Results 51 to 60 of about 40,714 (194)
ABSTRACT Intelligent and adaptive defence systems that can quickly thwart changing cyberthreats are becoming more and more necessary in the dynamic and data‐intensive Internet of things (IoT) environment. Using the NSL‐KDD benchmark dataset, this paper presents an improved anomaly detection system that combines an optimised sequential neural network ...
Seong‐O Shim +4 more
wiley +1 more source
Defense mechanism of SDN application layer against DDoS attack based on API call management
Due to thelack of strict access control, identity authentication and abnormal call detection, attackers may develop malicious applications easily and then it leads to theabuse of the northbound interface API (application programming interface ...
Yang WANG, Guangming TANG +1 more
doaj +1 more source
The use of maxLength in the RPKI [PDF]
This document recommends that operators avoid using the maxLength attribute when issuing Route Origin Authorizations (ROAs) in the Resource Public Key Infrastructure (RPKI). These recommendations complement those in [RFC7115].https://datatracker.ietf.org/
Gilad, Yossi +4 more
core
We study the charge and spin transport in two and four terminal graphene nanoribbons (GNR) decorated with random distribution of magnetic adatoms. The inclusion of the magnetic adatoms generates only the $z$-component of the spin polarized conductance ...
Basu, Saurabh, Ganguly, Sudin
core +1 more source
Abstract In Welsh, in certain tenses, unique forms of the verb for ‘be’ are used in positive clauses. These specialised forms of ‘be’ are incompatible with positive main‐clause declarative complementizers, despite their apparent featural compatibility. For most speakers, they are also blocked from if‐clauses; although, I report on data regarding their ...
Frances Dowle
wiley +1 more source
Reaction to New Security Threat Class [PDF]
Each new identified security threat class triggers new research and development efforts by the scientific and professional communities. In this study, we investigate the rate at which the scientific and professional communities react to new identified ...
Elovici, Yuval, Rokach, Lior
core
Auxin signaling regulates the formation of vegetative propagation corms in Gastrodia elata by regulating sugar‐acid interconversion, which in turn regulates polysaccharide and starch biosynthesis as well as biosynthesis of the bioactive metabolite gastrodin.
Qun Liu +9 more
wiley +1 more source
The Evolving Landscape of Internet Control [PDF]
Over the past two years, we have undertaken several studies at the Berkman Center designed to better understand the control of the Internet in less open societies.
Ethan Zuckerman +4 more
core
In soybean, the trihelix transcription factor GmGT‐2F positively regulates the expression of the α‐galactosidase gene GmAGAL, thereby modulating seed oil content. The cyclophilin GmCYP2 interacts with GmGT‐2F and suppresses GmAGAL activation. Haplotype diversity analysis of GmGT‐2F, GmCYP2, and GmAGAL identified favorable haplotype combinations ...
Shuangzhe Li +6 more
wiley +1 more source
Research on low-rate DDoS attack of SDN network in cloud environment
Aiming at the problems of low-rate DDoS attack detection accuracy in cloud SDN network and the lack of unified framework for data plane and control plane low-rate DDoS attack detection and defense,a unified framework for low-rate DDoS attack detection ...
Xingshu CHEN +4 more
doaj +2 more sources

