Results 31 to 40 of about 3,289 (163)

Mitigating BGP Route Leaks With Attributes and Communities: A Stopgap Solution for Path Plausibility

open access: yesInternational Journal of Network Management, Volume 35, Issue 2, March/April 2025.
ABSTRACT The Border Gateway Protocol (BGP) is known to have serious security vulnerabilities. One of these vulnerabilities is BGP route leaks. A BGP route leak describes the propagation of route announcements beyond their intended scope, violating the Gao‐Rexford model.
Nils Höger   +2 more
wiley   +1 more source

Kondisi Migrasi Internet Protocol version 6 (IPv6) di Indonesia

open access: yesBuletin Pos dan Telekomunikasi: Media Komunikasi Ilmiah, 2011
   Sejalan dengan pertumbuhan industri Internet di Indonesia tersebut, maka kebutuhan akan alamat Internet Protocol (IP) juga pasti meningkat. Operator Internet akan membutuhkan alamat IP untuk mengembangkan layanannya hingga ke seluruh pelosok negeri ...
Fahrizal Lukman Budiono, Riza Azmi
doaj   +1 more source

IoT and Man‐in‐the‐Middle Attacks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni   +2 more
wiley   +1 more source

PERANCANGAN DAN PEMBUATAN MOBILE KALKULATOR IP ADDRESS BERBASIS ANDROID

open access: yesJurnal Teknoif Teknik Informatika Institut Teknologi Padang, 2014
Pengalamatan Internet Protocol (IP address) pada jaringan adalah hal yang mutlak harus dilakukan. Alamat IPv4 (Ip Address versi 4) akan sulit bila dilakukan pada jaringan skala besar yang memiliki beberapa kelompok jaringan di dalamnya.
Rasyidah, Hidra Amnur, Vebby Febrianto
doaj   +1 more source

Equivalence and difference of the dual device under test setup and the single device under test setup of RFC 8219

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 3, February 2025.
The throughput results of the dual DUT setup could approximate well that of the single DUT setup. Their difference followed the predictions of our theoretical considerations. However, the latency results did not always follow the theoretical expectations.
Gábor Lencse, Szabolcs Szilágyi
wiley   +1 more source

IP Address Allocation through the Lenses of Public Goods and Scarce Resources Theories

open access: yesSCRIPTed: A Journal of Law, Technology & Society, 2011
The current Internet Protocol (IP) addressing system, Internet Protocol version 4 (IPv4), is a resource with limitations. All IPv4 address blocks have now been allocated, posing a risk that not all IP address requests will be satisfied.
Rolf H. Weber and Ulrike I. Heinrich
doaj   +1 more source

A comprehensive survey on software‐defined networking for smart communities

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 1, 10 January 2025.
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary   +3 more
wiley   +1 more source

Blockchain‐Enhanced Distributed Cache Management for Top‐Level Domain Resolution Optimization

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
A distributed domain master resolution architecture based on blockchain. ABSTRACT In the current Internet era, whether the domain name system (DNS) can achieve efficient resolution is of great significance for optimizing user experience and promoting global development.
Lianjie Song, Xueshan Lin
wiley   +1 more source

Towards an IPv6-only WLCG: More successes in reducing IPv4 [PDF]

open access: yesEPJ Web of Conferences
The Worldwide Large Hadron Collider Computing Grid (WLCG) community’s deployment of dual-stack IPv6/IPv4 on its worldwide storage infrastructure has been very successful.
Attebury Garhan   +22 more
doaj   +1 more source

Towards autonomous device protection using behavioural profiling and generative artificial intelligence

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
The article proposes a novel concept of autonomous device protection based on behavioural profiling by continuously monitoring internal resource usage and exploiting a large language model to distinguish between benign and malicious behaviour. Abstract Demand for autonomous protection in computing devices cannot go unnoticed, considering the rapid ...
Sandeep Gupta, Bruno Crispo
wiley   +1 more source

Home - About - Disclaimer - Privacy