Results 21 to 30 of about 54,472 (238)

A Review of Scalability Issues in Software-Defined Exchange Point (SDX) Approaches: State-of-the-Art

open access: yesIEEE Access, 2021
Internet Exchange Points (IXPs) interconnect heterogeneous networks and transfer substantial traffic volumes. In the past decade, the number of IXPs has seen tremendous growth, with more operators connecting to these IXPs even though these IXPs faced ...
Abdijalil Abdullahi   +2 more
doaj   +1 more source

Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review

open access: yesIEEE Access, 2022
For many reasons, Ethereum attracts more investors, researchers, and even scammers; this is the first platform that enables the new Decentralized Applications (DApps) to run on top of the blockchain network.
Arkan Hammoodi Hasan Kabla   +6 more
doaj   +1 more source

Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller–A Review

open access: yesIEEE Access, 2020
The wide proliferation of telecommunication technologies in the last decade gives rise to the number of more sophisticated security threats. Software-Defined Networking (SDN) is a new networking architecture that isolates the network control plane from ...
Mohammad A. Aladaileh   +4 more
doaj   +1 more source

Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

open access: yesIEEE Access, 2021
Vehicular ad hoc networks (VANETs) have become increasingly common in the past decades and provides essential and efficient communication for vehicles within intelligent transportation systems. Securing the VANETs wireless communication channel is one of
Mahmood A. Al-Shareeda   +3 more
doaj   +1 more source

Password-Guessing Attack-Aware Authentication Scheme Based on Chinese Remainder Theorem for 5G-Enabled Vehicular Networks

open access: yesApplied Sciences, 2022
The new fifth-generation (5G) cellular networks dramatically improve the speed of message transmissions. Most existing authentication schemes that secure 5G communication rely heavily on the vehicle’s tamper-proof device (TPD) and roadside units (RSUs ...
Mahmood A. Al-Shareeda   +3 more
doaj   +1 more source

The Impact of IPv6 on Penetration Testing [PDF]

open access: yes, 2012
In this paper we discuss the impact the use of IPv6 has on remote penetration testing of servers and web applications. Several modifications to the penetration testing process are proposed to accommodate IPv6.
Boer, Pieter-Tjerk de   +3 more
core   +3 more sources

Authentication and Privacy Approach for DHCPv6

open access: yesIEEE Access, 2019
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) is used to allocate and distribute IPv6 addresses and network configuration parameters to DHCPv6 clients.
Ayman Al-Ani   +4 more
doaj   +1 more source

SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks

open access: yesSensors, 2021
Communications between nodes in Vehicular Ad-Hoc Networks (VANETs) are inherently vulnerable to security attacks, which may mean disruption to the system. Therefore, the security and privacy issues in VANETs are entitled to be the most important.
Mahmood A. Al-Shareeda   +3 more
doaj   +1 more source

Phase Changes in the Evolution of the IPv4 and IPv6 AS-Level Internet Topologies [PDF]

open access: yes, 2010
In this paper we investigate the evolution of the IPv4 and IPv6 Internet topologies at the autonomous system (AS) level over a long period of time.We provide abundant empirical evidence that there is a phase transition in the growth trend of the two ...
Albert   +25 more
core   +2 more sources

Deep Learning-based Algorithm for Active IPv6 Address Prediction [PDF]

open access: yesJisuanji kexue, 2023
The huge address space of IPv6 makes it difficult to achieve a global IPv6 address scan based on the existing network speed and hardware computing power.Fast IPv6 address scanning can be achieved by using address generation algorithms to predict the ...
LI Yuqiang, LI Linfeng, ZHU Hao, HOU Mengshu
doaj   +1 more source

Home - About - Disclaimer - Privacy