Results 21 to 30 of about 27,657 (209)
By tweaking the BGP configurations, the network operators are able to express their interdomain routing preferences, designed to accommodate a myriad goals. Given the complex interactions between policies in the Internet, the origin AS by itself cannot ensure that only by configuring a routing policy it can also achieve the anticipated results ...
Andra Lutu +2 more
openaire +3 more sources
Carbonate rocks frequently exhibit less predictable seismic attribute–porosity relationships because of complex and heterogeneous pore geometry. Pore geometry plays an important role in carbonate reservoir interpretation, as it influences acoustic and ...
Liu Kaiyuan +5 more
doaj +1 more source
In order to reveal the differential deformation characteristics of the Wangfu Fault Depression in Songliao Basin and study the regularity of the deformation mechanism of boundary normal faults, this paper, based on the structural analysis and fault ...
Xichen ZHANG +7 more
doaj +1 more source
With the rapid expansion of the scale of Internet,BGP plays a more and more important role in the Inter domain routing system.BGP has a lot of security risks,which result in prefix hijacking,AS_PATH hijacking and route leak attacks occuring frequently ...
Jia JIA,Jian JIN +1 more
doaj +1 more source
Balanced growth path solutions of a Boltzmann mean field game model for knowledge growth [PDF]
In this paper we study balanced growth path solutions of a Boltzmann mean field game model proposed by Lucas et al [13] to model knowledge growth in an economy. Agents can either increase their knowledge level by exchanging ideas in learning events or by
Burger, Martin +2 more
core +6 more sources
Region-based BGP announcement filtering for improved BGP security [PDF]
BGP prefix hijacking is a serious security threat on the Internet. In this paper we propose a region-based BGP announcement filtering scheme (RBF) to improve the BGP security. In contrast to existing solutions that indifferently prevent or detect prefix hijacking attacks, RBF enables differentiated AS and prefix filtering treatment and blends prefix ...
Fernando Sanchez, Zhenhai Duan
openaire +1 more source
Design, implementation and formal verification of BGP proxy for mimic router
To ensure the safety and correctness of the critical ‘mimic bracket’ components such as protocol proxies of mimic routers, a BGP (border gateway protocol) proxy was designed and implemented, and formal methods were applied to verify the safety and ...
Jin ZHANG +5 more
doaj +2 more sources
MaxLength considered harmful to the RPKI [PDF]
User convenience and strong security are often at odds, and most security applications need to find some sort of balance between these two (often opposing) goals.
Gilad, Yossi +2 more
core +2 more sources
Long-Range Chromosomal Mapping of the Carcinoembryonic Antigen (CEA) Gene Family Cluster [PDF]
A long-range physical map of the carcinoembryonic antigen (CEA) gene family cluster, which is located on the long arm of chromosome 19, has been constructed.
Arakawa +69 more
core +1 more source
BGP-Inspect - Extracting Information from Raw BGP Data [PDF]
While BGP routing datasets, consisting of raw routing data, are freely available and easy to obtain, extracting any useful information is tedious. Currently, researcher and network operators implement their own custom data processing tools and scripts.
Dionysus Blazakis +2 more
openaire +1 more source

