Results 11 to 20 of about 41,844 (95)

Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems

open access: yes, 2018
The first-ever Ukraine cyberattack on power grid has proven its devastation by hacking into their critical cyber assets. With administrative privileges accessing substation networks/local control centers, one intelligent way of coordinated cyberattacks ...
Ginter, Andrew   +4 more
core   +1 more source

Can NSEC5 be practical for DNSSEC deployments? [PDF]

open access: yes, 2017
NSEC5 is proposed modification to DNSSEC that simultaneously guarantees two security properties: (1) privacy against offline zone enumeration, and (2) integrity of zone contents, even if an adversary compromises the authoritative nameserver responsible ...
Goldberg, Sharon   +6 more
core  

Enumeration of spanning trees in a pseudofractal scale-free web

open access: yes, 2010
Spanning trees are an important quantity characterizing the reliability of a network, however, explicitly determining the number of spanning trees in networks is a theoretical challenge.
Liu, Hongxiao   +3 more
core   +1 more source

Statistics of self-avoiding walks on randomly diluted lattice

open access: yes, 1993
A comprehensive numerical study of self-avoiding walks (SAW's) on randomly diluted lattices in two and three dimensions is carried out. The critical exponents $\nu$ and $\chi$ are calculated for various different occupation probabilities, disorder ...
A. B. Harris   +38 more
core   +2 more sources

Master of puppets: analyzing and attacking a botnet for fun and profit [PDF]

open access: yes, 2015
A botnet is a network of compromised machines (bots), under the control of an attacker. Many of these machines are infected without their owners’ knowledge, and botnets are the driving force behind several misuses and criminal activities on the ...
Saito, Genki, Stringhini, Gianluca
core  

Quantum and Classical Spins on the Spatially Distorted Kagome Lattice: Applications to Volborthite

open access: yes, 2007
In Volborthite, spin-1/2 moments form a distorted Kagom\'e lattice, of corner sharing isosceles triangles with exchange constants $J$ on two bonds and $J'$ on the third bond.
Ashvin Vishwanath   +5 more
core   +1 more source

Randomly Charged Polymers, Random Walks, and Their Extremal Properties

open access: yes, 1995
Motivated by an investigation of ground state properties of randomly charged polymers, we discuss the size distribution of the largest Q-segments (segments with total charge Q) in such N-mers.
B. Derrida   +21 more
core   +1 more source

Characterizing a Meta-CDN

open access: yes, 2018
CDNs have reshaped the Internet architecture at large. They operate (globally) distributed networks of servers to reduce latencies as well as to increase availability for content and to handle large traffic bursts.
Hohlfeld, Oliver   +3 more
core   +1 more source

On the topological classification of binary trees using the Horton-Strahler index

open access: yes, 2001
The Horton-Strahler (HS) index $r=\max{(i,j)}+\delta_{i,j}$ has been shown to be relevant to a number of physical (such at diffusion limited aggregation) geological (river networks), biological (pulmonary arteries, blood vessels, various species of trees)
A. Cayley   +22 more
core   +1 more source

The microbiological quality of water: the nature of the problem [PDF]

open access: yes, 1997
Improvements in methods for the detection and enumeration of microbes in water, particularly the application of techniques of molecular biology, have highlighted shortcomings in the ”standard methods” for assessing water quality. Higher expectations from
Jones, J.G.
core  

Home - About - Disclaimer - Privacy