Survey of Internet Protocol Version 6 Link Local Communication Security Vulnerability and Mitigation Methods (English)
- New search for: Supriyanto
- New search for: Hasbullah, Iznan Husainy
- New search for: Murugesan, Raja Kumar
- New search for: Ramadass, Sureswaran
- New search for: Supriyanto
- New search for: Hasbullah, Iznan Husainy
- New search for: Murugesan, Raja Kumar
- New search for: Ramadass, Sureswaran
In:
IETE Technical Review
;
30
, 1
;
64-71
;
2013
- Article (Journal) / Electronic Resource
-
Title:Survey of Internet Protocol Version 6 Link Local Communication Security Vulnerability and Mitigation Methods
-
Contributors:Supriyanto ( author ) / Hasbullah, Iznan Husainy ( author ) / Murugesan, Raja Kumar ( author ) / Ramadass, Sureswaran ( author )
-
Published in:IETE Technical Review ; 30, 1 ; 64-71
-
Publisher:
- New search for: Taylor & Francis
-
Publication date:2013-01-01
-
Size:8 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 30, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Editorial CommentryKumar, M. Jagadesh et al. | 2013
- 6
-
Intelligence in Wireless Networks with Cognitive Radio Networks!Kaur, Satwant et al. | 2013
- 12
-
Review and Performance Analysis on Routing and Wavelength Assignment Approaches for Optical NetworksChatterjee, Bijoy Chand / Sarma, Nityananda / Sahu, Partha Pratim et al. | 2013
- 24
-
Algorithm and Architecture for Adaptive Motion Estimation in Video ProcessingAnand, Paul / Bharanitharan, K. / Wu, JiaJi et al. | 2013
- 31
-
An Analytical Model of Triple RESURF Device with Linear P-layer Doping ProfileHua, Tingting / Guo, Yufeng / Yu, Ying / Sheu, Gene / Yao, Jiafei et al. | 2013
- 38
-
Survey of Shadow Volume Algorithms in Computer GraphicsKolivand, Hoshang / Sunar, Mohd Shahrizal et al. | 2013
- 47
-
Facial Expression Recognition Using Local Transitional Pattern on Gabor Filtered Facial ImagesAhsan, Tanveer / Jabid, Taskeed / Chong, Ui-Pil et al. | 2013
- 53
-
An Efficient Distributed Programming Model for Mining Useful Patterns in Big DatasetsKarim, Md. Rezaul / Ahmed, Chowdhury Farhan / Jeong, Byeong-Soo / Choi, Ho-Jin et al. | 2013
- 64
-
Survey of Internet Protocol Version 6 Link Local Communication Security Vulnerability and Mitigation MethodsSupriyanto / Hasbullah, Iznan Husainy / Murugesan, Raja Kumar / Ramadass, Sureswaran et al. | 2013
- 72
-
A Review of Sense Amplifiers for Static Random Access MemoryZhu, Jiafeng / Bai, Na / Wu, Jianhui et al. | 2013