Results 71 to 80 of about 40,714 (194)

IoT Botnets Analysis [PDF]

open access: yes, 2017
A botnet is a set of connected devices which have been infected with malware that allows an attacker to gain remote control and coordinate their actions. Attackers most commonly use their botnets to launch DDoS (Distributed Denial of Service) attacks
Dushenok, M. S.   +2 more
core  

Psyllid Cysteine Cathepsins Directly Cleave the Outer Membrane Protein BamD of Citrus Huanglongbing Pathogen

open access: yesPlant Biotechnology Journal, EarlyView.
ABSTRACT Candidatus Liberibacter asiaticus (CLas), the causative agent of citrus Huanglongbing (HLB), is transmitted by Asian citrus psyllid, Diaphorina citri; however, the role of the insect's immune effectors in defending against CLas remains poorly understood. This study reveals that D.
Yu Du   +9 more
wiley   +1 more source

DDoS напади и DDoS напади врз DNS

open access: yes, 2012
Одликата на денешното модерно општество и иско ристеноста на информатиката во општествениот поре док и информациските системи во општествените сфе ри за дистрибуиран транспорт на податоци и добива ње на дистрибуирани информации дава можност за уживање на благодетите на новата комуникациска ера.
Nikoloski, Aleksandar, Bogdanoski, Mitko
openaire   +1 more source

MdRLKT1–MdRAX2–MdMKS1 Module Positively Regulating Resistance to Cytospora mali in Apple

open access: yesPlant Biotechnology Journal, EarlyView.
ABSTRACT Valsa canker (caused by Cytospora mali = Valsa mali. C. mali) is one of the most destructive diseases affecting apple cultivation. The scarcity of natural germplasm resources with high resistance and immunity underscores the importance of exploring plant immune regulation factors of disease‐resistant breeding.
Yanan Tang   +5 more
wiley   +1 more source

Detecting Different Types of Distributed Denial of Service Attacks

open access: yesGazi Üniversitesi Fen Bilimleri Dergisi, 2021
Distributed Denial of Service Attacks (DDoS) threaten every device connected to the Internet. The fast progress and wide spreading DDoS attacks are among the most well-known features of them. Many studies have been conducted to reduce the impact of these
Esra SÖĞÜT   +2 more
doaj   +1 more source

LsMAPK6 Phosphorylates the LsCO Protein to Enhance Its Stability and Transcriptional Activity, Promoting Floral Transition Upon High Temperatures in Lettuce

open access: yesPlant Biotechnology Journal, EarlyView.
ABSTRACT High temperatures significantly accelerate the timing of floral transition, namely, bolting and flowering, in lettuce, which results in severe loss of marketable yield. Thus, understanding the genetic regulation of floral transition is of great interest to plant biologists and lettuce breeders.
Tingzhen Wang   +10 more
wiley   +1 more source

CitPH4 Confers Resistance to Citrus Canker by Activating Papain‐Like Cysteine Protease

open access: yesPlant Biotechnology Journal, EarlyView.
ABSTRACT Citrus canker, a devastating disease caused by Xanthomonas citri subsp. citri (Xcc), poses a significant threat to global citrus production due to the high susceptibility of nearly all commercial citrus cultivars to it. Although transcription factor Citrus PH4 (CitPH4) is well known for regulating fruit acidity, its potential role in plant ...
Tao Yuan   +20 more
wiley   +1 more source

IMPROVING THE EFFICACY OF NETWORK SECURITY BASED ON DIMENSIONALITY REDUCTION TECHNIQUES

open access: yesTạp chí Khoa học
This paper focuses on proposing a network intrusion detection model applying fundamental machine learning techniques to enhance early detection of network intrusions (rapid detection of attack behaviors) for improved efficiency in preventing network ...
Hoang Thi Phuong
doaj   +1 more source

The dangers, directness, and purposes of online collective actions

open access: yesPolitical Psychology, EarlyView.
Abstract Most research on online collective action investigates low‐effort, social media‐based actions rather than tactics with highly disruptive potential. To better account for the variety of forms of collective actions that use digital technologies, we conducted an open‐source intelligence search (Study 1a) and an expert consultation survey (Study ...
Catherine G. Lowery   +2 more
wiley   +1 more source

Identificación de ataques de denegación de servicio distribuido (DDoS) mediante la integración de algoritmos de aprendizaje automático y arquitecturas de redes neuronales artificiales

open access: yesRevista Ingeniería, Matemáticas y Ciencias de la Información
El objetivo es identificar los ataques de denegación de servicio distribuido (DDoS) mediante la integración de algoritmos de aprendizaje automático y arquitecturas de redes neuronales artificiales. Metodología: Para estructurar el análisis
Victor Alfonso Guzman-Brand   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy