Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

IP fragmentation attack

Known as: Fragmentation attack, IP Fragmentation Attackes, IP fragmentation attacks 
IP fragmentation is the process of breaking up a single Internet Protocol (IP) datagram into multiple packets of smaller size. Every network link has… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Internet of Things (IoT) technologies allow everyday objects including small devices in sensor networks to be capable of… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2016
2016
The OPC Classic protocol is commonly applied in Industrial control systems, which greatly improve the efficiency of data sharing… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2012
Review
2012
one of the issues with corporate wireless networks in general, and WLANs in particular, involves the need for security. Several… Expand
Is this relevant?
2010
2010
Copyright protection of digital media content is becoming increasingly important with increasing potential for content… Expand
  • table I
  • table II
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2008
2008
With no one's expectation, radio frequency identification devices (RFID) tags can lead to a SQL injection attack, denial of… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2006
2006
Existing techniques in explicit dynamic Finite Element (FE) codes for the analysis of delamination in composite structures and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
The current paper proposes a network-based Intrusion Detection System (IDS) that can efficiently detect attacks based on… Expand
Is this relevant?
2005
2005
The 802.11 encryption standard Wired Equivalent Privacy (WEP) is still widely used today despite the numerous discussions on its… Expand
Is this relevant?
2003
2003
Since IP packet reassembly requires resources, a denial of service attack can be mounted by swamping a receiver with IP fragments… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2001
2001
With the general use of network, cyber terror rages throughout the world. However, IP Fragmentation isn\`t free from its security… Expand
Is this relevant?