Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,180,267 papers from all fields of science
Search
Sign In
Create Free Account
IP fragmentation attack
Known as:
Fragmentation attack
, IP Fragmentation Attackes
, IP fragmentation attacks
IP fragmentation is the process of breaking up a single Internet Protocol (IP) datagram into multiple packets of smaller size. Every network link has…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Datagram
Exploit (computer security)
Firewall (computing)
Internet
Expand
Broader (1)
Internet security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Evasion Techniques Efficiency Over The IPS/IDS Technology
Hakan Kılıç
,
Neşet Sertaç Katal
,
A. Selçuk
4th International Conference on Computer Science…
2019
Corpus ID: 208213223
Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) are the first line of the defense of cyber-environment…
Expand
2016
2016
IoT–Cloud collaboration to establish a secure connection for lightweight devices
Jiye Park
,
Hye-Jin Kwon
,
Namhi Kang
Wireless networks
2016
Corpus ID: 27815270
Internet of Things (IoT) technologies allow everyday objects including small devices in sensor networks to be capable of…
Expand
2016
2016
OPC Communication Protection Method Based on Access Control and Anomaly Traffic Detection
Yanchuan Guo
,
Chao Cheng
,
X. Xin
,
Yucen Xie
IEEE International Conference on Internet of…
2016
Corpus ID: 25376183
The OPC Classic protocol is commonly applied in Industrial control systems, which greatly improve the efficiency of data sharing…
Expand
2013
2013
Security implication and detection of threats due to manipulating IPv6 extension headers
Monali Mavani
,
L. Ragha
IEEE India Conference
2013
Corpus ID: 19633719
Use of IPv6 protocol is increasing due to lack of address space in IPv4 protocol. Along with increased address space, IPv6 also…
Expand
Review
2012
Review
2012
AirPTWFrag: A New Wireless Attack
R. S. Dhaka
,
Arvind Dhaka
,
Priyank Singh Hada
2012
Corpus ID: 61821206
one of the issues with corporate wireless networks in general, and WLANs in particular, involves the need for security. Several…
Expand
2010
2010
NoMark: A Novel Method for Copyright Protection of Digital Videos without Embedding Data
Aditya Vashistha
,
R. Nallusamy
,
S. Paul
IEEE International Symposium on Multimedia
2010
Corpus ID: 206985838
Copyright protection of digital media content is becoming increasingly important with increasing potential for content…
Expand
2008
2008
RFID malware fragmentation attacks
A. Sulaiman
,
M. K. Shankarapani
,
Srinivas Mukkamala
,
A. Sung
International Symposium on Collaborative…
2008
Corpus ID: 581479
With no one's expectation, radio frequency identification devices (RFID) tags can lead to a SQL injection attack, denial of…
Expand
2007
2007
Intrusion Detection System Based On The Integrity of TCP Packet
Moad Alhamaty
,
A. Yazdian
,
Fathi Al-qadasi
2007
Corpus ID: 7720152
— A common way to elude the signature-based Network Intrusion Detection System is based upon changing a recognizable attack to an…
Expand
Highly Cited
2006
Highly Cited
2006
Dynamic delamination modelling using interface elements
L. Iannucci
2006
Corpus ID: 56092572
2005
2005
The Fragmentation Attack in Practice
Andrea Bittau
2005
Corpus ID: 54499504
The 802.11 encryption standard Wired Equivalent Privacy (WEP) is still widely used today despite the numerous discussions on its…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE