Results 71 to 80 of about 37,863 (232)
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire
The vulnerability of the Internet has been demonstrated by prominent IP prefix hijacking events. Major outages such as the China Telecom incident in 2010 stimulate speculations about malicious intentions behind such anomalies.
Carle, Georg +4 more
core +2 more sources
Abtract Background and aims Health economic models can be used to assess the effectiveness and cost‐effectiveness of public health policies for gambling. To develop such a model, we must understand how gambling behaviour is associated with risk of experiencing gambling‐related harms.
Esther Moore +3 more
wiley +1 more source
Efficient Bayesian hierarchical functional data analysis with basis function approximations using Gaussian-Wishart processes [PDF]
Functional data are defined as realizations of random functions (mostly smooth functions) varying over a continuum, which are usually collected with measurement errors on discretized grids.
Bonferroni C. E. +8 more
core +1 more source
SICO: Surgical Interception Attacks by Manipulating BGP Communities
The Border Gateway Protocol (BGP) is the primary routing protocol for the Internet backbone, yet it lacks adequate security mechanisms. While simple BGP hijack attacks only involve an adversary hijacking Internet traffic destined to a victim, more ...
Henry Birge-Lee +3 more
semanticscholar +1 more source
The Legacy of Policy Inaction in Climate‐Growth Models
ABSTRACT To better understand the structure and core mechanisms of a broad class of climate‐growth models, we study a simplified version of the dynamic integrated model of climate and the economy (DICE) through the lens of growth theory. We analytically show that this model features a continuum of saddle‐point stable steady states.
Thomas Steger, Timo Trimborn
wiley +1 more source
By tweaking the BGP configurations, the network operators are able to express their interdomain routing preferences, designed to accommodate a myriad goals. Given the complex interactions between policies in the Internet, the origin AS by itself cannot ensure that only by configuring a routing policy it can also achieve the anticipated results ...
Lutu, Andra +2 more
openaire +3 more sources
Internet routing paths stability model and relation to forwarding paths [PDF]
Analysis of real datasets to characterize the local stability properties of the Internet routing paths suggests that extending the route selection criteria to account for such property would not increase the routing path length.
Careglio, Davide +3 more
core +2 more sources
ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking
Prefix hijacking is a common phenomenon in the Internet that often causes routing problems and economic losses. In this demo, we propose ARTEMIS, a tool that enables network administrators to detect and mitigate prefix hijacking incidents, against their ...
Chaviaras, Gavriil +3 more
core +1 more source
On the undesirable repercussions of gender norms in an endogenous growth model
Abstract Sustainable growth has emerged as a critical policy challenge worldwide. We investigate the influence of conventional gender norms on fertility and economic growth to explain the phenomena recently observed across high‐income countries. To this end, we construct an overlapping generations model with endogenous fertility and labor supply ...
Ryo Sakamoto, Katsunori Minami
wiley +1 more source
Benford's distribution in extrasolar world: Do the exoplanets follow Benford's distribution?
In many real life situations, it is observed that the first digits (i.e., $1,2,\ldots,9$) of a numerical data-set, which is expressed using decimal system, do not follow a random distribution. Instead, smaller numbers are favoured by nature in accordance
Pandey, Ankit Kumar +2 more
core +1 more source

