Search

Your search keyword '"IPv6"' showing total 6,897 results

Search Constraints

Start Over You searched for: Descriptor "IPv6" Remove constraint Descriptor: "IPv6"
6,897 results on '"IPv6"'

Search Results

151. Survey on Measurement Methods for IPv6 Deployment

152. Controlled DDoS Attack on IPv4/IPv6 Network Using Distributed Computing Infrastructure

153. Addressless: Enhancing IoT Server Security Using IPv6

154. Dual-Stack Network Management Through One-Time Authentication Mechanism

155. NG-RPL for Efficient P2P Routing in Low-Power Multihop Wireless Networks

156. Evaluación del tiempo de operación de un nodo inalámbrico en la transmisión de video sobre IPv6

157. IPv6 based SD-WAN deployment

158. Survey on IPv6 address scanning technology based on seed sources

159. A general way to assign IPv6 trusted address under portal authentication

160. Research and application of the IBN for the next generation internet

161. Fragmentation Attacks and Countermeasures on 6LoWPAN Internet of Things Networks: Survey and Simulation

162. Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection

163. 宽带私网双栈地址溯源的云化实现.

164. 泛在 IP 协议体系.

165. A lightweight improvement of PeDAAC protocol for 6LoWPAN in the Internet of Things.

166. Hybrid approach for migration of IPv6 to IPv4 Network for enhancing security in Virtual Private Cloud.

167. Full Network Coverage Monitoring Solutions – The netBaltic System Case

168. A Comprehensive Review for RPL Routing Protocol in Low Power and Lossy Networks

172. Neighbor Attack Detection in Internet of Things

173. Defending DDoS in the Insecure Internet of Things: A Survey

174. Real-Time QoS Performance Analysis for Multimedia Traffic in an Optical Network

175. IPv6 Security Issues—A Systematic Review

176. Performance Study of the Impact of Security on 802.11ac Networks

177. An IPv6 Flow Label Based Approach for Mobile IPTV Quality of Service

178. A New Method of IPv6 Addressing Based on RFID in Small Objects Networks

179. Detecting Distributed Denial of Service Attacks in Neighbour Discovery Protocol Using Machine Learning Algorithm Based on Streams Representation

180. I-MMST: A New Task Scheduling Algorithm in Cloud Computing

181. Demo: Do Not Trust Your Neighbors! A Small IoT Platform Illustrating a Man-in-the-Middle Attack

182. A Covert Communication Model Based on IPv6 Multicast

185. Study of the impact of the transition from IPv4 to IPv6 based on the tunneling mechanism in mobile networks.

186. IPv6 Cryptographically Generated Address: Analysis, Optimization and Protection.

187. Technological transition from IPv4 to IPv6 at SNR: A success case.

188. Sistema de Comunicación para Renderización Paralela de Volúmenes en Tiempo Real

189. Neighbor Discovery ++− a Scalable and Robust Address Auto-Configuration for Future Internet of Things Networks

190. IPv6 Transition Measurements in LTE and VHT Wi-Fi Mobile Networks

191. Escalation of Security and Privacy in Internet of Things using Advanced IPv6 Based Security Mechanism

193. A Comparative Study of Internet Protocols in MANET

197. Toward a New Extension of IPv6 Addressing to Connect Non IP Objects

198. Targeted Content Delivery to IoT Devices Using Bloom Filters

199. Workshop Multi-source Information IntelliSense Method Based on IPv6 Intelligent Terminal

200. Achieving Secure and Seamless IP Communications for Group-Oriented Software Defined Vehicular Networks

Catalog

Books, media, physical & digital resources