An In-Depth Analysis of the Last Twenty Years About IPv6 Security
暂无分享,去创建一个
[1] Adauto Trigueiro de Almeida Filho. Um mapeamento sistemático de mecanismos para guiar estudos empíricos em engenharia de software , 2011 .
[2] Thiemo Voigt,et al. 6LoWPAN Compressed DTLS for CoAP , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.
[3] Christoph Meinel,et al. Secure Neighbor Discovery: Review, Challenges, Perspectives, and Recommendations , 2012, IEEE Security & Privacy.
[4] Abdur Rahim Choudhary,et al. Securing IPv6 network infrastructure: A new security model , 2010, 2010 IEEE International Conference on Technologies for Homeland Security (HST).
[5] Tsuyoshi Murata,et al. {m , 1934, ACML.
[6] Rosilah Hassan,et al. IPv6 Neighbor Discovery Protocol Specifications, Threats and Countermeasures: A Survey , 2017, IEEE Access.
[7] Kai Petersen,et al. Systematic Mapping Studies in Software Engineering , 2008, EASE.
[8] Justin Zobel,et al. Writing for Computer Science , 2014, Springer London.