Journal articles on the topic 'Internet Protocol Version 6'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Internet Protocol Version 6.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Frankel, Sheila, and David Green. "Internet Protocol Version 6." IEEE Security & Privacy Magazine 6, no. 3 (2008): 83–86. http://dx.doi.org/10.1109/msp.2008.65.
Full textBatra, Ayushi. "Internet Protocol version 6 (IPv6)." International Journal for Research in Applied Science and Engineering Technology V, no. XI (2017): 1869–73. http://dx.doi.org/10.22214/ijraset.2017.11270.
Full textLee, D. C., and D. L. Lough. "The Internet Protocol version 6." IEEE Potentials 17, no. 2 (1998): 11–12. http://dx.doi.org/10.1109/45.666638.
Full textHenry, Susanna S., B. Vijay Kumar, V. Santhosh Kumar, and Gurwinder Singh. "Protocol Verification of Translation in Mobile Internet Protocol Version 4 and 6." Journal of Computers 11, no. 2 (2016): 149–58. http://dx.doi.org/10.17706/jcp.11.2.149-158.
Full textBabatunde, Olabenjo, and Omar Al-Debagy. "A Comparative Review Of Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6)." International Journal of Computer Trends and Technology 13, no. 1 (2014): 10–13. http://dx.doi.org/10.14445/22312803/ijctt-v13p103.
Full textKhan et. al., Firdous Ahmad. "Performance Analysis of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) over MPLS." International Journal of Computing & Network Technology 02, no. 03 (2014): 91–99. http://dx.doi.org/10.12785/ijcnt/020303.
Full textHossain, Md, Jesmin Binti, and Md Uddin. "A Review Paper on IPv4 and IPv6: A Comprehensive Survey." American Journal of Computer Science and Technology 7, no. 4 (2024): 170–75. http://dx.doi.org/10.11648/j.ajcst.20240704.14.
Full textHassan. "ENHANCED ENCAPSULATED SECURITY PAYLOAD A NEW MECHANISM TO SECURE INTERNET PROTOCOL VERSION 6 OVER INTERNET PROTOCOL VERSION 4." Journal of Computer Science 10, no. 7 (2014): 1344–54. http://dx.doi.org/10.3844/jcssp.2014.1344.1354.
Full textMachado, Iar, Michael Stanton, and Tiago Salmito. "Internet Protocol Version 6 (IPv6) - Internet Protocol Version 4 (IPv4) Network Address, Port & Protocol Translation And Multithreaded DNS-Application Gateway." Proceedings of the Asia-Pacific Advanced Network 31 (June 1, 2011): 12. http://dx.doi.org/10.7125/apan.31.2.
Full textSingh, Abhinav, Navpreet Singh, and Vinay Bajpai. "Internet Protocol Version 6 (IPv6) - Internet Protocol Version 4 (IPv4) Network Address, Port & Protocol Translation And Multithreaded DNS-Application Gateway." Proceedings of the Asia-Pacific Advanced Network 31 (June 1, 2011): 12. http://dx.doi.org/10.7125/apan.31.21.
Full textBudiono, Fahrizal Lukman, and Riza Azmi. "Kondisi Migrasi Internet Protocol version 6 (IPv6) di Indonesia." Buletin Pos dan Telekomunikasi 9, no. 2 (2015): 149. http://dx.doi.org/10.17933/bpostel.2011.090202.
Full textKaur, Rajveer, and Raman Maini. "Study of Various Issues of Internet Protocol Version 6." International Journal of Computer Applications 12, no. 1 (2010): 19–23. http://dx.doi.org/10.5120/1642-2207.
Full textAlnile, Naseef Husam Mohammad, Yasmin Makki Mohialden, Majd S. Ahmed, and Majd S. Ahmed. "A comparative study of IP Versions 4, 5, and 6." Journal La Multiapp 2, no. 3 (2021): 10–15. http://dx.doi.org/10.37899/journallamultiapp.v2i3.390.
Full textChen, Whai‐En, and Ssu‐Hsien Li. "Client‐based Internet Protocol version 4‐Internet Protocol version 6 translation mechanism for Session Initiation Protocol multimedia services in next generation networks." IET Networks 2, no. 3 (2013): 115–23. http://dx.doi.org/10.1049/iet-net.2012.0084.
Full textBlessing, Chiadikobi, and Oghenekaro Asagba Prince. "IMPLEMENTATION OF OPEN SHORTEST PATH FIRST USING INTERNET PROTOCOL VERSION 6." International Journal of Pure & Applied Mathematical Research 1, no. 1 (2017): 51–62. https://doi.org/10.5281/zenodo.10823956.
Full textBansode, Rama. "A Review of Internet Protocol Version 6 (IPv6) Security Network." Bioscience Biotechnology Research Communications 14, no. 5 (2021): 21–26. http://dx.doi.org/10.21786/bbrc/14.5/4.
Full textLee, D. C., D. L. Lough, S. F. Midkiff, N. J. Davis, and P. E. Benchoff. "The next generation of the Internet: aspects of the Internet protocol version 6." IEEE Network 12, no. 1 (1998): 28–33. http://dx.doi.org/10.1109/65.660004.
Full textDasmen, Rahmat Novrianda, Timur Dali Purwanto, Agung Wahyudi, Muhammad Nazhrun Nabil, and Albirr DoKoety. "Design and Implementation Internet Protocol Version 6 (IPv6) Pada Jaringan Komputer SMP Muhammadiyah 6 Palembang." DoubleClick: Journal of Computer and Information Technology 6, no. 1 (2022): 1. http://dx.doi.org/10.25273/doubleclick.v6i1.11738.
Full textVenkatesh, Thamarai Kannan, and Chakravarthi Rekha. "Efficient addressing schemes for internet of things." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 4 (2022): 4415–29. https://doi.org/10.11591/ijece.v12i4.pp4415-4429.
Full textChudzik, Krzysztof, and Jan Kwiatkowski. "IPv6 in Virtualization Environments." Journal of Telecommunications and Information Technology, no. 2 (June 27, 2023): 16–23. http://dx.doi.org/10.26636/jtit.2011.2.1140.
Full textKhaleel Ibrahim Saihab, Ahmed, and Nazhat Saeed Abdulrazaq. "Building a Security System Based on Internet Protocol Version 6 Routing Header." Journal of Engineering and Applied Sciences 14, no. 11 (2019): 3674–78. http://dx.doi.org/10.36478/jeasci.2019.3674.3678.
Full textBen Saad, Leila, Cedric Chauvenet, and Bernard Tourancheau. "IPv6 (Internet Protocol version 6) heterogeneous networking infrastructure for energy efficient building." Energy 44, no. 1 (2012): 447–57. http://dx.doi.org/10.1016/j.energy.2012.06.008.
Full textDua, Arti, Vinita Jindal, and Punam Bedi. "Detecting and Locating Storage-Based Covert Channels in Internet Protocol Version 6." IEEE Access 10 (2022): 110661–75. http://dx.doi.org/10.1109/access.2022.3215132.
Full textScheffler, Thomas. "IP - Next Generation a New Version for the Internet Protocol." IFAC Proceedings Volumes 34, no. 9 (2001): 47–51. http://dx.doi.org/10.1016/s1474-6670(17)41680-6.
Full textPirovano, Umberto, Oriol Fusté, and Anna Calveras. "Leveraging IPv6 and ICMPv6 for Delay-Tolerant Networking in Deep Space." Technologies 13, no. 4 (2025): 163. https://doi.org/10.3390/technologies13040163.
Full textBdair Alghuraibawi, Adnan Hasan, Rosni Abdullah, Selvakumar Manickam, and Zaid Abdi Alkareem Alyasseri. "Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5216. http://dx.doi.org/10.11591/ijece.v11i6.pp5216-5228.
Full textAdnan, Hasan Bdair AIghuraibawi, Abdullah Rosni, Manickam Selvakumar, and Abdi Alkareem Alyasseri Zaid. "Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5216–28. https://doi.org/10.11591/ijece.v11i6.pp5216-5228.
Full textHamid, Zunainah, Sharipah Daud, Intan Shafinaz Abd. Razak, and Nurzurawani Abd. Razak. "A Comparative Study between IPv4 and IPv6." ANP Journal Of Social Sciences And Humanities 2, no. 1 (2021): 68–72. http://dx.doi.org/10.53797/anpjssh.v2i1.9.2021.
Full textSamad, Mustaffa. "Design and Testing of an Experimental IPv4-to-IPv6 Transition Network." Scientific Research Journal 3, no. 1 (2006): 27. http://dx.doi.org/10.24191/srj.v3i1.5673.
Full textSamad, Mustaffa. "Design and Testing of an Experimental IPv4-to-IPv6 Transition Network." Scientific Research Journal 3, no. 1 (2006): 27. http://dx.doi.org/10.24191/srj.v3i1.9337.
Full textParsaei, Mohammad Reza, Ahmad Reza Parnian, Samaneh Miri Rostami, and Reza Javidan. "RPL LOAD BALANCING IN INTERNET OF THINGS." IIUM Engineering Journal 18, no. 2 (2017): 137–50. http://dx.doi.org/10.31436/iiumej.v18i2.702.
Full textSupriyanto, Kumar Murugesan Raja, and Ramadass Sureswaran. "REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS." International Journal of Network Security & Its Applications (IJNSA) 4, no. 6 (2012): 173–85. https://doi.org/10.5281/zenodo.3760624.
Full textKhudoyberdiev, Jin, and Kim. "A Novel Approach towards Resource Auto-Registration and Discovery of Embedded Systems Based on DNS." Electronics 8, no. 4 (2019): 442. http://dx.doi.org/10.3390/electronics8040442.
Full textA. Naagas, Marlon, and Anazel P. Gamilla. "Denial of service attack: an analysis to IPv6 extension headers security nightmares." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 3 (2022): 2922. http://dx.doi.org/10.11591/ijece.v12i3.pp2922-2930.
Full textMarlon, A. Naagas, and P. Gamilla Anazel. "Denial of service attack: an analysis to IPv6 extension headers security nightmares." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 3 (2022): 2922–30. https://doi.org/10.11591/ijece.v12i3.pp2922-2930.
Full textSupriyanto, IznanHusainy Hasbullah, RajaKumar Murugesan, and Sureswaran Ramadass. "Survey of Internet Protocol Version 6 Link Local Communication Security Vulnerability and Mitigation Methods." IETE Technical Review 30, no. 1 (2013): 64. http://dx.doi.org/10.4103/0256-4602.107341.
Full textMir, Zubair Ahmad. "COMPARISON AND TRANSITION STUDY OF INTERNET PROTOCOL VERSION 4 & 6 (IPV4 &IPV6)." International Journal of Advanced Research in Computer Science 8, no. 7 (2017): 64–66. http://dx.doi.org/10.26483/ijarcs.v8i7.4210.
Full textMalekian, Reza, Abdul Hanan Abdullah, and Ning Ye. "Novel Packet Queuing Algorithm on Packet Delivery in Mobile Internet Protocol Version 6 Networks." Applied Mathematics & Information Sciences 7, no. 3 (2013): 881–87. http://dx.doi.org/10.12785/amis/070306.
Full textFirman, Daru April, Hartomo Kristoko Dwi, and Purnomo Hindriyanto Dwi. "IPv6 flood attack detection based on epsilon greedy optimized Q learning in single board computer." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5782–91. https://doi.org/10.11591/ijece.v13i5.pp5782-5791.
Full textHasan Kabla, Arkan Hammoodi, Mohammed Anbar, Shady Hamouda, et al. "Machine and deep learning techniques for detecting internet protocol version six attacks: a review." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5617. http://dx.doi.org/10.11591/ijece.v13i5.pp5617-5631.
Full textHammoodi, Hasan Kabla Arkan, Mohammed Anbar, Shady Hamouda, et al. "Machine and deep learning techniques for detecting internet protocol version six attacks: a review." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5617–31. https://doi.org/10.11591/ijece.v13i5.pp5617-5631.
Full textDelgado, Rosa M. "Without IPv6, there is no digital transformation for healthcare." Technology and Health Care 30, no. 2 (2022): 505–8. http://dx.doi.org/10.3233/thc-213571.
Full textKriswantono, Andi, Arief Setyanto, and Suwanto Raharjo. "Kinerja Quagga Pada Routing BGP IPv6 Menggunakan Metode Dual Stack." Creative Information Technology Journal 5, no. 1 (2019): 28. http://dx.doi.org/10.24076/citec.2017v5i1.141.
Full textTr, Reshmi, Anusha K, Sumathi V, and Pandiyarajan K. "THE IPV6 RESISTANCE - A SURVEY." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 321. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19747.
Full textDaru, April Firman, Kristoko Dwi Hartomo, and Hindriyanto Dwi Purnomo. "IPv6 flood attack detection based on epsilon greedy optimized Q learning in single board computer." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5782. http://dx.doi.org/10.11591/ijece.v13i5.pp5782-5791.
Full textLee, Hyungsoo, Jaehwan Lee, Sanghyuck Nam, and Sangoh Park. "Efficient Heterogeneous Network-Routing Method Based on Dynamic Control Middleware for Cyber-Physical System." Journal of Sensors 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/3176967.
Full textMuthi, Ahmad Abdul, Rudi Hartono, and Agus Supriatman. "Implementasi Dan Evaluasi Perbandingan IPV4 dan IPV6 dalam Jaringan Lokal dengan Metode NDCLM." e-Jurnal JUSITI (Jurnal Sistem Informasi dan Teknologi Informasi) 14, no. 1 (2025): 91–103. https://doi.org/10.36774/jusiti.v14i1.1542.
Full textMaanasaa, Sethuraman, and Mathi Senthilkumar. "Prevention of Denial-of-service in Next Generation Internet Protocol Mobility." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 1 (2018): 137–46. https://doi.org/10.11591/ijeecs.v12.i1.pp137-146.
Full textShah, Junaid Latief, Heena Farooq Bhat, and Asif Iqbal Khan. "Towards IPv6 Migration and Challenges." International Journal of Technology Diffusion 10, no. 2 (2019): 83–96. http://dx.doi.org/10.4018/ijtd.2019040105.
Full textAldmour, Ismat, Thair Al-Dala’in, Lelyzar Siregar, and Rahmat Budiarto. "SeamSAR: Seamless, Secure And Robust Handover Model for Mobile IPTV Network Using Enhanced FMIPv6." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 2 (2015): 371. http://dx.doi.org/10.11591/ijece.v5i2.pp371-378.
Full text