Author:
Mathi Senthilkumar,Srikanth Lingam
Reference16 articles.
1. Ullrich J, Krombholz K, Hobel H, Dabrowski A, Weippl E (2014) IPv6 security: attacks and countermeasures in a nutshell. In: 8th workshop on offensive technologies
2. Sethuraman M, Mathi S (2018) Prevention of denial-of-service in next generation internet protocol mobility. Indonesian J Elect Eng Comput Sci 12(1):137–146
3. Lu Y, Da Xu L (2018) Internet of Things (IoT) cybersecurity research: a review of current research topics. IEEE Internet Things J 6(2):2103–2115
4. Conti M, Dragoni N, Lesyk V (2016) A survey of man in the middle attacks. IEEE Commun Surv Tutor 18(3):2027–2051
5. Anbar M, Abdullah R, Saad RM, Alomari E, Alsaleem S (2016) Review of security vulnerabilities in the IPv6 neighbor discovery protocol. In: Information science and applications (ICISA). Springer, Singapore, pp 603–612
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献