Results 61 to 70 of about 3,871,840 (378)

Development of an Internet Protocol Traceback Scheme for Denial of Service Attack Source Detection

open access: yesNigerian Journal of Technological Development, 2019
To mitigate the challenges that Flash Event (FE) poses to IP-Traceback techniques, this paper presents an IP Traceback scheme for detecting the source of a DoS attack based on Shark Smell Optimization Algorithm (SSOA).
O. W. Salami, I. J. Umoh, E. A. Adedokun
doaj   +1 more source

Performance evaluation of lightweight and secure protocol for wireless sensor networks: A protocol to enable Web services in IPv6 over low-power wireless personal area networks

open access: yesInternational Journal of Distributed Sensor Networks, 2017
The integration of wireless sensor networks within the Internet has been possible with the use of the IPv6 over low-power wireless personal area network standard at lower layers and Web services at higher layers.
Patricia E Figueroa   +2 more
doaj   +1 more source

Microfluidic electro‐viscoelastic manipulation of extracellular vesicles

open access: yesFEBS Open Bio, EarlyView.
The electro‐viscoelastic manipulation as a potential method for separation of particles based on size. The particles introduced as a sheath flow migrate to the channel center under the influence of simultaneously applied electric field and pressure driven flow.
Seyedamirhosein Abdorahimzadeh   +7 more
wiley   +1 more source

A security analysis of version 2 of the Network Time Protocol (NTP): A report to the privacy and security research group [PDF]

open access: yes, 1991
The Network Time Protocol is being used throughout the Internet to provide an accurate time service. The security requirements are examined of such a service, version 2 of the NTP protocol is analyzed to determine how well it meets these requirements ...
Bishop, Matt
core   +2 more sources

Security Model for TCP/IP Protocol Suite

open access: yesJournal of Advances in Information Technology, 2011
the Internet has instantly evolved into a vast global network in the growing technology. TCP/IP Protocol Suite is the basic requirement for today’s Internet.  Internet usage continues to increase exponentially.
Anand Kumar, S. Karthikeyan
doaj   +1 more source

A Comprehensive Review on Network Protocol Design for Autonomic Internet of Things

open access: yesInformation, 2021
The autonomic Internet of Things is the creation of self-management capability in the Internet of Things system by embedding some autonomic properties, with the goal of freeing humans from all detail of the operation and management of the system. At same
Riri Fitri Sari   +3 more
doaj   +1 more source

Short‐term actions of epigalocatechin‐3‐gallate in the liver: a mechanistic insight into hypoglycemic and potential toxic effects

open access: yesFEBS Open Bio, EarlyView.
Epigallocatechin‐3‐gallate (EGCG) acutely inhibited gluconeogenesis and enhanced glycolysis, glycogenolysis, and fatty acid oxidation in perfused rat livers. Mechanistic assays revealed mitochondrial uncoupling, inhibition of pyruvate carboxylation and glucose‐6‐phosphatase, shift of NADH/NAD+ ratios toward oxidation, and loss of membrane integrity ...
Carla Indianara Bonetti   +8 more
wiley   +1 more source

Navigating new norms: a systematic review of factors for the development of effective digital tools in higher education

open access: yesFEBS Open Bio, EarlyView.
What factors make for an effective digital learning tool in Higher Education? This systematic review identifies elements of a digital tool that published examples reveal to be features of an engaging and impactful digital tool. A systematic literature search yielded 25 research papers for analysis.
Akmal Arzeman   +4 more
wiley   +1 more source

Understanding bio‐based polymers: A study of origins, properties, biodegradation and their impact on health and the environment

open access: yesFEBS Open Bio, EarlyView.
This review provides an overview of bio‐based polymer sources, their unique functional properties and their environmental impact, and addresses their role as sustainable alternatives. It discusses end‐of‐life options, including composting and anaerobic digestion for renewable energy.
Sabina Kolbl Repinc   +8 more
wiley   +1 more source

MagicPairing: Apple's Take on Securing Bluetooth Peripherals

open access: yes, 2020
Device pairing in large Internet of Things (IoT) deployments is a challenge for device manufacturers and users. Bluetooth offers a comparably smooth trust on first use pairing experience. Bluetooth, though, is well-known for security flaws in the pairing
Antonioli Daniele   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy