1-20 of 18040
Sort by
Image
Published: 03 May 2025
Figure 4 Overview of the MAP-E architecture [ 10 ].
Image
Published: 03 May 2025
Figure 5 Overview of the MAP-T architecture [ 10 ].
Image
Published: 03 May 2025
Figure 6 Abstract layer: Client, CE, PE, and Server.
Image
Published: 03 May 2025
Figure 9 New proposed method hierarchy.
Image
Published: 03 May 2025
Figure 12 DFD for the threat analysis of Lw4o6 [ 14 ].
Image
Published: 03 May 2025
Figure 13 Data flow datagram of MAP-T.
Image
Published: 03 May 2025
Figure 15 Wireshark Capture on lwB4 ens35.
Image
Published: 03 May 2025
Figure 1 Overview of the 464XLAT architecture [ 10 ].
Image
Published: 03 May 2025
Figure 3 Overview of the Lw4o6 architecture [ 10 ].
Image
Published: 03 May 2025
Figure 7 DFD for stateful PE -based technologies.
Image
Published: 03 May 2025
Figure 8 DFD for stateless PE -based technologies.
Image
Published: 03 May 2025
Figure 10 DFD for the Threat Analysis of 464XLAT [ 12 ].
Image
Published: 03 May 2025
Figure 11 DFD for the Threat Analysis of DS-Lite [ 13 ].
Journal Article
Ameen Al-Azzawi and Gábor Lencse
Published: 03 May 2025
Image
Published: 03 May 2025
Figure 2 Overview of the DS-Lite architecture [ 10 ].
Image
Published: 03 May 2025
Figure 14 Source Port exhaustion [ 14 ].
Image
Published: 30 April 2025
Figure 1 FL architecture diagram in SDN environment.
Image
Published: 30 April 2025
Figure 2 1DCNN-TransBiLSTM model architecture diagram.
Image
Published: 30 April 2025
Figure 5 The process of decrypting the aggregation model.
Image
Published: 30 April 2025
Figure 7 The impact of kernel size on detection performance.