共 15 条
[1]
Ahmed AS, 2015, 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS 2015, P271, DOI 10.1109/ICEEI.2015.7352509
[2]
AlSa'deh A., 2012, LNCS, P149
[3]
Batiha K., 2011, INT J ACAD RES, V3
[4]
Conta S. Deering, 2006, 4443 RFC
[5]
IPV4/IPV6 security and threat comparisons
[J].
INNOVATION AND CREATIVITY IN EDUCATION,
2010, 2 (02)
:5285-5291
[6]
Mohamed SS, 2005, Third International Conference on Information Technology and Applications, Vol 2, Proceedings, P665
[7]
Ndatinya Vivens, 2015, International Journal of Security and Networks, V10, P91
[8]
Prudente TL, 2012, INT J COMB OPTIM PRO, V3, P3
[9]
Qadeer Mohammed Abdul, 2010, Proceedings of the Second International Conference on Communication Software and Networks (ICCSN 2010), P313, DOI 10.1109/ICCSN.2010.104
[10]
Rafiee H., 2013, P 6 INT C SEC INF NE, P218