Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,858,228 papers from all fields of science
Search
Sign In
Create Free Account
VLAN hopping
VLAN hopping is a computer security exploit, a method of attacking networked resources on a Virtual LAN (VLAN). The basic concept behind all VLAN…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Cisco IOS
Exploit (computer security)
Network security
Private VLAN
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Perancangan VLAN pada Jaringan Lokal Web Server LKP Karya Prima Menggunakan Ubuntu Server
Supiyandi Supiyandi
,
D. Kurnia
2019
Corpus ID: 214218830
Teknologi jaringan komputer menjadi sebuah kebutuhan utama setiap organisasi. Dengan jaringan komputer, perangkat yang terhubung…
Expand
2018
2018
Implementasi VLAN dan Spanning Tree Protocol Menggunakan GNS 3 dan Pengujian Sistem Keamanannya
Wahyu Saputra
,
Fajar Suryawan
2018
Corpus ID: 65066649
Pada saat ini, jaringan komputer telah banyak digunakan dalam berbagai macam bidang dan telah mengalami perkembangan yang sangat…
Expand
2018
2018
SNMP-Based Detection of VLAN Hopping Attack Risk
Kwangjun Kim
,
Manhee Lee
International Conference on Information Science…
2018
Corpus ID: 70157719
Virtual local area network (VLAN) is commonly used to divide a big network into several small network segments. Also, many adopt…
Expand
2018
2018
Security Policies to Mitigate Attacks VLAN Hopping in the Data Link Layer of LA Networks
N. Pilamunga
,
C. Mantilla
,
+4 authors
N. Layedra
KnE Engineering
2018
Corpus ID: 169410651
<jats:p>.</jats:p>
2015
2015
Konfigurasi VLAN Pada Cisco Switch Di Gedung Indosat Dengan Menggunakan Program Simulasi Cisco Packet Tracer 5.3
Yohannes Dewanto
2015
Corpus ID: 113687997
— As the development of computer network needs, required the development of a network aimed at information security, success rate…
Expand
2013
2013
Effective VTP Model for Enterprise VLAN Security
Rajiv O. Verma
,
S. Shriramwar
International Conference on Communication Systems…
2013
Corpus ID: 17907348
VLAN's are widely used in today's enterprise networks to improve scalability & flexibility at core, distribution and access…
Expand
2012
2012
Towards Safe and Optimal Network Designs Based on Network Security Requirements
Nihel Ben Youssef
,
A. Bouhoula
IEEE 11th International Conference on Trust…
2012
Corpus ID: 17059739
Network security requirements are generally regarded once network topology is implemented. In particular, once firewalls are…
Expand
Review
2012
Review
2012
S TORE F ORMAT C HOICE AND S HOPPING T RIP TYPES
Thomas Reutterer
2012
Corpus ID: 2324458
Purpose: The purpose of the paper is to identify store format attributes that impact on store format choice when consumers…
Expand
2009
2009
Switch over implementation and analysis for hybrid wireless network of optical wireless and GHz links
F. Nadeem
,
B. Geiger
,
+5 authors
G. Kandus
Wireless Telecommunications Symposium
2009
Corpus ID: 15293398
High bandwidth optical wireless communication links are of prime importance, having tremendous potential to serve for the future…
Expand
2005
2005
Observer Backstepping for Height Control of a Resonance Hopping Robot
R. Fernández
,
T. Akinfiev
,
M. Armada
International Conference on Climbing and Walking…
2005
Corpus ID: 27254533
This paper addresses the height control problem of a one-legged resonance hopping robot. The particular construction of the robot…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE