K Zeitz, M Cantrell, R Marchany… - IEEE Wireless …, 2018 - ieeexplore.ieee.org
This letter explores the uses of a micro moving target IPv6 defense (μMT6D). In this initial experiment we assess the power consumption overhead and detail the overall security …
Abstract Cognitive Radio Networks (CRNs) have been receiving significant research attention recently due to their ability to solve issues associated with spectrum congestion …
L Polčák, M Holkovič… - … Conference on Data …, 2013 - ieeexplore.ieee.org
For security, management and accounting, network administrators benefit from knowledge of IP and MAC address bindings. In IPv6, learning these bindings is not as straightforward as it …
The usage of 128 bit addresses with hexadecimal representation in IPv6 poses significant potential privacy issues. This paper discusses the means of allocating IPv6 addresses …
The security of powerful systems and large networks is often addressed through complex defenses. While these types of defenses offer increased security, they are resource intensive …
Society's increased use of network applications, such as email, social networking, and web browsing, creates a massive amount of information floating around in cyber space. An …
L Polčák, M Holkovič, P Matoušek - … 2013, Reykjavik, Iceland, July 29-31 …, 2014 - Springer
It is important to keep networks secure and reliable. In order to backtrack security incidents, provide accounting for offered services etc., it is necessary to know the identity of network …
The IPv6 protocol has been slowly increasing in use on the Internet. The main reason for the development of the protocol is that the address space provided by IPv4 is nearing …
L Polčák - ICETE 2014 Doctoral Consortium, 2014 - scitepress.org
The knowledge of user identity is a necessity for many network-related tasks, eg network management (Grégr et al., 2011), security incident backtracking (Scarfone et al., 2008) …