Unregular events such as large-scale power outages and routing table leaks (RTL) can negatively affect the global routing stability and interrupt Internet services. The Border Gateway Protocol (BGP) is the de-facto Internet routing protocol responsible for managing connectivity between Autonomous Systems (ASes).
Noor Hadi Hammood, Bahaa Al-Musawi
openaire +2 more sources
2019 Network Traffic Measurement and Analysis Conference (TMA), 2019
Recent reports show that BGP hijacking has increased substantially. BGP hijacking allows malicious ASes to obtain IP prefixes for spamming as well as intercepting or blackholing traffic. While systems to prevent hijacks are hard to deploy and require the cooperation of many other organizations, techniques to detect hijacks have been a popular area of ...
Cho, Shinyoung +4 more
openaire +3 more sources
Recent reports show that BGP hijacking has increased substantially. BGP hijacking allows malicious ASes to obtain IP prefixes for spamming as well as intercepting or blackholing traffic. While systems to prevent hijacks are hard to deploy and require the cooperation of many other organizations, techniques to detect hijacks have been a popular area of ...
Cho, Shinyoung +4 more
openaire +3 more sources
Chemico-Biological Interactions, 2023
Tattooing is a very common fashion trend across all the ages and gender of the society worldwide. Although skin inflammatory diseases are very frequent among tattoo users because of the active chemical ingredients used in tattoo ink, yet no ingredient ...
Sandeep Negi +13 more
semanticscholar +1 more source
Tattooing is a very common fashion trend across all the ages and gender of the society worldwide. Although skin inflammatory diseases are very frequent among tattoo users because of the active chemical ingredients used in tattoo ink, yet no ingredient ...
Sandeep Negi +13 more
semanticscholar +1 more source
AP2Vec: An Unsupervised Approach for BGP Hijacking Detection
IEEE Transactions on Network and Service Management, 2022BGP hijack attacks deflect traffic between endpoints through the attacker network, leading to man-in-the-middle attacks. Thus its detection is an important security challenge.
T. Shapira, Y. Shavitt
semanticscholar +1 more source
ISP Self-Operated BGP Anomaly Detection Based on Weakly Supervised Learning
IEEE International Conference on Network Protocols, 2021The Border Gateway Protocol (BGP) is arguably the most important and irreplaceable protocol in the network. However, the lack of routing authentication and validation makes it vulnerable to attacks, including routing leaks, route hijacking, prefix ...
Yutao Dong +4 more
semanticscholar +1 more source
BGP Optimal Route Reflection (BGP ORR)
2021This document proposes a solution for BGP route reflectors to allow them to choose the best path for their clients that the clients themselves would have chosen under the same conditions, without requiring further state or any new features to be placed on the clients. This facilitates, for example, best exit point policy (hot potato routing).
C. Cassar, E. Åman, K. Wang
openaire +1 more source
A Certificate Pin BGP Protocol: CP-BGP
2020 5th International Conference on Computer and Communication Systems (ICCCS), 2020Border Gateway Protocol (BGP) is always the target of the attacks since it is the only routing protocol connecting different Autonomous Systems (ASes) in Internet. BGP fraud is one of the common attacks targeting BGP routing on Internet. YouTube hijacking in 2008 and recent Google traffic hijacking in 2018 are because of routing hijacking.
Yanwei Wu, Ru Wang, Xiaohua Xu
openaire +1 more source
Multiple route selector BGP (MRS-BGP)
Proceedings of the International Conference and Workshop on Emerging Trends in Technology, 2010To maximize the utilization of network resources it is necessary to have good approach for Routing Policy. The protocol currently used for Interdomain Routing is Border Gateway Protocol (BGP). BGP permits each router to use single best route for each destination prefix even though multiple routes to the same destination exists.
L. L. Ragha, K. V. Ghag
openaire +1 more source

