Results 81 to 90 of about 40,203 (280)
By tweaking the BGP configurations, the network operators are able to express their interdomain routing preferences, designed to accommodate a myriad goals. Given the complex interactions between policies in the Internet, the origin AS by itself cannot ensure that only by configuring a routing policy it can also achieve the anticipated results ...
Lutu, Andra +2 more
openaire +3 more sources
SICO: Surgical Interception Attacks by Manipulating BGP Communities
The Border Gateway Protocol (BGP) is the primary routing protocol for the Internet backbone, yet it lacks adequate security mechanisms. While simple BGP hijack attacks only involve an adversary hijacking Internet traffic destined to a victim, more ...
Henry Birge-Lee +3 more
semanticscholar +1 more source
On the undesirable repercussions of gender norms in an endogenous growth model
Abstract Sustainable growth has emerged as a critical policy challenge worldwide. We investigate the influence of conventional gender norms on fertility and economic growth to explain the phenomena recently observed across high‐income countries. To this end, we construct an overlapping generations model with endogenous fertility and labor supply ...
Ryo Sakamoto, Katsunori Minami
wiley +1 more source
The use of maxLength in the RPKI [PDF]
This document recommends that operators avoid using the maxLength attribute when issuing Route Origin Authorizations (ROAs) in the Resource Public Key Infrastructure (RPKI). These recommendations complement those in [RFC7115].https://datatracker.ietf.org/
Gilad, Yossi +4 more
core
Genomic Organization, Splice Variants and Expression of CGMl, a CD66-related Member of the Carcinoembryonic Antigen Gene Family [PDF]
The tumor marker carcinoembryonic antigen (CEA) belongs to a family of proteins which are composed of one immunogiobulin variable domain and a varying number of immunoglobulin constant-like domains.
Afar D. E. H. +37 more
core +2 more sources
Counterfactual Explanations in Education: A Systematic Review
Main challenges on counterfactual explanations in education. ABSTRACT Counterfactuals are a type of explanations based on hypothetical scenarios used in Explainable Artificial Intelligence (XAI), showing what changes in input variables could have led to different outcomes in predictive problems.
Pamela Buñay‐Guisñan +2 more
wiley +1 more source
Study of BGP secure scheme based on divide and conquer strategy
A new approach was studied for BGP security:SE-BGP.By analyzing the security of SE-BGP,was found it had some secure leaks which couldnt resist active attack.To solve these secure problems of SE-BGP,an AS-alliance-based secure BGP scheme :SA-BGP was ...
Bin WANG +3 more
doaj +2 more sources
Ageing brings about various biochemical, structural and mechanical alterations within tissues, profoundly impacting cellular behaviour and function. One of the hallmark changes observed with ageing is an increase in cellular microenvironment stiffness, a biomechanical property influenced by intrinsic factors within the cell and extrinsic factors from ...
Wang HaiYang +3 more
wiley +1 more source
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire
The vulnerability of the Internet has been demonstrated by prominent IP prefix hijacking events. Major outages such as the China Telecom incident in 2010 stimulate speculations about malicious intentions behind such anomalies.
Carle, Georg +4 more
core +2 more sources
Comparing Machine Learning Algorithms for BGP Anomaly Detection using Graph Features
The Border Gateway Protocol (BGP) coordinates the connectivity and reachability among Autonomous Systems, providing efficient operation of the global Internet.
Odnan Ref Sanchez +3 more
semanticscholar +1 more source

