Search for dissertations about: "hijack"

Showing result 1 - 5 of 19 swedish dissertations containing the word hijack.

  1. 1. Collaborative Network Security: Targeting Wide-area Routing and Edge-network Attacks

    Author : Rahul Gokulchand Hiran; Nahid Shahmehri; Niklas Carlsson; Olaf Maennel; Linköpings universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Collaboration; network security; BGP attacks; routing security; hijack;

    Abstract : To ensure that services can be delivered reliably and continuously over theInternet, it is important that both Internet routes and edge networks aresecured. However, the sophistication and distributed nature of many at-tacks that target wide-area routing and edge networks make it difficult foran individual network, user, or router to detect these attacks. READ MORE

  2. 2. Analysis of PDGF receptor internalization and signaling using proximity ligation assays

    Author : Marie Rubin Sander; Ola Söderberg; Cristina Al-Khalili Szigyarto; Uppsala universitet; []
    Keywords : MEDICIN OCH HÄLSOVETENSKAP; MEDICAL AND HEALTH SCIENCES; PDGFRβ; dynamin; proteolytic cleavage; signaling; internalization; protein-protein interaction; short linear motif; viral hijack; in situ PLA; Molboolean;

    Abstract : Cell signaling is mediated by signaling proteins that relay the signal in an intricate network of interactions before the signal is translated into a biological response. Short linear motifs (SLiMs) in intrinsically disordered regions of proteins serve as docking sites for protein interaction in all aspects of cell regulation including signal transduction. READ MORE

  3. 3. How tumour cells hijack apical extrusion and how they can be targeted

    Author : Weiyingqi Cui; Karolinska Institutet; Karolinska Institutet; []
    Keywords : ;

    Abstract : Tissue development and cell behavior are influenced not only by chemical signals but also by physical ones. The responses of cells to mechanical forces can range from the immediate adjustment of cell morphology and motility to long-term genome reorganisation and cell fate changes. READ MORE

  4. 4. Understanding the Capabilities of Route Collectors to Observe Stealthy Hijacks : Does adding more monitors or reporting more paths help?

    Author : Alexandros Milolidakis; Dejan Manojlo Kostic; Marco Chiesa; Alberto Dainotti; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Border gateway protocol; Stealthy hijacking; BGP hijacking; Route collector; Informations- och kommunikationsteknik; Information and Communication Technology;

    Abstract : Routing hijacks have plagued the Internet for decades. These attacks corrupt the routing table entries that networks use to forward traffic, causing affected network devices to route private and possibly sensitive Internet traffic towards the hijacker. READ MORE

  5. 5. Feeling the force : role of AmotL2 in normal development and cancer

    Author : Aravindh Subramani; Karolinska Institutet; Karolinska Institutet; []
    Keywords : ;

    Abstract : Cells that fabricate the body, dwell in a very heterogeneous environment. Self-organization of individual cells into complex tissues and organs at the time of growth and revival is brought about by the combinatory action of biomechanical and biochemical signaling processes. READ MORE