Results 21 to 30 of about 14,435 (215)
The distributed denial of service (DDoS) attack is one of the most destructive organized cyber-attacks against online services or computers on the network.
Ayman Ghaben+3 more
doaj +1 more source
A Review of Scalability Issues in Software-Defined Exchange Point (SDX) Approaches: State-of-the-Art
Internet Exchange Points (IXPs) interconnect heterogeneous networks and transfer substantial traffic volumes. In the past decade, the number of IXPs has seen tremendous growth, with more operators connecting to these IXPs even though these IXPs faced ...
Abdijalil Abdullahi+2 more
doaj +1 more source
22nd International Conference on Computing in High Energy and Nuclear Physics, CHEP 2016, San Francisco, United States, 10 Oct 2016 - 14 Oct 2016; Journal of physics / Conference Series 898(10), 102008 - (2017).
Babik, M.+19 more
openaire +3 more sources
Authentication and Privacy Approach for DHCPv6
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) is used to allocate and distribute IPv6 addresses and network configuration parameters to DHCPv6 clients.
Ayman Al-Ani+4 more
doaj +1 more source
The wide proliferation of telecommunication technologies in the last decade gives rise to the number of more sophisticated security threats. Software-Defined Networking (SDN) is a new networking architecture that isolates the network control plane from ...
Mohammad A. Aladaileh+4 more
doaj +1 more source
Vehicular ad hoc networks (VANETs) have become increasingly common in the past decades and provides essential and efficient communication for vehicles within intelligent transportation systems. Securing the VANETs wireless communication channel is one of
Mahmood A. Al-Shareeda+3 more
doaj +1 more source
WLCG and IPv6 – the HEPiX IPv6 working group
The HEPiX (http://www.hepix.org) IPv6 Working Group has been investigating the many issues which feed into the decision on the timetable for the use of IPv6 (http://www.ietf.org/rfc/rfc2460.txt) networking protocols in High Energy Physics (HEP) Computing, in particular in the Worldwide Large Hadron Collider (LHC) Computing Grid (WLCG).
Campana, S.+28 more
openaire +2 more sources
The new fifth-generation (5G) cellular networks dramatically improve the speed of message transmissions. Most existing authentication schemes that secure 5G communication rely heavily on the vehicle’s tamper-proof device (TPD) and roadside units (RSUs ...
Mahmood A. Al-Shareeda+3 more
doaj +1 more source
Communications between nodes in Vehicular Ad-Hoc Networks (VANETs) are inherently vulnerable to security attacks, which may mean disruption to the system. Therefore, the security and privacy issues in VANETs are entitled to be the most important.
Mahmood A. Al-Shareeda+3 more
doaj +1 more source
Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP)
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it vulnerable to many types of attacks, such as Router Advertisement (RA ...
Abdullah Ahmed Bahashwan+4 more
doaj +1 more source