Results 51 to 60 of about 41,910 (290)
Mitigation Model for DDoS Attack in Wireless Sensor Networks [PDF]
A Denial-of-Service is an attack in which the attackers send certain messages to the target systems or target servers with a purpose and intention of shutting down those system or servers.
Gond, Shruti, Nath, Aishwarya
core
TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer
Modern low-latency anonymity systems, no matter whether constructed as an overlay or implemented at the network layer, offer limited security guarantees against traffic analysis.
Asoni, Daniele E. +5 more
core +1 more source
Aggressive prostate cancer is associated with pericyte dysfunction
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero +11 more
wiley +1 more source
A new method for improving security in MANETs AODV Protocol [PDF]
In mobile ad hoc network (MANET), secure communication is more challenging task due to its fundamental characteristics like having less infrastructure, wireless link, distributed cooperation, dynamic topology, lack of association, resource constrained ...
Zahra Alishahi +2 more
doaj
SDNsec: Forwarding Accountability for the SDN Data Plane
SDN promises to make networks more flexible, programmable, and easier to manage. Inherent security problems in SDN today, however, pose a threat to the promised benefits. First, the network operator lacks tools to proactively ensure that policies will be
Hoefler, Torsten +4 more
core +1 more source
Rethinking plastic waste: innovations in enzymatic breakdown of oil‐based polyesters and bioplastics
Plastic pollution remains a critical environmental challenge, and current mechanical and chemical recycling methods are insufficient to achieve a fully circular economy. This review highlights recent breakthroughs in the enzymatic depolymerization of both oil‐derived polyesters and bioplastics, including high‐throughput protein engineering, de novo ...
Elena Rosini +2 more
wiley +1 more source
Detection techniques of selective forwarding attacks in wireless sensor networks: a survey
The wireless sensor network has become a hot research area due its wide range of application in military and civilian domain, but as it uses wireless media for communication these are easily prone to security attacks.
Saluja, Krishan Kumar +2 more
core +2 more sources
Defending against packet dropping attack in vehicularad hocnetworks [PDF]
AbstractVehicularad hocnetworks (VANETs) are becoming very popular and a promising application of the so‐called mobilead hocnetworks (MANET) technology. It has attracted recently an increasing attention from many car manufacturers as well as the wireless communication research community.
Djahel, S +3 more
openaire +2 more sources
ABSTRACT Objective Natalizumab (NTZ) is a highly effective therapy for multiple sclerosis (MS); however, its use is limited by the risk of a rare potentially severe opportunistic brain infection, progressive multifocal leukoencephalopathy (PML). Alternative dosing strategies are evaluated to reduce PML risk while still maintaining efficacy, which ...
Regina Berkovich +10 more
wiley +1 more source
Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs
Designing wireless sensor networks (WSNs) that can work reliably in the presence of inside packet drop attackers is very challenging. Current trust mechanisms and avoidance approaches are promising but have their limitations.
Youngho Cho, Gang Qu
doaj +1 more source

