CINXE.COM
Search results for: BGP hijacking
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: BGP hijacking</title> <meta name="description" content="Search results for: BGP hijacking"> <meta name="keywords" content="BGP hijacking"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="BGP hijacking" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="BGP hijacking"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 11</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: BGP hijacking</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11</span> Detect QOS Attacks Using Machine Learning Algorithm</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Christodoulou%20Christos">Christodoulou Christos</a>, <a href="https://publications.waset.org/abstracts/search?q=Politis%20Anastasios"> Politis Anastasios</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A large majority of users favoured to wireless LAN connection since it was so simple to use. A wireless network can be the target of numerous attacks. Class hijacking is a well-known attack that is fairly simple to execute and has significant repercussions on users. The statistical flow analysis based on machine learning (ML) techniques is a promising categorization methodology. In a given dataset, which in the context of this paper is a collection of components representing frames belonging to various flows, machine learning (ML) can offer a technique for identifying and characterizing structural patterns. It is possible to classify individual packets using these patterns. It is possible to identify fraudulent conduct, such as class hijacking, and take necessary action as a result. In this study, we explore a way to use machine learning approaches to thwart this attack. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=wireless%20lan" title="wireless lan">wireless lan</a>, <a href="https://publications.waset.org/abstracts/search?q=quality%20of%20service" title=" quality of service"> quality of service</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=class%20hijacking" title=" class hijacking"> class hijacking</a>, <a href="https://publications.waset.org/abstracts/search?q=EDCA%20remapping" title=" EDCA remapping"> EDCA remapping</a> </p> <a href="https://publications.waset.org/abstracts/184408/detect-qos-attacks-using-machine-learning-algorithm" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/184408.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">61</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10</span> System Detecting Border Gateway Protocol Anomalies Using Local and Remote Data</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alicja%20Starczewska">Alicja Starczewska</a>, <a href="https://publications.waset.org/abstracts/search?q=Aleksander%20Nawrat"> Aleksander Nawrat</a>, <a href="https://publications.waset.org/abstracts/search?q=Krzysztof%20Daniec"> Krzysztof Daniec</a>, <a href="https://publications.waset.org/abstracts/search?q=Jaros%C5%82aw%20Homa"> Jarosław Homa</a>, <a href="https://publications.waset.org/abstracts/search?q=Kacper%20Ho%C5%82da"> Kacper Hołda</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Border Gateway Protocol is the main routing protocol that enables routing establishment between all autonomous systems, which are the basic administrative units of the internet. Due to the poor protection of BGP, it is important to use additional BGP security systems. Many solutions to this problem have been proposed over the years, but none of them have been implemented on a global scale. This article describes a system capable of building images of real-time BGP network topology in order to detect BGP anomalies. Our proposal performs a detailed analysis of BGP messages that come into local network cards supplemented by information collected by remote collectors in different localizations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=BGP" title="BGP">BGP</a>, <a href="https://publications.waset.org/abstracts/search?q=BGP%20hijacking" title=" BGP hijacking"> BGP hijacking</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=detection" title=" detection"> detection</a> </p> <a href="https://publications.waset.org/abstracts/174286/system-detecting-border-gateway-protocol-anomalies-using-local-and-remote-data" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/174286.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">77</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9</span> Towards an Adversary-Aware ML-Based Detector of Spam on Twitter Hashtags</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Niddal%20Imam">Niddal Imam</a>, <a href="https://publications.waset.org/abstracts/search?q=Vassilios%20G.%20Vassilakis"> Vassilios G. Vassilakis</a> </p> <p class="card-text"><strong>Abstract:</strong></p> After analysing messages posted by health-related spam campaigns in Twitter Arabic hashtags, we found that these campaigns use unique hijacked accounts (we call them adversarial hijacked accounts) as adversarial examples to fool deployed ML-based spam detectors. Existing ML-based models build a behaviour profile for each user to detect hijacked accounts. This approach is not applicable for detecting spam in Twitter hashtags since they are computationally expensive. Hence, we propose an adversary-aware ML-based detector, which includes a newly designed feature (avg posts) to improve the detection of spam tweets posted by the adversarial hijacked accounts at a tweet-level in trending hashtags. The proposed detector was designed considering three key points: robustness, adaptability, and interpretability. The new feature leverages the account’s temporal patterns (i.e., account age and number of posts). It is faster to compute compared to features discussed in the literature and improves the accuracy of detecting the identified hijacked accounts by 73%. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Twitter%20spam%20detection" title="Twitter spam detection">Twitter spam detection</a>, <a href="https://publications.waset.org/abstracts/search?q=adversarial%20examples" title=" adversarial examples"> adversarial examples</a>, <a href="https://publications.waset.org/abstracts/search?q=evasion%20attack" title=" evasion attack"> evasion attack</a>, <a href="https://publications.waset.org/abstracts/search?q=adversarial%20concept%20drift" title=" adversarial concept drift"> adversarial concept drift</a>, <a href="https://publications.waset.org/abstracts/search?q=account%20hijacking" title=" account hijacking"> account hijacking</a>, <a href="https://publications.waset.org/abstracts/search?q=trending%20hashtag" title=" trending hashtag"> trending hashtag</a> </p> <a href="https://publications.waset.org/abstracts/157771/towards-an-adversary-aware-ml-based-detector-of-spam-on-twitter-hashtags" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/157771.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">78</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8</span> 'Spare the Rod and Spoil the Child': The Criminal Career of an Armed Robber</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mahlogonolo%20Stephina%20Thobane">Mahlogonolo Stephina Thobane</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of the study upon which this article is based was “to evaluate the possibility of using criminal career research in the development and evaluation of crime control strategies, particularly for armed robberies.” The research employed a concurrent triangulation mixed-method approach where quantitative and qualitative data were collected concurrently but analysed separately through the use of SPSS and Atlas.ti respectively. Forty offenders incarcerated at six correctional centres around the Gauteng province of South Africa for robbery with aggravating circumstances were interviewed as research participants. Since the researcher had no prior information on the total number of the population, purposive sampling (i.e. snowballing) was executed to draw the sample. This research found that offenders launched their criminal career at a very young age of, 11 years, by committing petty crimes such as theft and then, as they grew older, they progressed to more serious and violent crimes such as vehicle hijacking and Cash-in-Transit (CIT) robberies. Thus, it is pivotal that those responsible for developing crime prevention policies focus on interrupting the root causes of crime in the early stages of one’s life in order to prevent continuation of delinquent behaviour from childhood to adolescence and adulthood. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=criminal%20career" title="criminal career">criminal career</a>, <a href="https://publications.waset.org/abstracts/search?q=robbery%20with%20aggravating%20circumstances" title=" robbery with aggravating circumstances"> robbery with aggravating circumstances</a>, <a href="https://publications.waset.org/abstracts/search?q=cash-in-transit%20robbery" title=" cash-in-transit robbery"> cash-in-transit robbery</a>, <a href="https://publications.waset.org/abstracts/search?q=criminal%20career%20research" title=" criminal career research"> criminal career research</a> </p> <a href="https://publications.waset.org/abstracts/19689/spare-the-rod-and-spoil-the-child-the-criminal-career-of-an-armed-robber" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19689.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">444</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7</span> ASEAN Our Eyes: A Strategic Information Exchange Platform on Counter-Terrorism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nila%20Febri%20Wilujeng">Nila Febri Wilujeng</a>, <a href="https://publications.waset.org/abstracts/search?q=Helda%20Risman"> Helda Risman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Enjoying stable security within its region for the last 50 years, ASEAN nowadays contends with the global context emerging dynamically, which brings about multidimensional challenges and threats such as terrorism, radicalism, armed rebellion, hijacking, and other non-traditional threats. Dealing with these circumstances, ASEAN member states tighten its capacity by enhancing regional cooperation and strategic information exchange among ASEAN member states so-called ASEAN Our Eyes. This initiative adopted for the sake of forestalling any possible threat posed by violent extremism, radicalization, and terrorism through timely strategic information exchange among ASEAN member states. By using qualitative method, this paper will utilize regional security complex and international cooperation theories in analyzing the process to examine ASEAN Our Eyes based on its terms of reference. As a result, it portrays that ASEAN Our Eyes is able to undermine the gaps in the realm of strategic information exchange in monitoring the movement of violent extremism, radicalism, foreign terrorist fighters, and crime-terror nexus. However, it remains premature as a strategic measure to encounter those threats in the years to come. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=regional%20cooperation" title="regional cooperation">regional cooperation</a>, <a href="https://publications.waset.org/abstracts/search?q=counter-terrorism" title=" counter-terrorism"> counter-terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=ASEAN%20our%20eyes" title=" ASEAN our eyes"> ASEAN our eyes</a>, <a href="https://publications.waset.org/abstracts/search?q=strategic%20information%20exchange" title=" strategic information exchange"> strategic information exchange</a> </p> <a href="https://publications.waset.org/abstracts/114932/asean-our-eyes-a-strategic-information-exchange-platform-on-counter-terrorism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/114932.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">209</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6</span> Analysis of Spamming Threats and Some Possible Solutions for Online Social Networking Sites (OSNS) </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dilip%20Singh%20Sisodia">Dilip Singh Sisodia</a>, <a href="https://publications.waset.org/abstracts/search?q=Shrish%20Verma"> Shrish Verma</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Spamming is the most common issue seen nowadays in the Internet especially in Online Social Networking Sites (like Facebook, Twitter, and Google+ etc.). Spam messages keep wasting Internet bandwidth and the storage space of servers. On social network sites; spammers often disguise themselves by creating fake accounts and hijacking user’s accounts for personal gains. They behave like normal user and they continue to change their spamming strategy. To prevent this, most modern spam-filtering solutions are deployed on the receiver side; they are good at filtering spam for end users. In this paper we are presenting some spamming techniques their behaviour and possible solutions. We have analyzed how Spammers enters into online social networking sites (OSNSs) and how they target it and the techniques they use for it. The five discussed techniques of spamming techniques which are clickjacking, social engineered attacks, cross site scripting, URL shortening, and drive by download. We have used elgg framework for demonstration of some of spamming threats and respective implementation of solutions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=online%20social%20networking%20sites" title="online social networking sites">online social networking sites</a>, <a href="https://publications.waset.org/abstracts/search?q=spam" title=" spam"> spam</a>, <a href="https://publications.waset.org/abstracts/search?q=attacks" title=" attacks"> attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=internet" title=" internet"> internet</a>, <a href="https://publications.waset.org/abstracts/search?q=clickjacking%20%2F%20likejacking" title=" clickjacking / likejacking"> clickjacking / likejacking</a>, <a href="https://publications.waset.org/abstracts/search?q=drive-by-download" title=" drive-by-download"> drive-by-download</a>, <a href="https://publications.waset.org/abstracts/search?q=URL%20shortening" title=" URL shortening"> URL shortening</a>, <a href="https://publications.waset.org/abstracts/search?q=networking" title=" networking"> networking</a>, <a href="https://publications.waset.org/abstracts/search?q=socially%20engineered%20attacks" title=" socially engineered attacks"> socially engineered attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=elgg%20framework" title=" elgg framework"> elgg framework</a> </p> <a href="https://publications.waset.org/abstracts/27207/analysis-of-spamming-threats-and-some-possible-solutions-for-online-social-networking-sites-osns" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/27207.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">348</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5</span> Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Otto%20Kakhidze">Otto Kakhidze</a>, <a href="https://publications.waset.org/abstracts/search?q=Hoda%20Alkhzaimi"> Hoda Alkhzaimi</a>, <a href="https://publications.waset.org/abstracts/search?q=Adam%20Ramey"> Adam Ramey</a>, <a href="https://publications.waset.org/abstracts/search?q=Nasir%20Memon"> Nasir Memon</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=automated%20warfare" title="automated warfare">automated warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=ethics%20of%20automation" title=" ethics of automation"> ethics of automation</a>, <a href="https://publications.waset.org/abstracts/search?q=inherent%20hijacking" title=" inherent hijacking"> inherent hijacking</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20vulnerabilities" title=" security vulnerabilities"> security vulnerabilities</a>, <a href="https://publications.waset.org/abstracts/search?q=risk" title=" risk"> risk</a>, <a href="https://publications.waset.org/abstracts/search?q=uncertainty" title=" uncertainty"> uncertainty</a> </p> <a href="https://publications.waset.org/abstracts/71567/conceptualizing-the-cyber-insecurity-risk-in-the-ethics-of-automated-warfare" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71567.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">357</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4</span> Mannosidase Alpha Class 1B Member 1 Targets F Severe Acute Respiratory Syndrome Coronavirus 2 Spike Protein and Ebola Virus Glycoprotein to Endoplasmic Reticulum-To-Lysosome-Associated Degradation by Micro-Endoplasmic Reticulum-Phagy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yong-Hui%20Zheng">Yong-Hui Zheng</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Viruses hijack host machineries to propagate and spread, which disrupts cellular homeostasis and activates various counteractive mechanisms. Infection of enveloped viruses is dependent on their fusion proteins, which bind to viral receptors to allow virus entry into cells. Fusion proteins are glycoproteins and expressed in the endoplasmic reticulum (ER) by hijacking the secretory pathway. Previously, we reported that Zaire ebolavirus (EBOV)-glycoprotein (GP) expression induces ER stress, and EBOV-GP is targeted by the calnexin cycle to macro-ER-phagy for degradation. We now report that expression of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2/SARS2)-spike (S) protein also causes ER stress, and its expression is strongly downregulated by mannosidase alpha class 1B member 1 (MAN1B1), a class I α-mannosidase from the ER. MAN1B1 co-localizes with SARS2-S in the ER, and its downregulation of SARS2-S is blocked by inhibitors targeting lysosomes and autophagy, but not proteasomes, indicating SARS2-S degradation by autolysosomes. Notably, the SARS2-S degradation does not require the core autophagy machinery including ATG3, ATG5, ATG7, and phosphatidylinositol 3-kinase catalytic subunit type 3 (PI3KC3)/vacuolar protein sorting 34 (VPS34), and instead, it requires Beclin 1 (BECN1), a core component in the PI3KC3 complex. In addition, MAN1B1 does not trigger SARS2-S polyubiquitination, and consistently, the SARS2-S degradation does not require the autophagy receptor sequestosome 1 (SQSTM1)/p62. MAN1B1 also downregulates EBOV-GP similarly, but this degradation does not require BECN1. Collectively, we conclude that MAN1B1 downregulates viral fusions by micro-ER-phagy, and importantly, we have identified BECN1-dependent and BECN1-independent mechanisms for micro-ER-phagy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Micro-ER-phagy" title="Micro-ER-phagy">Micro-ER-phagy</a>, <a href="https://publications.waset.org/abstracts/search?q=reticulophagy" title=" reticulophagy"> reticulophagy</a>, <a href="https://publications.waset.org/abstracts/search?q=fusion%20proteins" title=" fusion proteins"> fusion proteins</a>, <a href="https://publications.waset.org/abstracts/search?q=ER%20stress" title=" ER stress"> ER stress</a> </p> <a href="https://publications.waset.org/abstracts/158359/mannosidase-alpha-class-1b-member-1-targets-f-severe-acute-respiratory-syndrome-coronavirus-2-spike-protein-and-ebola-virus-glycoprotein-to-endoplasmic-reticulum-to-lysosome-associated-degradation-by-micro-endoplasmic-reticulum-phagy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/158359.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">69</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3</span> Democratization, Market Liberalization and the Raise of Vested Interests and Its Impacts on Anti-Corruption Reform in Indonesia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmad%20Khoirul%20Umam">Ahmad Khoirul Umam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper investigates the role of vested interests and its impacts on anti-corruption agenda in Indonesia following the collapse of authoritarian regime in 1998. A pervasive and rampant corruption has been believed as the main cause of the state economy’s fragility. Hence, anti-corruption measures were implemented by applying democratization and market liberalization since the establishment of a consolidated democracy which go hand in hand with a liberal market economy is convinced to be an efficacious prescription for effective anti-corruption. The reform movement has also mandated the establishment of the independent, neutral and professional special anti-corruption agency namely Corruption Eradication Commission (KPK) to more intensify the fight against the systemic corruption. This paper will examine whether these anti-corruption measures have been effective to combat corruption, and investigate to what extend have the anti-corruption efforts, especially those conducted by KPK, been impeded by the emergence of a nexus of vested interests as the side-effect of democratization and market liberalization. Based on interviews with key stakeholders from KPK, other law enforcement agencies, government, prominent scholars, journalists and NGOs in Indonesia, it is found that since the overthrow of Soeharto, anti-corruption movement in the country have become more active and serious. After gradually winning the hearth of people, KPK successfully touched the untouchable corruption perpetrators who were previously protected by political immunity, legal protection and bureaucratic barriers. However, these changes have not necessarily reduced systemic and structural corruption practices. Ironically, intensive and devastating counterattacks were frequently posed by the alignment of business actors, elites of political parties, government, and also law enforcement agencies by hijacking state’s instruments to make KPK deflated, powerless, and surrender. This paper concludes that attempts of democratization, market liberalization and the establishment of anti-corruption agency may have helped Indonesia to reduce corruption. However, it is still difficult to imply that such anti-corruption measures have fostered the more effective anti-corruption works in the newly democratized and weakly regulated liberal economic system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=vested%20interests" title="vested interests">vested interests</a>, <a href="https://publications.waset.org/abstracts/search?q=democratization" title=" democratization"> democratization</a>, <a href="https://publications.waset.org/abstracts/search?q=market%20liberalization" title=" market liberalization"> market liberalization</a>, <a href="https://publications.waset.org/abstracts/search?q=anti-corruption" title=" anti-corruption"> anti-corruption</a>, <a href="https://publications.waset.org/abstracts/search?q=Indonesia" title=" Indonesia"> Indonesia</a> </p> <a href="https://publications.waset.org/abstracts/48004/democratization-market-liberalization-and-the-raise-of-vested-interests-and-its-impacts-on-anti-corruption-reform-in-indonesia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48004.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">232</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2</span> Seafarers Safety, Watch-Keeping and Navigation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sunday%20Moses%20Ojelabi">Sunday Moses Ojelabi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Safety is the protection of the crew, passenger and equipment itself, as well as those living and working near bodies of water, from hazardous situations. To assure safety, watch keeping is paramount because neglecting your watchkeeping can lead to hazardous situations. Navigation is the assignment of a sailor to a specific route on a vessel to operate. Navigation is the process of planning, managing, and directing a vessel safely to the desired destination with the aid of intense and efficient watch keeping. Safety, i,e, all measures done to preserve the welfare of marine life, maritime infrastructure, facilities, ships, offshore installations, crew, and passengers, as well as the preservation of navigation and the ease of maritime trade, are referred to as safety measures;. When it comes to health, the absence of a proper first aid kit will affect injured sailors and passengers. Not using goggles while shipping, ear muffs, etc., in the course of maintenance can be hazardous. Watchkeeping: i.e the specific dutiies assigned to a personnel in a vessel to see to its continous smooth functionality. Your lookout or watch officer [officer on navigational duty] must be active at all times in the course of duty. Navigation refers to the technique of precisely determining a craft or vehicle's position and directing its motion along a particular course. The seafarers are not being put through regular seminars, training, and orientations. In parts of West Africa, sailors go to school without being able to secure jobs until their papers expire. For that, they won’t go for another Standard Trainning Certification and Watch keeping for Seafarers to upgrade their certificate. In light of this, they are not familiar with the new vessels in the country, and for this, they can`t meet the safety, watch keeping, and navigation standards. Also, shipping companies and ship owners are being selfish by not putting the proper things needed onboard regarding safety, watchkeeping, and navigational equipment. The questions raised in these presentations are the breakdown of the safety activities, watch keeping effectiveness, and navigational accuracy. All safety and watch keeping regulations should be applied efficiently. The problem identified includes a lack of safety instruments onboard vessels in African waters. Also, inadequate proper watchkeeping due to the excess workload on the seafarers can lead to an improper lookout, which gives room to collision, hijacking, and piracy. The impact of this research is to inform African seafarers, shipping companies, and ship owners of the necessary information concerning the safety of their lives and that of their passengers, cargo, and equipment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=standard%20of%20training" title="standard of training">standard of training</a>, <a href="https://publications.waset.org/abstracts/search?q=certification" title=" certification"> certification</a>, <a href="https://publications.waset.org/abstracts/search?q=watch%20keeping%20for%20seafarers" title=" watch keeping for seafarers"> watch keeping for seafarers</a>, <a href="https://publications.waset.org/abstracts/search?q=navigation" title=" navigation"> navigation</a>, <a href="https://publications.waset.org/abstracts/search?q=safety" title=" safety"> safety</a>, <a href="https://publications.waset.org/abstracts/search?q=watchkeeping" title=" watchkeeping"> watchkeeping</a> </p> <a href="https://publications.waset.org/abstracts/170945/seafarers-safety-watch-keeping-and-navigation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/170945.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">76</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1</span> Drones, Rebels and Bombs: Explaining the Role of Private Security and Expertise in a Post-piratical Indian Ocean</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jessica%20Kate%20Simonds">Jessica Kate Simonds</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The last successful hijacking perpetrated by Somali pirates in 2012 represented a critical turning point for the identity and brand of Indian Ocean (IO) insecurity, coined in this paper as the era of the post-piratical. This paper explores the broadening of the PMSC business model to account and contribute to the design of a new IO security environment that prioritises foreign and insurgency drone activity and Houthi rebel operations as the main threat to merchant shipping in the post-2012 era. This study is situated within a longer history of analysing maritime insecurity and also contributes a bespoke conceptual framework that understands the sea as a space that is produced and reproduced relative to existing and emerging threats to merchant shipping based on bespoke models of information sharing and intelligence acquisition. This paper also makes a prominent empirical contribution by drawing on a post-positivist methodology, data drawn from original semi-structured interviews with senior maritime insurers and active merchant seafarers that is triangulated with industry-produced guidance such as the BMP series as primary data sources. Each set is analysed through qualitative discourse and content analysis and supported by the quantitative data sets provided by the IMB Piracy Reporting center and intelligence networks. This analysis reveals that mechanisms such as the IGP&I Maritime Security Committee and intelligence divisions of PMSC’s have driven the exchanges of knowledge between land and sea and thus the reproduction of the maritime security environment through new regulations and guidance to account dones, rebels and bombs as the key challenges in the IO, beyond piracy. A contribution of this paper is the argument that experts who may not be in the highest-profile jobs are the architects of maritime insecurity based on their detailed knowledge and connections to vessels in transit. This paper shares the original insights of those who have served in critical decision making spaces to demonstrate that the development and refinement of industry produced deterrence guidance that has been accredited to the mitigation of piracy, have shaped new editions such as BMP 5 that now serve to frame a new security environment that prioritises the mitigation of risks from drones and WBEID’s from both state and insurgency risk groups. By highlighting the experiences and perspectives of key players on both land and at sea, the key finding of this paper is outlining that as pirates experienced a financial boom by profiteering from their bespoke business model during the peak of successful hijackings, the private security market encountered a similar level of financial success and guaranteed risk environment in which to prospect business. Thus, the reproduction of the Indian Ocean as a maritime security environment reflects a new found purpose for PMSC’s as part of the broader conglomerate of maritime insurers, regulators, shipowners and managers who continue to redirect the security consciousness and IO brand of insecurity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=maritime%20security" title="maritime security">maritime security</a>, <a href="https://publications.waset.org/abstracts/search?q=private%20security" title=" private security"> private security</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20intelligence" title=" risk intelligence"> risk intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20geography" title=" political geography"> political geography</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20relations" title=" international relations"> international relations</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20economy" title=" political economy"> political economy</a>, <a href="https://publications.waset.org/abstracts/search?q=maritime%20law" title=" maritime law"> maritime law</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20studies" title=" security studies"> security studies</a> </p> <a href="https://publications.waset.org/abstracts/142580/drones-rebels-and-bombs-explaining-the-role-of-private-security-and-expertise-in-a-post-piratical-indian-ocean" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/142580.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">184</span> </span> </div> </div> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>