Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Black hole (networking)

Known as: Black hole (disambiguation), Black hole router, Silent discard 
In networking, black holes refer to places in the network where incoming or outgoing traffic is silently discarded (or "dropped"), without informing… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Network attacks, including Distributed Denial-of-Service (DDoS), continuously increase in terms of bandwidth along with damage… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
2017
2017
The Border Gateway Protocol (BGP) has been used for decades as the de facto protocol to exchange reachability information among… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
2016
2016
DDoS attacks remain a serious threat not only to the edge of the Internet but also to the core peering links at Internet Exchange… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2010
2010
We explore the relation between the total globular population in a galaxy (NGC) and the mass of its central black hole (M… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Review
2010
Review
2010
Recent results from large surveys of the local universe show that the galaxy-black hole connection is linked to host morphology… Expand
  • figure 1
  • figure 2
2010
2010
The Messenger 141 – September 2010 made up of several populations of stars. The existence of very young O and WR stars in the… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
Review
2009
Review
2009
Abstract We use data from large surveys of the local universe (SDSS+Galaxy Zoo) to show that the galaxy–black hole connection is… Expand
2006
2006
  • M. Chuah, Kun Huang
  • Proceedings. 31st IEEE Conference on Local…
  • 2006
  • Corpus ID: 15112623
Previous studies have shown that current inter-domain routing protocol, border gateway protocol (BGP), is vulnerable to various… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • table 1
Review
2001
Review
2001
A newly formed black hole may be directly identified if late-time accretion of material from the base of the ejected envelope… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5