Results 71 to 80 of about 83,142 (315)
Limitations of OpenFlow Topology Discovery Protocol
OpenFlow Discovery Protocol (OFDP) is the de-facto protocol used by OpenFlow controllers to discover the underlying topology. In this paper, we show that OFDP has some serious security, efficiency and functionality limitations that make it non suitable ...
Azzouni, Abdelhadi+3 more
core +1 more source
Repeat Expansions in PLIN4 Cause Autosomal Dominant Vacuolar Myopathy With Sarcolemmal Features
ABSTRACT Objective We aim to describe and characterize two unrelated Spanish families suffering from an autosomal dominant autophagic vacuolar myopathy caused by repeat expansions in PLIN4. Methods We evaluated the clinical phenotype and muscle imaging, and performed a genetic workup that included exome sequencing, muscle RNAseq, and long‐read genome ...
Laura Llansó+17 more
wiley +1 more source
An SDN-based Approach For Defending Against Reflective DDoS Attacks
Distributed Reflective Denial of Service (DRDoS) attacks are an immanent threat to Internet services. The potential scale of such attacks became apparent in March 2018 when a memcached-based attack peaked at 1.7 Tbps.
Erb, Benjamin+4 more
core +1 more source
Background In complex diseases, it is challenging to assess a patient's disease state, trajectory, treatment exposures, and risk of multiple outcomes simultaneously, efficiently and at the point of care. Methods We developed an interactive patient‐level data visualization and analysis tool (VAT) that automates illustration of a scleroderma patient's ...
Ji Soo Kim+18 more
wiley +1 more source
Objectives This study aims to describe the frequency and timing of physician referrals to physical therapists (PT) and other treatments prescribed over 12 months in patients with recent onset of knee osteoarthritis (KOA). The study also aims to identify determinants of early PT referrals.
Samannaaz S. Khoja+4 more
wiley +1 more source
Selective Packet Dropping Attacks to BESS-integrated Smart Grids [PDF]
Yongdong Wu+5 more
openalex +1 more source
This study develops a tissue‐engineered model of the atherosclerotic cap using human mesenchymal stromal cells (MSCs). After 2 weeks of culture to produce a collagenous matrix, a mineralizing medium induces microcalcifications over 4 weeks. These constructs, imaged with second harmonic generation microscopy, lead to reduced ultimate stress at rupture ...
Imke L. Jansen+4 more
wiley +1 more source
Enhanced Chaotic Map Based Key Agreement to Mitigate Packet Dropping Attack from MANETs [PDF]
Syed Abdul Syed S+5 more
openalex +1 more source
This study presents a 3D representative volume element‐based simulation approach to predict mesoscopic residual stress and strain fields in silicon solid solution‐strengthened ductile cast iron. By modeling phase transformation kinetics with an enhanced Johnson–Mehl–Avrami–Kolmogorov model, the effects of varying cooling rates on residual stresses are ...
Lutz Horbach+6 more
wiley +1 more source
Combating False Reports for Secure Networked Control in Smart Grid via Trustiness Evaluation
Smart grid, equipped with modern communication infrastructures, is subject to possible cyber attacks. Particularly, false report attacks which replace the sensor reports with fraud ones may cause the instability of the whole power grid or even result in ...
Djouadi, Seddik M.+2 more
core +1 more source