Results 41 to 50 of about 571,853 (290)
Network-Layer Accountability Protocols: A Survey
Today’s Internet is vulnerable to numerous attacks, including source spoofing, distributed denial of service, prefix hijacking, and route forgery.
Lin He, Ying Liu, Gang Ren
doaj +1 more source
Case Study - IPv6 based building automation solution integration into an IPv4 Network Service Provider infrastructure [PDF]
The case study presents a case study describing an Internet Protocol (IP) version 6 (v6) introduction to an IPv4 Internet Service Provider (ISP) network infrastructure.
Bogomilov, Ivan, Milovanov, Nikolay
core
Diversity and complexity in neural organoids
Neural organoid research aims to expand genetic diversity on one side and increase tissue complexity on the other. Chimeroids integrate multiple donor genomes within single organoids. Self‐organising multi‐identity organoids, exogenous cell seeding, or enforced assembly of region‐specific organoids contribute to tissue complexity.
Ilaria Chiaradia, Madeline A. Lancaster
wiley +1 more source
AAA+ protein unfoldases—the Moirai of the proteome
AAA+ unfoldases are essential molecular motors that power protein degradation and disaggregation. This review integrates recent cryo‐electron microscopy (cryo‐EM) structures and single‐molecule biophysical data to reconcile competing models of substrate translocation.
Stavros Azinas, Marta Carroni
wiley +1 more source
Optimization of the Marketing Management System Based on Cloud Computing and Big Data
With the rapid development of the Internet information age, social networks, mobile Internet, and e-commerce have expanded the scope of Internet applications.
Lin Zhang
doaj +1 more source
To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking
Information-Centric Networking (ICN) is an internetworking paradigm that offers an alternative to the current IP\nobreakdash-based Internet architecture.
Compagno, Alberto +3 more
core +1 more source
Impact of traffic mix on caching performance in a content-centric network [PDF]
For a realistic traffic mix, we evaluate the hit rates attained in a two-layer cache hierarchy designed to reduce Internet bandwidth requirements. The model identifies four main types of content, web, file sharing, user generated content and video on ...
Fricker, Christine +3 more
core +2 more sources
Dormant cancer cells can hide in distant organs for years, evading treatment and the immune system. This review highlights how signals from the surrounding tissue and immune environment keep these cells inactive or trigger their reawakening. Understanding these mechanisms may help develop therapies to eliminate or control dormant cells and prevent ...
Kanishka Tiwary +1 more
wiley +1 more source
Bi-Layer Shortest-Path Network Interdiction Game for Internet of Things
Network security is a crucial challenge facing Internet-of-Things (IoT) systems worldwide, which leads to serious safety alarms and great economic loss. This paper studies the problem of malicious interdicting network exploitation of IoT systems that are
Jingwen Yan +5 more
doaj +1 more source
An Internet Protocol adaptation layer for underwater acoustic networks
The Internet of Underwater Things (IoUT) is on the way. The key application areas of IoUT include ocean engineering, maritime security and environmental monitoring. To achieve interoperability between different underwater communicating systems and/or to ensure connectivity from the air to underwater (and reversely), an Internet Protocol (IP) adaptation
Parrein, Benoît +2 more
openaire +2 more sources

