Graph theoretical approach for automated IP lifecycle management in telco networks

K Duran, B Karanlik, B Canberk - International Journal of …, 2021 - Wiley Online Library
IP address management (IPAM) systems are commonly used in the telecommunication
industry to serve resource management for large‐scaled IP networks. In resource …

[HTML][HTML] Biotechnology Innovation in Do-It-Yourself (DIY) Gene Editing: A Call for a New Regulatory Framework

A Stasi, O Thongpravati - OBM Genetics, 2024 - lidsen.com
The expansion of do-it-yourself (DIY) gene editing, facilitated by Clustered Regularly
Interspaced Short Palindromic Repeats (CRISPR) technology, has catalyzed a significant …

InBlock4: Blockchain-based route origin validation

S Angieri, M Bagnulo, A García-Martínez… - … -IEEE Conference on …, 2020 - ieeexplore.ieee.org
In this paper, we present InBlock4, a blockchain-based alternative to RPKI for the provision
of Route Origin validation for BGP. InBlock4 embeds an alternative trust model to protect …

Routing Security Using Blockchain Technology

M Gómez, P Bazán, N Río, M Morandi - … on Cloud Computing, Big Data & …, 2021 - Springer
Route hijacking attacks exploit the mutual trust that BGP architecture is based on, rather than
any vulnerabilities or protocol flaws. For this reason, these attacks are as old as the protocol …

Seguridad en el enrutamiento utilizando tecnología Blockchain

MA Gómez - 2023 - sedici.unlp.edu.ar
Para realizar una ataque de route hijacking no se saca provecho a ninguna vulnerabilidad o
falla de protocolo, sino que se explota que la arquitectura de BGP está basada en la …

[HTML][HTML] A Fraud Detection System for Reducing Blockchain Transaction Risks Using Explainable Graph Neural Networks

C Li - 2022 - search.proquest.com
With the emergence of blockchain in financial applications, it is critical to assess and
manage the financial risks of fraudulent events to protect customers, minimize loss, and …

Research on Blockchain-Based Inter-Domain Routing Authentication Technology

Y Su, B Wang, Q Xing, P Li, X Wang… - 2021 IEEE 21st …, 2021 - ieeexplore.ieee.org
Inter-domain routing system is the cornerstone of the modern Internet, which is based on an
unconditional trust mechanism. To avoid being affected by routing attacks, interdomain …

Next generation overlay networks: security, trust, and deployment challenges

J Paillissé Vilanova - 2021 - upcommons.upc.edu
Overlay networks are a technique to build a new network on top of an existing one. They are
a key tool to add functionality to existing networks, and are used in different layers of the …

Applying Blockchain Technology to Financial Market's Infrastructure

J Liu - 2023 - ses.library.usyd.edu.au
The utilization of blockchain technology has gained widespread acceptance across various
domains in recent years. Among them, blockchain integration in the financial sector is …

Routing Security Using Blockchain Technology

M Morandi - Cloud Computing, Big Data & Emerging Topics: 9th …, 2021 - books.google.com
Route hijacking attacks exploit the mutual trust that BGP architecture is based on, rather than
any vulnerabilities or protocol flaws. For this reason, these attacks are as old as the protocol …