نتایج جستجو برای: tls traffic analysis

تعداد نتایج: 2901176  

2014
Omer Ziv Amit Zeisel Nataly Mirlas-Neisberg Umakanta Swain Reinat Nevo Nir Ben-Chetrit Maria Paola Martelli Roberta Rossi Stefan Schiesser Christine E. Canman Thomas Carell Nicholas E. Geacintov Brunangelo Falini Eytan Domany Zvi Livneh

Cells cope with replication-blocking lesions via translesion DNA synthesis (TLS). TLS is carried out by low-fidelity DNA polymerases that replicate across lesions, thereby preventing genome instability at the cost of increased point mutations. Here we perform a two-stage siRNA-based functional screen for mammalian TLS genes and identify 17 validated TLS genes. One of the genes, NPM1, is frequen...

2001
Simon Blake-Wilson David Hopwood Jan Mikkelsen

This document describes extensions that may be used to add functionality to TLS. It provides both generic extension mechanisms for the TLS handshake client and server hellos, and specific extensions using these generic mechanisms. The extensions may be used by TLS clients and servers. The extensions are backwards compatible communication is possible between TLS 1.0 clients that support the exte...

Journal: :Electronics 2022

The SSL/TLS protocol is widely used in data encryption transmission. Aiming at the problem of detecting SSL/TLS-encrypted malicious traffic with small-scale and unbalanced training data, a deep-forest-based detection method called DF-IDS proposed this paper. According to characteristics SSL/TSL protocol, network was split into sessions according 5-tuple information. Each session then transforme...

Journal: :Microprocessors and Microsystems 2023

WhatsApp messenger is a popular instant messaging application that employs end-to-end encryption for communication. Web the browser-based implementation of messenger. Users communicate securely using SSL protocol. Encryption and use common port communication by multiple applications poses challenge in traffic classification identification. It highly needed to analyze network purpose QoS, Intrus...

2013
Hugo Krawczyk Kenneth G. Paterson Hoeteck Wee

TLS is the most widely-used cryptographic protocol on the Internet. It comprises the TLS Handshake Protocol, responsible for authentication and key establishment, and the TLS Record Protocol, which takes care of subsequent use of those keys to protect bulk data. In this paper, we present the most complete analysis to date of the TLS Handshake protocol and its application to data encryption (in ...

2016
Xin Xu Aiyang Lin Cuiyan Zhou Susan R. Blackwell Yiran Zhang Zihao Wang Qianqian Feng Ruifang Guan Michelle D. Hanna Zhucheng Chen Wei Xiao

DNA damage tolerance (DDT) is responsible for genomic stability and cell viability by bypassing the replication block. In Saccharomyces cerevisiae DDT employs two parallel branch pathways to bypass the DNA lesion, namely translesion DNA synthesis (TLS) and error-free lesion bypass, which are mediated by sequential modifications of PCNA. Rad5 has been placed in the error-free branch of DDT becau...

2016
Sanghak Oh Eunsoo Kim Hyoungshick Kim

As SSL/TLS has become the de facto standard Internet protocol for secure communication in recent years, its security issues have also been intensively studied. Even though several tools have been introduced to help administrators know which SSL/TLS vulnerabilities exist in their network hosts, it is still unclear whether the best security practices are effectively adopted to fix those vulnerabi...

2010
Landon Pastushok Michelle Hanna Wei Xiao

In response to replication-blocking DNA lesions, proliferating cell nuclear antigen (PCNA) can be conjugated with a single ubiquitin (Ub) or Lys63-linked Ub chains at the Lys164 residue, leading to two modes of DNA damage tolerance (DDT), namely translesion synthesis (TLS) and error-free DDT, respectively. Several reports suggest a model whereby monoubiquitylated PCNA recruits TLS polymerases t...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده فنی و مهندسی 1388

الحاق و پیوند ترافیک از جفت فرستنده-گیرنده های مختلف به مسیر نوری پرظرفیت ، آرایش ترافیک یا همان traffic grooming نامیده می شود. در این پایان نامه، به بررسی و ارائه الگوریتمی جهت آرایش ترافیک (traffic grooming) در شبکه های ip-over-wdm می پردازیم که برپایه بهینه سازی به روش کلونی مورچه ها (acs) بنا شده است و از تابع احتمالی که به دو پارامتر هزینه و مقدار فرومون وابسته است استفاده می کند. در ادا...

2014
Arnamoy Bhattacharyya José Nelson Amaral Hal Finkel

Thread Level Speculation(TLS) is a hardware/software technique that guarantees correct parallel execution of loops even in the presence of dependence and has potential to lead to performance gains through the parallelization of loops that cannot be proven to be free of dependencies at compile time. However, given the overhead of TLS execution, the selection of loops to be speculated is importan...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید