Results 71 to 80 of about 37,863 (232)

The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire

open access: yes, 2015
The vulnerability of the Internet has been demonstrated by prominent IP prefix hijacking events. Major outages such as the China Telecom incident in 2010 stimulate speculations about malicious intentions behind such anomalies.
Carle, Georg   +4 more
core   +2 more sources

The association between gambling frequency and risk of harm: Analysis using health survey data from England and Scotland

open access: yesAddiction, EarlyView.
Abtract Background and aims Health economic models can be used to assess the effectiveness and cost‐effectiveness of public health policies for gambling. To develop such a model, we must understand how gambling behaviour is associated with risk of experiencing gambling‐related harms.
Esther Moore   +3 more
wiley   +1 more source

Efficient Bayesian hierarchical functional data analysis with basis function approximations using Gaussian-Wishart processes [PDF]

open access: yes, 2016
Functional data are defined as realizations of random functions (mostly smooth functions) varying over a continuum, which are usually collected with measurement errors on discretized grids.
Bonferroni C. E.   +8 more
core   +1 more source

SICO: Surgical Interception Attacks by Manipulating BGP Communities

open access: yesConference on Computer and Communications Security, 2019
The Border Gateway Protocol (BGP) is the primary routing protocol for the Internet backbone, yet it lacks adequate security mechanisms. While simple BGP hijack attacks only involve an adversary hijacking Internet traffic destined to a victim, more ...
Henry Birge-Lee   +3 more
semanticscholar   +1 more source

The Legacy of Policy Inaction in Climate‐Growth Models

open access: yesInternational Economic Review, EarlyView.
ABSTRACT To better understand the structure and core mechanisms of a broad class of climate‐growth models, we study a simplified version of the dynamic integrated model of climate and the economy (DICE) through the lens of growth theory. We analytically show that this model features a continuum of saddle‐point stable steady states.
Thomas Steger, Timo Trimborn
wiley   +1 more source

The BGP visibility scanner

open access: yes2013 Proceedings IEEE INFOCOM, 2013
By tweaking the BGP configurations, the network operators are able to express their interdomain routing preferences, designed to accommodate a myriad goals. Given the complex interactions between policies in the Internet, the origin AS by itself cannot ensure that only by configuring a routing policy it can also achieve the anticipated results ...
Lutu, Andra   +2 more
openaire   +3 more sources

Internet routing paths stability model and relation to forwarding paths [PDF]

open access: yes, 2013
Analysis of real datasets to characterize the local stability properties of the Internet routing paths suggests that extending the route selection criteria to account for such property would not increase the routing path length.
Careglio, Davide   +3 more
core   +2 more sources

ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking

open access: yes, 2017
Prefix hijacking is a common phenomenon in the Internet that often causes routing problems and economic losses. In this demo, we propose ARTEMIS, a tool that enables network administrators to detect and mitigate prefix hijacking incidents, against their ...
Chaviaras, Gavriil   +3 more
core   +1 more source

On the undesirable repercussions of gender norms in an endogenous growth model

open access: yesThe Scandinavian Journal of Economics, EarlyView.
Abstract Sustainable growth has emerged as a critical policy challenge worldwide. We investigate the influence of conventional gender norms on fertility and economic growth to explain the phenomena recently observed across high‐income countries. To this end, we construct an overlapping generations model with endogenous fertility and labor supply ...
Ryo Sakamoto, Katsunori Minami
wiley   +1 more source

Benford's distribution in extrasolar world: Do the exoplanets follow Benford's distribution?

open access: yes, 2016
In many real life situations, it is observed that the first digits (i.e., $1,2,\ldots,9$) of a numerical data-set, which is expressed using decimal system, do not follow a random distribution. Instead, smaller numbers are favoured by nature in accordance
Pandey, Ankit Kumar   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy