Results 81 to 90 of about 61,931 (258)

Fingerprinting Internet DNS Amplification DDoS Activities

open access: yes, 2013
This work proposes a novel approach to infer and characterize Internet-scale DNS amplification DDoS attacks by leveraging the darknet space. Complementary to the pioneer work on inferring Distributed Denial of Service (DDoS) activities using darknet ...
Bou-Harb, Elias   +2 more
core   +1 more source

Toward Generating a New Cloud-Based Distributed Denial of Service (DDoS) Dataset and Cloud Intrusion Traffic Characterization

open access: yesInf.
The distributed denial of service attack poses a significant threat to network security. Despite the availability of various methods for detecting DDoS attacks, the challenge remains in creating real-time detectors with minimal computational overhead ...
MohammadMoein Shafi   +3 more
semanticscholar   +1 more source

The GmGT‐2F, a trihelix transcription factor, regulates seed oil content by directly activating GmAGAL transcription in soybean

open access: yesJournal of Integrative Plant Biology, EarlyView.
In soybean, the trihelix transcription factor GmGT‐2F positively regulates the expression of the α‐galactosidase gene GmAGAL, thereby modulating seed oil content. The cyclophilin GmCYP2 interacts with GmGT‐2F and suppresses GmAGAL activation. Haplotype diversity analysis of GmGT‐2F, GmCYP2, and GmAGAL identified favorable haplotype combinations ...
Shuangzhe Li   +6 more
wiley   +1 more source

lincRNA6679 promotes FnPR1B expression via phosphorylation‐activated FnWRKY14 to enhance strawberry resistance to Botrytis cinerea

open access: yesJournal of Integrative Plant Biology, EarlyView.
In strawberry, Botrytis cinerea induces the expression of the long, intergenic non‐coding RNA lincRNA667,which upregulates the transcription factor gene FnWRKY14. FnWRKY14 then binds to the promoter of the pathogenesis‐related gene FnPR1B, enhancing strawberry resistance to B. cinerea.
Yuhan Guan   +6 more
wiley   +1 more source

A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds

open access: yes, 2015
With the growing incidents of flash crowds and sophisticated DDoS attacks mimicking benign traffic, it becomes challenging to protect Internet-based services solely by differentiating attack traffic from legitimate traffic. While fair-sharing schemes are
Hsiao, Hsu-Chun   +7 more
core   +1 more source

The HaMYB22–HaGST3.2 module mediates salt stress response in sunflower

open access: yesJournal of Integrative Plant Biology, EarlyView.
The transcription factors HaMYB22, HaMYB120, and HaMYB121 cooperatively activate the transcription of the glutathione S‐transferase gene HaGST3.2, thereby facilitating the removal of reactive oxygen species induced by salt stress in sunflowers and improving their salt tolerance.
Siqi Zhang   +11 more
wiley   +1 more source

An SDN-based Approach For Defending Against Reflective DDoS Attacks

open access: yes, 2018
Distributed Reflective Denial of Service (DRDoS) attacks are an immanent threat to Internet services. The potential scale of such attacks became apparent in March 2018 when a memcached-based attack peaked at 1.7 Tbps.
Erb, Benjamin   +4 more
core   +1 more source

VqLecRKV.4 and VqBAK1 Modulate Grapevine Resistance to Powdery Mildew by Regulating Dynamic Balance of ROS

open access: yesPlant Biotechnology Journal, EarlyView.
ABSTRACT Grapevine powdery mildew, caused by the fungal pathogen Erysiphe necator, severely impacts plant growth and berry quality. However, the grapevine receptors and molecular mechanisms underlying grapevine resistance to E. necator remain poorly understood.
Yajuan Li   +9 more
wiley   +1 more source

Cloud Survivability Scenarios Under Attacks With and Without Countermeasures

open access: yesActa Informatica Pragensia
Background: Despite its increasing importance, cloud computing is vulnerable to Distributed Denial of Service (DDoS) attacks, affecting data centre availability and functionality.
Rachid Beghdad   +2 more
doaj   +1 more source

Detection and mitigation of DDoS attack in cloud computing using machine learning algorithm [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2019
Cloud computing, with its staggering and on-demand services had revamped the technology so far. Cloudconsumers are freely to use the applications and software on the premises of Pay-as-you go concept. This concept decreased the cost and make the services
Aroosh Amjad   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy