-
1
-
-
84964958468
-
-
Request for Comments 6550 (Proposed Standard). IETF
-
Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J., Alexander, R.: RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. Request for Comments 6550 (Proposed Standard). IETF (2012)
-
(2012)
RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks
-
-
Winter, T.1
Thubert, P.2
Brandt, A.3
Hui, J.4
Kelsey, R.5
Levis, P.6
Pister, K.7
Struik, R.8
Vasseur, J.9
Alexander, R.10
-
2
-
-
84879637029
-
Security Framework for Routing over Low power and Lossy Networks
-
work in progress
-
Tsao, T., Alexander, R., Dohler, M., Daza, V., Lozano, A.: Security Framework for Routing over Low power and Lossy Networks, IETF Requirement Draft for Routing over Low power and Lossy Networks (ROLL) (2012) (work in progress)
-
(2012)
IETF Requirement Draft for Routing over Low Power and Lossy Networks (ROLL)
-
-
Tsao, T.1
Alexander, R.2
Dohler, M.3
Daza, V.4
Lozano, A.5
-
4
-
-
84879638243
-
-
Master Thesis Report, Supcom Engineering School July
-
Boumessouer, M., Chrisment, I., Frikha, M.: Analysis of Vulnerabilities and Attacks in the RPL Routing Protocol, in French, Master Thesis Report, Supcom Engineering School (July 2012)
-
(2012)
Analysis of Vulnerabilities and Attacks in the RPL Routing Protocol, in French
-
-
Boumessouer, M.1
Chrisment, I.2
Frikha, M.3
-
5
-
-
0038562418
-
An Introduction to Computer Security
-
NIST
-
NIST: An Introduction to Computer Security: The NIST Handbook (1995)
-
(1995)
The NIST Handbook
-
-
-
6
-
-
77954885400
-
Managing Risks at Runtime in VoIP Networks and Services
-
Stiller, B., De Turck, F. (eds.) AIMS 2010. Springer, Heidelberg
-
Dabbebi, O., Badonnel, R., Festor, O.: Managing Risks at Runtime in VoIP Networks and Services. In: Stiller, B., De Turck, F. (eds.) AIMS 2010. LNCS, vol. 6155, pp. 89-92. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6155
, pp. 89-92
-
-
Dabbebi, O.1
Badonnel, R.2
Festor, O.3
-
8
-
-
35048879636
-
RheoStat: Real-Time Risk Management
-
Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. Springer, Heidelberg
-
Gehani, A., Kedem, G.: RheoStat: Real-Time Risk Management. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 296-314. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3224
, pp. 296-314
-
-
Gehani, A.1
Kedem, G.2
-
9
-
-
77954332667
-
Routing Loops in DAG-Based Low Power and Lossy Networks
-
IEEE Computer Society, Washington
-
Xie, W., Goyal, M., Hosseini, H., Martocci, J., Bashir, Y., Baccelli, E., Durresi, A.: Routing Loops in DAG-Based Low Power and Lossy Networks. In: Proc. of the 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010. IEEE Computer Society, Washington (2010)
-
(2010)
Proc. of the 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010
-
-
Xie, W.1
Goyal, M.2
Hosseini, H.3
Martocci, J.4
Bashir, Y.5
Baccelli, E.6
Durresi, A.7
-
10
-
-
85066917976
-
ns-3 RPLModule: IPv6 Routing Protocol for Low Power and Lossy Networks
-
Bartolozzi, L., Pecorella, T., Fantacci, R.: ns-3 RPLModule: IPv6 Routing Protocol for Low Power and Lossy Networks. In: Proc. of the 5th International Conference on Simulation Tools and Techniques, SIMUTOOLS 2012 (2012)
-
(2012)
Proc. of the 5th International Conference on Simulation Tools and Techniques, SIMUTOOLS 2012
-
-
Bartolozzi, L.1
Pecorella, T.2
Fantacci, R.3
|