Results 21 to 30 of about 37,863 (232)

Mitochondria-targeted therapeutics, MitoQ and BGP-15, reverse aging-associated meiotic spindle defects in mouse and human oocytes

open access: yesHuman Reproduction, 2020
STUDY QUESTION Do mitochondria-targeted therapies reverse ageing- and oxidative stress-induced spindle defects in oocytes from mice and humans? SUMMARY ANSWER Exposure to MitoQ or BGP-15 during IVM protected against spindle and chromosomal defects in ...
Usama Al-Zubaidi   +8 more
semanticscholar   +1 more source

ARTEMIS: Neutralizing BGP Hijacking Within a Minute [PDF]

open access: yesIEEE/ACM Transactions on Networking, 2018
Border gateway protocol (BGP) prefix hijacking is a critical threat to Internet organizations and users. Despite the availability of several defense approaches (ranging from RPKI to popular third-party services), none of them solves the problem ...
Pavlos Sermpezis   +6 more
semanticscholar   +1 more source

The parallel lives of autonomous systems: ASN allocations vs. BGP

open access: yesACM/SIGCOMM Internet Measurement Conference, 2021
Autonomous Systems (ASes) exist in two dimensions on the Internet: the administrative and the operational one. Regional Internet Registries (RIRs) rule the former, while BGP the latter.
E. N. Nemmi   +5 more
semanticscholar   +1 more source

Distribution pattern and origin of the columnar pull-down anomalies in Gaoshiti Block of Central Sichuan Basin, SW China

open access: yesPetroleum Exploration and Development, 2017
The targets of this study are located in the Gaoshiti block, Central Sichuan Basin. Reprocessing the seismic data with reverse time migration (RTM) and using high-precision coherence analysis, this paper analyzed the distribution pattern and origin of ...
Ping YANG   +5 more
doaj   +1 more source

BML: An Efficient and Versatile Tool for BGP Dataset Collection

open access: yes2021 IEEE International Conference on Communications Workshops (ICC Workshops), 2021
The Border Gateway Protocol (BGP) is in charge of the route exchange at the Internet scale. Anomalies in BGP’s behaviour can have several causes (e.g.
Kevin Hoarau   +2 more
semanticscholar   +1 more source

Исследование структурных свойств сети Интернет на основе метаграфовых моделей

open access: yesИнформатика и автоматизация, 2020
При исследовании сети Интернет ее структуру разделяют на уровни: уровень автономных систем, уровень точек присутствия операторов связи, уровень оборудования и так далее.
Maxim Vladimirovich Ivanov   +2 more
doaj   +1 more source

Drug Candidate BGP-15 Prevents Isoproterenol-Induced Arrhythmias and Alters Heart Rate Variability (HRV) in Telemetry-Implanted Rats

open access: yesPharmaceuticals, 2023
Multi-target drug candidate BGP-15 has shown cardioprotective and antiarrhythmic actions in diseased models. Here, we investigated the effects of BGP-15 on ECG and echocardiographic parameters, heart rate variability (HRV), and arrhythmia incidence in ...
Brigitta Bernat   +15 more
doaj   +1 more source

Suitability of Graph Representation for BGP Anomaly Detection

open access: yesIEEE Conference on Local Computer Networks, 2021
The Border Gateway Protocol (BGP) is in charge of the route exchange at the Internet scale. Anomalies in BGP can have several causes (mis-configuration, outage and attacks). These anomalies are classified into large or small scale anomalies.
Kevin Hoarau   +2 more
semanticscholar   +1 more source

Combined Intra- and Inter-domain Traffic Engineering using Hot-Potato Aware Link Weights Optimization [PDF]

open access: yes, 2008
A well-known approach to intradomain traffic engineering consists in finding the set of link weights that minimizes a network-wide objective function for a given intradomain traffic matrix.
Balon, Simon, Leduc, Guy
core   +1 more source

ROV++: Improved Deployable Defense against BGP Hijacking

open access: yesNetwork and Distributed System Security Symposium, 2021
—We study and extend Route Origin Validation (ROV), the basis for the IETF defenses of interdomain routing. We focus on two important hijack attacks: subprefix hijacks and non-routed prefix hijacks . For both attacks, we show that, with partial deployment,
Reynaldo Morillo   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy