Author:
Rahman Rezaur,Mustafa Hossen Asiful
Subject
Management of Technology and Innovation,Physics and Astronomy (miscellaneous),Engineering (miscellaneous)
Reference25 articles.
1. A. S. Tanenbaum, Computer networks, Prentice Hall, Reading, MA, 2003.
2. A. N. A. Ali, "Comparison study between IPV4 & IPV6," International Journal of Computer Science Issues (IJCSI), 9(3), 314, 2012.
3. M. Anbar, R. Abdullah, R. M. A. Saad, E. Alomari, S. Alsaleem, "Review of Se- curity Vulnerabilities in the IPv6 Neighbor Discovery Protocol," Lecture Notes in Electrical Engineering, 603-612, 2016, doi:10.1007/978-981-10-0557-2 59.
4. S. Mathi, L. Srikanth, "A New Method for Preventing Man-in-the-Middle Attack in IPv6 Network Mobility," in Advances in Electrical and Computer Technologies, 211-220, Springer, 2020.
5. D. Plummer, "An Ethernet Address Resolution Protocol: Or Converting Net- work Protocol Addresses to 48.bit Ethernet Address for Transmission on Ether- net Hardware," 1982.