Results 51 to 60 of about 41,910 (290)

Mitigation Model for DDoS Attack in Wireless Sensor Networks [PDF]

open access: yes, 2015
A Denial-of-Service is an attack in which the attackers send certain messages to the target systems or target servers with a purpose and intention of shutting down those system or servers.
Gond, Shruti, Nath, Aishwarya
core  

TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer

open access: yes, 2018
Modern low-latency anonymity systems, no matter whether constructed as an overlay or implemented at the network layer, offer limited security guarantees against traffic analysis.
Asoni, Daniele E.   +5 more
core   +1 more source

Aggressive prostate cancer is associated with pericyte dysfunction

open access: yesMolecular Oncology, EarlyView.
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero   +11 more
wiley   +1 more source

A new method for improving security in MANETs AODV Protocol [PDF]

open access: yesManagement Science Letters, 2012
In mobile ad hoc network (MANET), secure communication is more challenging task due to its fundamental characteristics like having less infrastructure, wireless link, distributed cooperation, dynamic topology, lack of association, resource constrained ...
Zahra Alishahi   +2 more
doaj  

SDNsec: Forwarding Accountability for the SDN Data Plane

open access: yes, 2016
SDN promises to make networks more flexible, programmable, and easier to manage. Inherent security problems in SDN today, however, pose a threat to the promised benefits. First, the network operator lacks tools to proactively ensure that policies will be
Hoefler, Torsten   +4 more
core   +1 more source

Rethinking plastic waste: innovations in enzymatic breakdown of oil‐based polyesters and bioplastics

open access: yesFEBS Open Bio, EarlyView.
Plastic pollution remains a critical environmental challenge, and current mechanical and chemical recycling methods are insufficient to achieve a fully circular economy. This review highlights recent breakthroughs in the enzymatic depolymerization of both oil‐derived polyesters and bioplastics, including high‐throughput protein engineering, de novo ...
Elena Rosini   +2 more
wiley   +1 more source

Detection techniques of selective forwarding attacks in wireless sensor networks: a survey

open access: yes, 2012
The wireless sensor network has become a hot research area due its wide range of application in military and civilian domain, but as it uses wireless media for communication these are easily prone to security attacks.
Saluja, Krishan Kumar   +2 more
core   +2 more sources

Defending against packet dropping attack in vehicularad hocnetworks [PDF]

open access: yesSecurity and Communication Networks, 2008
AbstractVehicularad hocnetworks (VANETs) are becoming very popular and a promising application of the so‐called mobilead hocnetworks (MANET) technology. It has attracted recently an increasing attention from many car manufacturers as well as the wireless communication research community.
Djahel, S   +3 more
openaire   +2 more sources

Annual 12‐Week Dosing Gap of Natalizumab: Clinical Efficacy, Blood Biomarkers, and CSF Cell Composition

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Natalizumab (NTZ) is a highly effective therapy for multiple sclerosis (MS); however, its use is limited by the risk of a rare potentially severe opportunistic brain infection, progressive multifocal leukoencephalopathy (PML). Alternative dosing strategies are evaluated to reduce PML risk while still maintaining efficacy, which ...
Regina Berkovich   +10 more
wiley   +1 more source

Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Designing wireless sensor networks (WSNs) that can work reliably in the presence of inside packet drop attackers is very challenging. Current trust mechanisms and avoidance approaches are promising but have their limitations.
Youngho Cho, Gang Qu
doaj   +1 more source

Home - About - Disclaimer - Privacy