نتایج جستجو برای: hijack

تعداد نتایج: 677  

2017
Zhenping Lu Fucai Chen Jiangxing Wu Guozhen Cheng

Vulnerabilities and backdoors in NOS (Network operating system) allow malicious actors to disrupt network or hijack NOS. The current work proposes a NOS architecture called secure control plane (SCP) that enhances security through a rotation of hetergeneous and multiple NOSs.Theory analysis proves validity and availability of the SCP and its more effective security performance over traditional ...

Journal: :Current Biology 2014
Martyna Zwoinska Martin I. Lind Alexei A. Maklakov

Males and females have different evolutionary interests resulting in sexual conflict over optimal life histories. A new study in Caenorhabditis elegans shows that males hijack female physiology after mating to cause body shrinking and, ultimately, death. But how do males benefit from female demise?

2015
Mohamed Abou El Hassan Katherine Huang Manoja B. K. Eswara Michael Zhao Lan Song Tao Yu Yu Liu Jeffrey C. Liu Sean McCurdy Anqi Ma Joan Wither Jian Jin Eldad Zacksenhaus Jeffrey L. Wrana Rod Bremner Srikumar P Chellappan

Polycomb Repressive Complex 2 (PRC2) is an epigenetic regulator induced in many cancers. It is thought to drive tumorigenesis by repressing division, stemness, and/or developmental regulators. Cancers evade immune detection, and diverse immune regulators are perturbed in different tumors. It is unclear how such cell-specific effects are coordinated. Here, we show a profound and cancer-selective...

2015
Kendall Powell

JCB • VOLUME 210 • NUMBER 7 • 2015 1038 In some ways, Nihal Altan-Bonnet’s career shares similarities with a national security agent, pursuing invaders. As a graduate student in Sandy Simon’s laboratory at The Rockefeller University, she showed that drug-resistant tumor cells were sequestering chemotherapy drugs away in acidified membrane compartments for deportation from the cell (1). That beg...

2013
ZHAO JINJING LI YUANLING LIU LI

Because there is no authentication mechanism used in BGP, a mis-behaving router can announce routes to any destination prefix on the Internet and even manipulate route attributes in the routing updates it sends to neighboring routers. Taking advantage of this weakness has become the fundamental mechanism for constructing prefix hijack attacks. The relation of network topology and prefix hijacki...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید