Learn More
— The Distributed Denial of Services (DDoS) attack is a serious threat to the legitimate use of the Internet. Prevention mechanisms are thwarted by the ability of attackers to forge, or spoof, the source addresses in IP packets. By employing IP spoofing, attackers can evade detection and put a substantial burden on the destination network for policing(More)
A web-based version of the RLIMS-P literature mining system was developed for online mining of protein phosphorylation information from MEDLINE abstracts. The online tool presents extracted phosphorylation objects (phosphorylated proteins, phosphorylation sites and protein kinases) in summary tables and full reports with evidence-tagged abstracts. The tool(More)
This paper presents a hybrid teaching approach, a new Web Security course as well as how to use the hybrid approach to teach the Web Security course to practice information assurance. The hybrid teaching approach contains three key issues that are keeping the lecture materials up-to-date, assigning former research projects as comprehensive team projects,(More)
Electrical signals have been applied towards the repair of articular tissues in the laboratory and clinical settings for over seventy years. We focus on healing of the meniscus, a tissue essential to knee function with limited innate repair potential, which has been largely unexplored in the context of electrical stimulation. Here we demonstrate for the(More)
—This paper considers a multiuser cellular two-way relay network (cTWRN) where multiple users exchange information with a base station (BS) via a relay station (RS). Each user is equipped with a single antenna, while both the BS and the RS are equipped with a very large antenna array. We investigate the performance of the cTWRN with amplify-and-forward (AF)(More)