Results 31 to 40 of about 27,657 (209)

Ball generated property of direct sums of Banach spaces

open access: yes, 2015
A Banach space $X$ is said to have the ball generated property (BGP) if every closed, bounded, convex subset of $X$ can be written as an intersection of finite unions of closed balls. In 2002 S.
Hardtke, Jan-David
core   +1 more source

Pretty Good BGP: Improving BGP by Cautiously Adopting Routes [PDF]

open access: yesProceedings of the 2006 IEEE International Conference on Network Protocols, 2006
The Internet's interdomain routing protocol, BGP, is vulnerable to a number of damaging attacks, which often arise from operator misconfiguration. Proposed solutions with strong guarantees require a public-key infrastructure, accurate routing registries, and changes to BGP.
Josh Karlin   +2 more
openaire   +1 more source

A Program Logic for Verifying Secure Routing Protocols [PDF]

open access: yes, 2014
The Internet, as it stands today, is highly vulnerable to attacks. However, little has been done to understand and verify the formal security guarantees of proposed secure inter-domain routing protocols, such as Secure BGP (S-BGP).
Chen, Chen   +5 more
core   +5 more sources

Simulating convergence properties of BGP [PDF]

open access: yesProceedings. Eleventh International Conference on Computer Communications and Networks, 2003
We present a simple BGP simulator that is used for testing convergence properties of inter-domain routing. The discrete-event driven simulator contains a high-level abstraction model of the BGP protocol. The purpose is to perform simulations to examine the complexity of routing information exchange and to test different possible reasons for delayed ...
Nykvist, Johan, Carr-Motyckova, Lenka
openaire   +2 more sources

The impact of Intellectual Capital on Firms’ Characteristics: an empirical analysis on European listed manufacturing companies

open access: yesInternational Journal of Industrial Engineering and Management, 2019
This work aims at advancing knowledge about the relationship among Intellectual Capital (IC), firms’ performances and market value by investigating 10-year data gathered from a sample of manufacturing companies listed on the Euronext Stock Exchange.
Gianpaolo Iazzolino   +2 more
doaj   +1 more source

Logging-based assessment of low-resistivity oil zones: A case study from Sudan

open access: yesEnergy Geoscience, 2023
The reservoirs in the N oilfield in Sudan feature a complex sedimentary environment, which has led to a widespread development of low-resistivity oil zones, accounting for as high as 37% of the total oil zones.
Li Chunmei   +5 more
doaj   +1 more source

The Internet's unexploited path diversity [PDF]

open access: yes, 2009
The connectivity of the Internet at the Autonomous System level is influenced by the network operator policies implemented. These in turn impose a direction to the announcement of address advertisements and, consequently, to the paths that can be used to
Arjona-Villicaña, Pedro David   +2 more
core   +2 more sources

BGP Security in Partial Deployment: Is the Juice Worth the Squeeze? [PDF]

open access: yes, 2013
As the rollout of secure route origin authentication with the RPKI slowly gains traction among network operators, there is a push to standardize secure path validation for BGP (i.e., S*BGP: S-BGP, soBGP, BGPSEC, etc.).
Goldberg, Sharon   +2 more
core  

Long-Range Correlations and Memory in the Dynamics of Internet Interdomain Routing

open access: yes, 2015
Data transfer is one of the main functions of the Internet. The Internet consists of a large number of interconnected subnetworks or domains, known as Autonomous Systems.
Elmokashfi, Ahmed   +3 more
core   +3 more sources

Adaptive Traffic Fingerprinting for Darknet Threat Intelligence [PDF]

open access: yes, 2018
Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such, there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes.
Al-Khateeb, Haider   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy