Results 171 to 180 of about 23,021 (203)
Some of the next articles are maybe not open access.
ICMP translation within REBEKAH-IP
2004 International Conference on Communications, Circuits and Systems (IEEE Cat. No.04EX914), 2004The third generation (3G) cellular networks are starting to be deployed around the world. These networks are predicted to bring a vast number of IP enabled cellular terminals to the Internet. The limited address space of the current version of IP in the Internet, IPv4, has made the cellular industry decide to use IPv6 for these terminals.
S. Rattananon +3 more
openaire +1 more source
The application of ICMP protocol in network scanning
Proceedings of the 8th International Scientific and Practical Conference of Students, Post-graduates and Young Scientists. Modern Technique and Technologies. MTT'2002 (Cat. No.02EX550), 2004The application of ICMP protocol in network scanning is presented. We analyze the characteristics of ICMP packets and the current detecting methods, and brings forward some new methods and OS fingerprint recognition. An OS detection model based on ICMP is described later.
null Jiang Wei-hua +2 more
openaire +1 more source
Malicious ICMP Tunneling: Defense against the Vulnerability
2003This paper presents a systematic solution to the problem of using ICMP tunneling for covert channel. ICMP is not multiplexed via port numbers and the data part of the ICMP packet provides considerable bandwidth for malicious covert channels. These factors make it an integral part of many malicious software like remote access and denial of service ...
Abhishek Singh +3 more
openaire +1 more source
ICMP Flood Attacks: A Vulnerability Analysis
2018The increasing rate of cyberattacks based on the DDoS principle has created various new areas of concern for information security. It has also raised a pertinent question—Are we protected against such attacks? With significant rise in the number of attacks and resulting reports of high vulnerability to ICMP flood attacks, perhaps we need to reconsider ...
Varun Chauhan, Pranav Saini
openaire +1 more source
Crystallization, X-ray diffraction analysis and structure of ICMP from Pseudomonas aeruginosa
Biochemical and Biophysical Research Communications, 2022Jichao Wang, Guangwen Lu
exaly
Bioorganicheskaia khimiia, 1994
The structures I and II were established for the O-antigens of Pseudomonas solanacearum ICMP 7942 and ICMP 8169, respectively, by means of NMR-spectroscopy, including 2D homonuclear shift-correlated spectroscopy (COSY), rotating-frame NOE spectroscopy (ROESY) and heteronuclear 13C, 1H multiquantum correlation spectroscopy (HMQC).
A S, Shashkov +5 more
openaire +1 more source
The structures I and II were established for the O-antigens of Pseudomonas solanacearum ICMP 7942 and ICMP 8169, respectively, by means of NMR-spectroscopy, including 2D homonuclear shift-correlated spectroscopy (COSY), rotating-frame NOE spectroscopy (ROESY) and heteronuclear 13C, 1H multiquantum correlation spectroscopy (HMQC).
A S, Shashkov +5 more
openaire +1 more source
Internet Control Message Protocol (ICMP)
2013Chapter 2 discusses the netlink sockets implementation and how netlink sockets are used as a communication channel between the kernel and userspace. This chapter deals with the ICMP protocol, which is a Layer 4 protocol. Userspace applications can use the ICMP protocol (to send and receive ICMP packets) by using the sockets API (the best-known example ...
openaire +1 more source

