Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64

G Lencse, Y Kadobayashi - Computers & Security, 2018 - Elsevier
We are faced with the transition from IPv4 to IPv6, which will last for several years or possibly
decades. There are different IPv6 transition technologies, which enable the communication …

Theoretical suggestion of policy-based wide area network management system (wDACS system part-I)

K Odagiri, S Shimizu, M Takizawa, N Ishii - International Journal of …, 2013 - Springer
In the current Internet system, there are many problems using anonymity of the network
communication such as personal information leak and crimes using the Internet system. This …

Suggestion of the cloud type virtual policy based network management scheme for the common use between plural organizations

K Odagiri, S Shimizu, N Ishii… - 2015 18th International …, 2015 - ieeexplore.ieee.org
In the current Internet system, there are many problems using anonymity of the network
communication such as personal information leak and crimes using the Internet system. This …

EC-NTD: Efficient countermeasure against DrDoS attacks with NAPT and two-stage detection in SDN-based networks

YC Wang, CY Wu - Computer Networks, 2024 - Elsevier
Distributed reflection denial of service (DrDoS) attacks are a prevalent and troublesome form
of DDoS attack. Fake service requests trigger a flood of services responses, typically in large …

Analysis on urban collective call behavior to earthquake

X Yu, T Pei, K Gai, L Guo - … Safety and Security, and 2015 IEEE …, 2015 - ieeexplore.ieee.org
Despite recent advances in uncovering the quantitative features of human activities in
routine life, human call behavior in earthquake is still less clear. Taking the data of mobile …

[PDF][PDF] Identification of the possible security issues of the 464XLAT IPv6 transition technology

A Al-Azzawi, G Lencse - INFOCOMMUNICATIONS JOURNAL: A …, 2021 - real.mtak.hu
After the depletion of the IPv4 address pool, several technologies were invented to provide a
practical solution for this matter. The high number of IPv6 transition technologies are …

Towards the identification of the possible security issues of the 464XLAT IPv6 transition technology

A Al-Azzawi, G Lencse - 2020 43rd International Conference …, 2020 - ieeexplore.ieee.org
This paper focuses on one of the most prominent IPv6 transition technologies named
464XLAT. The aim is to analyze the security threats that this technology might face. We carry …

Estimation of the port number consumption of web browsing

G Lencse - IEICE Transactions on Communications, 2015 - search.ieice.org
Due to the depletion of the public IPv4 address pool, Internet service providers will not be
able to supply their new customers with public IPv4 addresses in the near future. Either they …

Iterative self-learning speaker and channel adaptation under various initial conditions

Y Zhao - 1995 International Conference on Acoustics, Speech …, 1995 - ieeexplore.ieee.org
A self-learning adaptation technique is presented which handles the speaker and channel
induced spectral variations without enrolment speech. At the acoustic level, the distortion …

Implementation and analysis of a remote access application on an embedded device

A Huhtamäki - 2024 - aaltodoc.aalto.fi
This thesis implements a remote access application for an embedded device to support
remote troubleshooting for product developers. To assure the reachability of the device in …