Results 81 to 90 of about 40,203 (280)

The BGP visibility scanner

open access: yes2013 Proceedings IEEE INFOCOM, 2013
By tweaking the BGP configurations, the network operators are able to express their interdomain routing preferences, designed to accommodate a myriad goals. Given the complex interactions between policies in the Internet, the origin AS by itself cannot ensure that only by configuring a routing policy it can also achieve the anticipated results ...
Lutu, Andra   +2 more
openaire   +3 more sources

SICO: Surgical Interception Attacks by Manipulating BGP Communities

open access: yesConference on Computer and Communications Security, 2019
The Border Gateway Protocol (BGP) is the primary routing protocol for the Internet backbone, yet it lacks adequate security mechanisms. While simple BGP hijack attacks only involve an adversary hijacking Internet traffic destined to a victim, more ...
Henry Birge-Lee   +3 more
semanticscholar   +1 more source

On the undesirable repercussions of gender norms in an endogenous growth model

open access: yesThe Scandinavian Journal of Economics, EarlyView.
Abstract Sustainable growth has emerged as a critical policy challenge worldwide. We investigate the influence of conventional gender norms on fertility and economic growth to explain the phenomena recently observed across high‐income countries. To this end, we construct an overlapping generations model with endogenous fertility and labor supply ...
Ryo Sakamoto, Katsunori Minami
wiley   +1 more source

The use of maxLength in the RPKI [PDF]

open access: yes, 2018
This document recommends that operators avoid using the maxLength attribute when issuing Route Origin Authorizations (ROAs) in the Resource Public Key Infrastructure (RPKI). These recommendations complement those in [RFC7115].https://datatracker.ietf.org/
Gilad, Yossi   +4 more
core  

Genomic Organization, Splice Variants and Expression of CGMl, a CD66-related Member of the Carcinoembryonic Antigen Gene Family [PDF]

open access: yes, 1993
The tumor marker carcinoembryonic antigen (CEA) belongs to a family of proteins which are composed of one immunogiobulin variable domain and a varying number of immunoglobulin constant-like domains.
Afar D. E. H.   +37 more
core   +2 more sources

Counterfactual Explanations in Education: A Systematic Review

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 1, March 2026.
Main challenges on counterfactual explanations in education. ABSTRACT Counterfactuals are a type of explanations based on hypothetical scenarios used in Explainable Artificial Intelligence (XAI), showing what changes in input variables could have led to different outcomes in predictive problems.
Pamela Buñay‐Guisñan   +2 more
wiley   +1 more source

Study of BGP secure scheme based on divide and conquer strategy

open access: yesTongxin xuebao, 2012
A new approach was studied for BGP security:SE-BGP.By analyzing the security of SE-BGP,was found it had some secure leaks which couldnt resist active attack.To solve these secure problems of SE-BGP,an AS-alliance-based secure BGP scheme :SA-BGP was ...
Bin WANG   +3 more
doaj   +2 more sources

Mechanopharmacology of cellular microenvironment stiffness: Therapeutic strategies for age‐related diseases

open access: yesBritish Journal of Pharmacology, Volume 183, Issue 4, Page 945-956, February 2026.
Ageing brings about various biochemical, structural and mechanical alterations within tissues, profoundly impacting cellular behaviour and function. One of the hallmark changes observed with ageing is an increase in cellular microenvironment stiffness, a biomechanical property influenced by intrinsic factors within the cell and extrinsic factors from ...
Wang HaiYang   +3 more
wiley   +1 more source

The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire

open access: yes, 2015
The vulnerability of the Internet has been demonstrated by prominent IP prefix hijacking events. Major outages such as the China Telecom incident in 2010 stimulate speculations about malicious intentions behind such anomalies.
Carle, Georg   +4 more
core   +2 more sources

Comparing Machine Learning Algorithms for BGP Anomaly Detection using Graph Features

open access: yesBig-DAMA@CoNEXT, 2019
The Border Gateway Protocol (BGP) coordinates the connectivity and reachability among Autonomous Systems, providing efficient operation of the global Internet.
Odnan Ref Sanchez   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy