Results 1 to 10 of about 76,542 (243)
Surfing the Internet-of-Things: Lightweight Access and Control ofWireless Sensor Networks Using Industrial Low Power Protocols [PDF]
Internet-of-Things (IoT) is emerging to play an important role in the continued advancement of information and communication technologies. To accelerate industrial application developments, the use of web services for networking applications is seen as ...
Zhengguo Sheng +2 more
doaj +4 more sources
An Efficient Method to Enhance IP Telephony Performance in IPV6 Networks [PDF]
IP telephony have played an essential role during the COVID 19 pandemic lockdown. One of the issues that lower the service level of the IP telephony solutions is the inefficient bandwidth exploitation.
Abualhaj Mosleh M. +3 more
doaj +2 more sources
Address Resolution (AR) and Duplicate Address Detection (DAD) are considered the most important processes in Neighbour Discovery Protocol (NDP), which occurs frequently from each Internet Protocol version 6 (IPv6) host communicating with other ...
Ahmed K. Al-Ani +3 more
doaj +2 more sources
An IPv6 address fast scanning method based on local domain name association [PDF]
With the increase of security issues in IPv6 networks, conducting address scanning in IPv6 networks proves beneficial for identifying potential security risks and vulnerabilities.
Yakai Fang +8 more
doaj +2 more sources
An IPv6 target generation approach based on address space forest [PDF]
IPv6 target generation techniques are crucial for Internet-wide rapid scanning of IPv6 network assets. Current algorithms are mostly limited to low-dimensional patterns (pattern dimensions $$\le$$ 4) within the IPv6 address space tree (6ASTree).
Shunlong Hao +9 more
doaj +2 more sources
Cost analysis of IPv6 distributed mobility management protocols in comparison with TFMIPv6. [PDF]
Aman M +6 more
europepmc +2 more sources
Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic [PDF]
Botnets can simultaneously control millions of Internet-connected devices to launch damaging cyber-attacks that pose significant threats to the Internet. In a botnet, bot-masters communicate with the command and control server using various communication
Saif Al-mashhadi +3 more
doaj +2 more sources
IPv6 Hitlists at Scale: Be Careful What You Wish For [PDF]
Today's network measurements rely heavily on Internet-wide scanning, employing tools like ZMap that are capable of quickly iterating over the entire IPv4 address space.
Erik C. Rye, Dave Levin
semanticscholar +1 more source
Target Acquired? Evaluating Target Generation Algorithms for IPv6 [PDF]
Internet measurements are a crucial foundation of IPv6-related research. Due to the infeasibility of full address space scans for IPv6 however, those measurements rely on collections of reliably responsive, unbiased addresses, as provided e.g., by the ...
Lion Steger +4 more
semanticscholar +1 more source
How Ready Is DNS for an IPv6-Only World? [PDF]
DNS is one of the core building blocks of the Internet. In this paper, we investigate DNS resolution in a strict IPv6-only scenario and find that a substantial fraction of zones cannot be resolved.
Florian Streibelt +6 more
semanticscholar +1 more source

