Results 41 to 50 of about 40,203 (280)

Differential deformation characteristics and genetic mechanism of boundary normal faults in Wangfu Fault Depression, Songliao Basin

open access: yesShiyou shiyan dizhi, 2023
In order to reveal the differential deformation characteristics of the Wangfu Fault Depression in Songliao Basin and study the regularity of the deformation mechanism of boundary normal faults, this paper, based on the structural analysis and fault ...
Xichen ZHANG   +7 more
doaj   +1 more source

BGP-Inspect - Extracting Information from Raw BGP Data [PDF]

open access: yes2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, 2006
While BGP routing datasets, consisting of raw routing data, are freely available and easy to obtain, extracting any useful information is tedious. Currently, researcher and network operators implement their own custom data processing tools and scripts.
D. Blazakis, M. Karir, J.S. Baras
openaire   +1 more source

Computational complexity of traffic hijacking under BGP and S-BGP [PDF]

open access: yesTheoretical Computer Science, 2012
17 pages with 6 ...
CHIESA, MARCO   +3 more
openaire   +5 more sources

Using Bursty Announcements for Detecting BGP Routing Anomalies

open access: yes, 2020
Despite the robust structure of the Internet, it is still susceptible to disruptive routing updates that prevent network traffic from reaching its destination.
Camp, L. Jean   +2 more
core   +2 more sources

End-Site Routing Support for IPv6 Multihoming [PDF]

open access: yes, 2006
Multihoming is currently widely used to provide fault tolerance and traffic engineering capabilities. It is expected that, as telecommunication costs decrease, its adoption will become more and more prevalent.
Azcorra Saloña, Arturo   +3 more
core   +2 more sources

Design, implementation and formal verification of BGP proxy for mimic router

open access: yesTongxin xuebao, 2023
To ensure the safety and correctness of the critical ‘mimic bracket’ components such as protocol proxies of mimic routers, a BGP (border gateway protocol) proxy was designed and implemented, and formal methods were applied to verify the safety and ...
Jin ZHANG   +5 more
doaj   +2 more sources

A Polymerase-chain-reaction Assay for the Specific Identification of Transcripts Encoded by Individual Carcinoembryonic Antigen (CEA)-gene-family Members [PDF]

open access: yes, 1993
Carcinoembryonic antigen (CEA) is a tumor marker that belongs to a family of closely related molecules with variable expression patterns. We have developed sets of oligonucleotide primers for the specific amplification of transcripts from individual CEA ...
Ang   +34 more
core   +1 more source

BGP-like TE Capabilities for SHIM6 [PDF]

open access: yes, 2006
In this paper we present a comprehensive set of mechanisms that restore to the site administrator the capacity of enforcing traffic engineering (TE) policies in a multiaddressed IPv6 scenario.
Azcorra, Arturo   +2 more
core   +4 more sources

Design and implementation of BGP novel control mechanism (BGP-NCM) based on network performance parameters

open access: yesAin Shams Engineering Journal, 2018
Border Gateway Protocol (BGP) is the defecto standard routing protocol of the internet and has served as backbone technology for logical routing tasks to provide global connectivity in the world.
M.T. Moubarak   +2 more
doaj   +1 more source

Region-based BGP announcement filtering for improved BGP security [PDF]

open access: yesProceedings of the 5th ACM Symposium on Information, Computer and Communications Security, 2010
BGP prefix hijacking is a serious security threat on the Internet. In this paper we propose a region-based BGP announcement filtering scheme (RBF) to improve the BGP security. In contrast to existing solutions that indifferently prevent or detect prefix hijacking attacks, RBF enables differentiated AS and prefix filtering treatment and blends prefix ...
Fernando Sanchez, Zhenhai Duan
openaire   +1 more source

Home - About - Disclaimer - Privacy