Author:
Anbar Mohammed,Abdullah Rosni,Saad Redhwan M. A.,Alomari Esraa,Alsaleem Samer
Reference20 articles.
1. Amante, S., Carpenter, B., Jiang, S., Rajahalme, J.: IPv6 flow label specification. Network Working Group Request for Comments 6437 (2011)
2. Barbhuiya, F.A., Bansal, G., Kumar, N., Biswas, S., Nandi, S.: Detection of neigh- bor discovery protocol based attacks in IPv6 network. Networking Science 2(3–4), 91–113 (2013)
3. Barbhuiya, F.A., Biswas, S., Nandi, S.: Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol. In: Proceedings of the 4th International Conference on Security of Information and Networks, pp. 111–118. ACM (2011)
4. Batiha, K., Batiha, K., AbuAli, A.: The need for ipv6. International Journal of Academic Research 3(3) (2011)
5. Caicedo, C., Joshi, J., Tuladhar, S.: IPv6 security challenges. Computer 42(2), 36–42 (2009)
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献