Vegetable proteins as encapsulating agents: Recent updates and future perspectives

F Islam, Y Amer Ali, A Imran, M Afzaal… - Food Science & …, 2023 - Wiley Online Library
The use of proteinaceous material is desired as it forms a protective gelation around the
active core, making it safe through temperature, pH, and O2 in the stomach and intestinal …

Hummingbird: Dynamic path validation with hidden equal-probability sampling

A He, X Li, J Fu, H Hu, K Bu, C Miao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Path validation has already been incrementally deployed in the Internet architecture. It
secures packet forwarding by enabling end hosts to negotiate specific forwarding paths and …

6Search: A reinforcement learning-based traceroute approach for efficient IPv6 topology discovery

N Liu, C Jia, B Hou, C Hou, Y Chen, Z Cai - Computer Networks, 2023 - Elsevier
Topology discovery can infer the interconnection relationship between network entities. A
complete network topology is of great significance for network security analysis, application …

Yarrpbox: Detecting middleboxes at internet-scale

F Hilal, O Gasser - Proceedings of the ACM on Networking, 2023 - dl.acm.org
The end-to-end principle is one of the foundations of the original Internet architecture. This
principle is put to the test by middleboxes, ie, devices which change important parts of a …

A Global Measurement of Routing Loops on the Internet

A Alaraj, K Bock, D Levin, E Wustrow - International Conference on …, 2023 - Springer
Persistent routing loops on the Internet are a common misconfiguration that can lead to
packet loss, reliability issues, and can even exacerbate denial of service attacks …

Schooling NOOBs with eBPF

J Sommers, N Rudolph, R Durairajan - … of the 1st Workshop on eBPF …, 2023 - dl.acm.org
While networks have evolved in profound ways, the tools to measure them from end hosts
have not kept pace. State-of-the-art tools are ill-suited for elucidating observed network …

SwiftParade: Anti-burst Multipath Validation

A He, K Bu, J Huang, Y Pang, Q Gu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Path validation promises a necessary security add-on for future Internet architectures. It
authenticates not only source identities but also the exact path where a packet forwards …

A Manifold View of Connectivity in the Private Backbone Networks of Hyperscalers

L Salamatian, S Anderson, J Mathews… - Communications of the …, 2023 - dl.acm.org
As hyperscalers such as Google, Microsoft, and Amazon play an increasingly important role
in today's Internet, they are also capable of manipulating probe packets that traverse their …

Network Measurements and Optimizations for Telehealth in Internet's Remote Regions

P Kathiravelu, AR Bhimireddy… - 2023 Tenth International …, 2023 - ieeexplore.ieee.org
Telehealth allows a healthcare facility in a nearby city to provide healthcare access to
remote patients through devices connected via communication channels such as the …

目标网络场景自适应的IP 定位框架

祖铄迪, 丁世昌, 袁福祥, 罗向阳 - 网络与信息安全学报, 2023 - infocomm-journal.com
通过IP 来定位目标位置是基于位置的服务的重要基础. 当前研究者面向不同的网络场景,
提出了不同实现原理的IP 定位方法. 但在不同的网络场景中, 各类IP 定位方法难以维持理想的 …