Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,052,923 papers from all fields of science
Search
Sign In
Create Free Account
IPv4 subnetting reference
Known as:
Subnetwork mask
In the IPv4 address space certain address blocks are specially allocated or reserved for special uses such as loopback interfaces, private networks…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Broadcast address
Classful network
Classless Inter-Domain Routing
Dot-decimal notation
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Kajian Isi Lambung Dan Pertumbuhan Ikan Lais (Cryptopterus Lais) Di Way Kiri, Tulang Bawang Barat, Lampung
Putri Dwitasari
,
Qadar Hasani
,
Rara Diantari
2017
Corpus ID: 148681947
Sungai Way Kiri memiliki spesies ikan yang beragam salah satunya adalah ikan lais (Cryptopterus lais). Populasi ikan Lais di…
Expand
2016
2016
Hidden Markov Model Based Intrusion Alert Prediction
Miriya Thanthrige
,
Udayangi Perera
2016
Corpus ID: 64268419
Intrusion detection is only a starting step in securing IT infrastructure. Prediction of intrusions is the next step to provide…
Expand
2013
2013
Detection and Prevention Method by Analyzing Malignant Code of Malignant Bot
Soeui Kim
,
D. Choi
,
Beongku An
2013
Corpus ID: 62648631
Recently, hacking is seen as a criminal activity beyond an activity associated with curiosity in the beginning. The malignant bot…
Expand
2012
2012
A kind of virtual machine IP method for managing resource of cloud computing platform
吴海玲
,
张浩
,
邓书芬
,
吴文青
2012
Corpus ID: 214815175
The present invention provides the virtual machine IP method for managing resource of a kind of cloud computing platform…
Expand
Review
2010
Review
2010
Technologies Employed to Control Access to or Use of Digital Cultural Collections: Controlled Online Collections
K. Eschenfelder
,
G. Agnew
D-Lib Magazine
2010
Corpus ID: 6718729
This article describes the results of a survey investigating the use of technological protection measure (TPM) tools to control…
Expand
2008
2008
High performance traffic shaping for DDoS mitigation
Markus Goldstein
,
Matthias Reif
,
A. Stahl
,
T. Breuel
Conference on Emerging Network Experiment and…
2008
Corpus ID: 14007194
Distributed Denial of Service (DDoS) attack mitigation systems usually generate a list of filter rules in order to block…
Expand
2005
2005
Fast rule lookup with arbitrary ip range configurations
왕빙
2005
Corpus ID: 140287682
The present invention relates to a method and system for searching for a rule with a relatively high speed related to the…
Expand
2004
2004
EVALUATION OF IPV 6 OPPORTUNITIES FOR FUTURE ACCESS NETWORK ARCHITECTURES
T. Stevens
,
K. Vlaeminck
,
+4 authors
J. Jaegher
2004
Corpus ID: 15271820
Within the IST MUSE project, a lot of research effort is devoted to the development of a future, low-cost access and edge network…
Expand
2002
2002
A SIMPLE TECHNIQUE FOR ESTIMATING THE COEFFICIENT OF PERMEABILITY OF UNSATURATED SOILS
J. P. Lobbezoo
2002
Corpus ID: 51964671
A simple technique is proposed in this paper to estimate the coefficient of permeability of unsaturated soils based solely on…
Expand
1988
1988
Wavelength tuning and switching of a coupled distributed feedback and Fabry--Perot cavity laser
Ming C. Wu
,
M. Boenke
,
M. Werner
,
F. Schiffmann
,
Y. Lo
,
S. Wang
1988
Corpus ID: 18002561
We present a theoretical analysis of a newly demonstrated semiconductor laser with coupled distributed feedback and Fabry–Perot…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required