Results 21 to 30 of about 54,472 (238)
A Review of Scalability Issues in Software-Defined Exchange Point (SDX) Approaches: State-of-the-Art
Internet Exchange Points (IXPs) interconnect heterogeneous networks and transfer substantial traffic volumes. In the past decade, the number of IXPs has seen tremendous growth, with more operators connecting to these IXPs even though these IXPs faced ...
Abdijalil Abdullahi +2 more
doaj +1 more source
Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review
For many reasons, Ethereum attracts more investors, researchers, and even scammers; this is the first platform that enables the new Decentralized Applications (DApps) to run on top of the blockchain network.
Arkan Hammoodi Hasan Kabla +6 more
doaj +1 more source
The wide proliferation of telecommunication technologies in the last decade gives rise to the number of more sophisticated security threats. Software-Defined Networking (SDN) is a new networking architecture that isolates the network control plane from ...
Mohammad A. Aladaileh +4 more
doaj +1 more source
Vehicular ad hoc networks (VANETs) have become increasingly common in the past decades and provides essential and efficient communication for vehicles within intelligent transportation systems. Securing the VANETs wireless communication channel is one of
Mahmood A. Al-Shareeda +3 more
doaj +1 more source
The new fifth-generation (5G) cellular networks dramatically improve the speed of message transmissions. Most existing authentication schemes that secure 5G communication rely heavily on the vehicle’s tamper-proof device (TPD) and roadside units (RSUs ...
Mahmood A. Al-Shareeda +3 more
doaj +1 more source
The Impact of IPv6 on Penetration Testing [PDF]
In this paper we discuss the impact the use of IPv6 has on remote penetration testing of servers and web applications. Several modifications to the penetration testing process are proposed to accommodate IPv6.
Boer, Pieter-Tjerk de +3 more
core +3 more sources
Authentication and Privacy Approach for DHCPv6
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) is used to allocate and distribute IPv6 addresses and network configuration parameters to DHCPv6 clients.
Ayman Al-Ani +4 more
doaj +1 more source
Communications between nodes in Vehicular Ad-Hoc Networks (VANETs) are inherently vulnerable to security attacks, which may mean disruption to the system. Therefore, the security and privacy issues in VANETs are entitled to be the most important.
Mahmood A. Al-Shareeda +3 more
doaj +1 more source
Phase Changes in the Evolution of the IPv4 and IPv6 AS-Level Internet Topologies [PDF]
In this paper we investigate the evolution of the IPv4 and IPv6 Internet topologies at the autonomous system (AS) level over a long period of time.We provide abundant empirical evidence that there is a phase transition in the growth trend of the two ...
Albert +25 more
core +2 more sources
Deep Learning-based Algorithm for Active IPv6 Address Prediction [PDF]
The huge address space of IPv6 makes it difficult to achieve a global IPv6 address scan based on the existing network speed and hardware computing power.Fast IPv6 address scanning can be achieved by using address generation algorithms to predict the ...
LI Yuqiang, LI Linfeng, ZHU Hao, HOU Mengshu
doaj +1 more source

