Results 91 to 100 of about 53,372 (247)

Investigating the Agility Bias in DNS Graph Mining

open access: yes, 2017
The concept of agile domain name system (DNS) refers to dynamic and rapidly changing mappings between domain names and their Internet protocol (IP) addresses.
Leppänen, Ville, Ruohonen, Jukka
core   +1 more source

IPv6 and Homenetworking [PDF]

open access: yes, 2008
This submission focuses on highlighting the main benefits that IPv6 could bring to home networking services, based on wired and wireless architectures. Particularly wireless sensor networks (WSN) from the European IPv6 Task Force Steering Committee ’s standpoint.
openaire   +2 more sources

Enhancing road safety through misbehaviour detection in vehicle‐to‐everything systems of Korea

open access: yesIET Intelligent Transport Systems, Volume 18, Issue 11, Page 2273-2289, November 2024.
This study presents an misbehaviour detection system aimed at bolstering vehicle‐to‐everything communication safety, specifically devised to tackle both traditional and new threats, such as slander attacks and advanced attacks on the GMBD system. Validated at K‐City, it demonstrates potential in pinpointing and mitigating misbehaviours, indicating ...
Seungyoung Park   +7 more
wiley   +1 more source

Revolutionizing healthcare and medicine: The impact of modern technologies for a healthier future—A comprehensive review

open access: yesHealth Care Science, Volume 3, Issue 5, Page 329-349, October 2024.
The way medical professionals diagnose, treat, and manage diseases has changed dramatically due to several innovative technologies that have emerged in recent years. Thanks to sophisticated algorithms that examine enormous volumes of patient data to find patterns and predict outcomes, artificial intelligence (AI) and machine learning (ML) have become ...
Aswin Thacharodi   +8 more
wiley   +1 more source

Introducción a IPv6

open access: yesRevista ECIPeru, 2019
Introducción a IPv6 Introduction to IPv6 Edwin Salazar Vega Universidad Nacional de Piura DOI: https://doi.org/10.33017/RevECIPeru2011.0023/ RESUMEN Como es de conocimiento público, el pool central de IPv4 administrado por IANA se ha agotado en febrero 2011, esto significa que el sistema global de direcciones de internet se ha agotado.
openaire   +2 more sources

An Internet Heartbeat [PDF]

open access: yes, 2019
Obtaining sound inferences over remote networks via active or passive measurements is difficult. Active measurement campaigns face challenges of load, coverage, and visibility. Passive measurements require a privileged vantage point.
Allman, Mark, Beverly, Robert
core   +1 more source

I-TNT: PHONE NUMBER EXPANSION AND TRANSLATION SYSTEM FOR MANAGING INTERCONNECTIVITY ADDRESSING IN SIP PEERING [PDF]

open access: yesJournal of Engineering Science and Technology, 2015
Voice over IP (VoIP) subscribers is growing vastly in the recent years due to the ever increase in smartphones, 3G, WiFi, etc. This growth leads the VoIP service providers to peer with each other through Session Initiation Protocol (SIP) peering for low ...
A. A. KHUDHER, S. RAMADASS
doaj  

SEUI-64, bits an IPv6 addressing strategy to mitigate reconnaissance attacks

open access: yesEngineering Science and Technology, an International Journal, 2019
It has been widely assumed by the research community that the network reconnaissance attacks in IPv6 networks are unfeasible because they would take tremendous effort to perform address scanning of 264 hosts in an IPv6 subnet.
Shubair A. Abdullah
doaj   +1 more source

Mechanisms for AAA and QoS Interaction [PDF]

open access: yes, 2003
Proceedings of Third IEEE Workshop on Applications and Services in Wireless Networks, ASWN 2003. Bern, Switzerland, July 2-4, 2003.The interaction between Authentication, Authorization and Accounting (AAA) systems and the Quality of Service (QoS ...
Aguiar, Rui L.   +5 more
core   +1 more source

FAIR: Forwarding Accountability for Internet Reputability

open access: yes, 2016
This paper presents FAIR, a forwarding accountability mechanism that incentivizes ISPs to apply stricter security policies to their customers. The Autonomous System (AS) of the receiver specifies a traffic profile that the sender AS must adhere to ...
Pappas, Christos   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy