Rietz et al., 2018
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Davies et al. | IPv6 transition/co-existence security considerations | |
| US7360245B1 (en) | Method and system for filtering spoofed packets in a network | |
| US7792990B2 (en) | Remote client remediation | |
| US20080189769A1 (en) | Secure network switching infrastructure | |
| US8576845B2 (en) | Method and apparatus for avoiding unwanted data packets | |
| Woodyatt | Recommended Simple Security Capabilities in Customer Premises Equipment (CPE) for Providing Residential IPv6 Internet Service | |
| Hogg et al. | IPv6 security | |
| Ullrich et al. | {IPv6} security: Attacks and countermeasures in a nutshell | |
| Daş et al. | Common network attack types and defense mechanisms | |
| Mahmood et al. | Network security issues of data link layer: An overview | |
| Yackoski et al. | Applying self-shielding dynamics to the network architecture | |
| Rietz et al. | An SDN‐Based Approach to Ward Off LAN Attacks | |
| Abdulla | Survey of security issues in IPv4 to IPv6 tunnel transition mechanisms | |
| Convery et al. | Ipv6 and ipv4 threat comparison and best-practice evaluation (v1. 0) | |
| ElShafee et al. | Design and analysis of data link impersonation attack for wired LAN application layer services | |
| McPherson et al. | Source address validation improvement (SAVI) threat scope | |
| Barnes et al. | Technical considerations for internet service blocking and filtering | |
| Najjar et al. | Ipv6 change threats behavior | |
| Shah et al. | Security Issues in Next Generation IP and Migration Networks | |
| Sharma | Ipv6 and ipv4 security challenge analysis and best-practice scenario | |
| Liu et al. | Study on attacking and defending techniques in IPv6 networks | |
| Shanmugaraja et al. | Accessible methods to mitigate security attacks on ipv4 to ipv6 transitions | |
| Janbeglou et al. | Redirecting outgoing DNS requests toward a fake DNS server in a LAN | |
| Nikolchev et al. | Development of Recommendations for the Implementation of Integrated Security in the Corporate Network at the OSI Data Link Layer | |
| Rietz et al. | Research Article An SDN-Based Approach to Ward Off LAN Attacks |