Results 11 to 20 of about 41,844 (95)
Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems
The first-ever Ukraine cyberattack on power grid has proven its devastation by hacking into their critical cyber assets. With administrative privileges accessing substation networks/local control centers, one intelligent way of coordinated cyberattacks ...
Ginter, Andrew +4 more
core +1 more source
Can NSEC5 be practical for DNSSEC deployments? [PDF]
NSEC5 is proposed modification to DNSSEC that simultaneously guarantees two security properties: (1) privacy against offline zone enumeration, and (2) integrity of zone contents, even if an adversary compromises the authoritative nameserver responsible ...
Goldberg, Sharon +6 more
core
Enumeration of spanning trees in a pseudofractal scale-free web
Spanning trees are an important quantity characterizing the reliability of a network, however, explicitly determining the number of spanning trees in networks is a theoretical challenge.
Liu, Hongxiao +3 more
core +1 more source
Statistics of self-avoiding walks on randomly diluted lattice
A comprehensive numerical study of self-avoiding walks (SAW's) on randomly diluted lattices in two and three dimensions is carried out. The critical exponents $\nu$ and $\chi$ are calculated for various different occupation probabilities, disorder ...
A. B. Harris +38 more
core +2 more sources
Master of puppets: analyzing and attacking a botnet for fun and profit [PDF]
A botnet is a network of compromised machines (bots), under the control of an attacker. Many of these machines are infected without their owners’ knowledge, and botnets are the driving force behind several misuses and criminal activities on the ...
Saito, Genki, Stringhini, Gianluca
core
Quantum and Classical Spins on the Spatially Distorted Kagome Lattice: Applications to Volborthite
In Volborthite, spin-1/2 moments form a distorted Kagom\'e lattice, of corner sharing isosceles triangles with exchange constants $J$ on two bonds and $J'$ on the third bond.
Ashvin Vishwanath +5 more
core +1 more source
Randomly Charged Polymers, Random Walks, and Their Extremal Properties
Motivated by an investigation of ground state properties of randomly charged polymers, we discuss the size distribution of the largest Q-segments (segments with total charge Q) in such N-mers.
B. Derrida +21 more
core +1 more source
CDNs have reshaped the Internet architecture at large. They operate (globally) distributed networks of servers to reduce latencies as well as to increase availability for content and to handle large traffic bursts.
Hohlfeld, Oliver +3 more
core +1 more source
On the topological classification of binary trees using the Horton-Strahler index
The Horton-Strahler (HS) index $r=\max{(i,j)}+\delta_{i,j}$ has been shown to be relevant to a number of physical (such at diffusion limited aggregation) geological (river networks), biological (pulmonary arteries, blood vessels, various species of trees)
A. Cayley +22 more
core +1 more source
The microbiological quality of water: the nature of the problem [PDF]
Improvements in methods for the detection and enumeration of microbes in water, particularly the application of techniques of molecular biology, have highlighted shortcomings in the ”standard methods” for assessing water quality. Higher expectations from
Jones, J.G.
core

