Exploiting Local IPv 4-only Access Networks to Deliver IPv 6 Service to End-users
暂无分享,去创建一个
[1] D. Punithavathani,et al. IPv 4 / IPv 6 Transition Mechanisms , 2009 .
[2] Ki-Ho Lee,et al. Malicious code detection method over IPv4/IPv6 tunneling using Naive Bayesian classifier , 2006 .
[3] Sherali Zeadally,et al. Evaluating IPv 4 to IPv 6 Transition Mechanisms , 2002 .