IP address management ≈ IP address management
View article
A literature review of intellectual property management in technology transfer offices: From appropriation to utilization Open
This paper presents a systematic literature review of the intersection between intellectual property (IP) management and technology transfer offices (TTOs) in the context of universities in order to understand how TTOs manage IP. IP manage…
View article
IPv6 Neighbor Discovery Protocol Specifications, Threats and Countermeasures: A Survey Open
Neighbor discovery protocol (NDP) is the core protocol of Internet protocol version 6 (IPv6) suite. The motive behind NDP is to replace address resolution protocol (ARP), router discovery, and redirect functions in Internet protocol versio…
View article
Physical Internet: First results and next challenges Open
International audience
View article
Technology Transfer: From the Research Bench to Commercialization Open
Technology transfer (TT) encompasses a variety of activities that move academic discoveries into the public sector. Part 1 of this 2-part series explored steps in acquisition of intellectual property (IP) rights (e.g., patents and copyrigh…
View article
Intellectual property strategies for green innovations - An analysis of the European Inventor Awards Open
To drive sustainability on a global scale for a carbon-neutral future, green innovations and a better understanding of how intellectual property (IP) impacts their research, development, and diffusion are needed. In this paper, we identify…
View article
D-ARP: An Efficient Scheme to Detect and Prevent ARP Spoofing Open
Nowadays, cyber-attack is a severe criminal violation, and it is one of the most active fields of research. A Man-in-the-middle attack (MITM) is a type of cyber-attack in which an unauthorized third party secretly accesses the communicatio…
View article
Integrating Intellectual Property and Sustainable Business Models: The SBM-IP Canvas Open
Companies attempt to address global sustainability challenges through innovating products, services, and business models. This paper focuses on sustainable business model (SBM) innovations as a way to systemically transform businesses towa…
View article
MIN: Co-Governing Multi-Identifier Network Architecture and Its Prototype on Operator’s Network Open
IP protocol is the core of TCP/IP network layer. However, since IP address and its Domain Name are allocated and managed by a single agency, there are risks of centralization. The semantic overload of IP address also reduces its scalabilit…
View article
A Distributed Autonomous Organization for Internet Address Management Open
The current system to manage the global pool of IP addresses is centralized in five transnational organizations, known as regional internet registries (RIRs). Each of them manages the address pool for many countries. In this paper, we pres…
View article
Innovation Policy Pluralism Open
When lawyers and scholars speak of “intellectual property,” they are generally referring to a combination of two distinct elements: an innovation incentive that promises a market based reward to producers of knowledge goods, and an allocat…
View article
Are Darknets All The Same? On Darknet Visibility for Security Monitoring Open
Darknets are sets of IP addresses that are advertised but do not host any client or server. By passively recording the incoming packets, they assist network monitoring activities. Since packets they receive are unsolicited by definition, d…
View article
The Business of Intellectual Property: A Literature Review of IP Management Research Open
Today intellectual property (IP) is constituting an increasing share of firms’ resources and IP rights (IPRs) are important sources of competitiveness. Consequently, there is an increasing interest in how to properly manage IP. IP lawyers …
View article
Distributed All-IP Mobility Management Architecture Supported by the NDN Overlay Open
Two of the most promising candidate solutions for realizing the next-generation all-IP mobile networks are Mobile IPv6 (MIPv6), which is the host-based and global mobility supporting protocol, and Proxy MIPv6 (PMIPv6), which is the network…
View article
On Enabling Technologies for the Internet of Important Things Open
The Internet of Things leverages Internet technology in cyber-physical systems (CPSs), but the protocols and principles of the Internet were designed for interacting with information systems, not cyber-physical systems. For one, timeliness…
View article
IP Geolocation Using Traceroute Location Propagation and IP Range Location Interpolation Open
Many online services, including search engines, content delivery networks, ad networks, and fraud detection utilize IP geolocation databases to map IP addresses to their physical locations. However, IP geolocation databases are often inacc…
View article
Walking into the room with IP: exploring start-ups’ IP licensing strategy Open
Purpose The purpose of this paper is to explore the trends and features of one of the most visible intellectual property (IP) management practices, IP licensing, in the context of start-ups, accessing external technology at the outset of t…
View article
Network Architecture for IEC61850-90-5 Communication: Case Study of Evaluating R-GOOSE over 5G for Communication-Based Protection Open
The smart grid includes wide-area applications in which inter-substation communication is required to realize innovative monitoring, protection, and control solutions. Internet-based data exchange, i.e., communication over Internet Protoco…
View article
Industry 4.0: Horizontal Integration and Intellectual Property Law Strategies In England Open
Intellectual Property (IP) is increasingly recognised as a paramount intangible asset influencing the value of companies, as well as their corporate strategies and management. This paper focuses on the impact of implementing Industry 4.0 (…
View article
IP dLedger - Decentralized ledger for intellectual property administration Open
With the rapid growth of big data, the applications of intellectual property (IP) rights and prior art documents are increasing rapidly. Patent examiners are usually overworked to evaluate inventions referring to a large volume of prior ar…
View article
Inferring the extent of network address port translation at public/private internet boundaries Open
This technical report describes a relatively simple method for inferring the percentage of public/private internet boundaries that utilize network address port translation (NAPT, often colloquially referred to as NAT). Estimates were obtai…
View article
Fortifying Health Care Intellectual Property Transactions With Blockchain Open
Background Intellectual property (IP) is a substantial competitive advantage in the health care industry. However, the COVID-19 pandemic highlighted the need for open innovation and collaboration for the greater good. Despite this, the ind…
View article
Handbook of Intellectual Property Research Open
The relevance of intellectual property (IP) law has increased dramatically over the last several years. Globalization, digitization, and the rise of post-industrial information-based industries have all contributed to a new prominence of I…
View article
The multiple roles that IPv6 addresses can play in today's internet Open
The Internet use IP addresses to identify and locate network interfaces of connected devices. IPv4 was introduced more than 40 years ago and specifies 32-bit addresses. As the Internet grew, available IPv4 addresses eventually became exhau…
View article
Detecting the Use of Anonymous Proxies Open
The Internet is built atop the Internet Protocol (IP) which has at its heart a unique identifier known as an IP address. Knowing the location of an IP address can be very useful in many situations such as for banks to know if a connection …
View article
NAT++: An Efficient Micro-NAT Architecture for Solving IP-Spoofing Attacks in a Corporate Network Open
The Internet Protocol (IP) version 4 (IPv4) has several known vulnerabilities. One of the important vulnerabilities is that the protocol does not validate the correctness of the source address carried in an IP packet. Users with malicious …
View article
Intellectual property audit of an organization Open
In this era of rapidly evolving Intellectual Property (IP) regimes, it is the need of the time to identify and efficiently utilize Intellectual Assets owned by an organization. It has now become a prerequisite for organizations to develop …
View article
A Secure Detection Framework for ARP, DHCP, and DoS Attacks on Kali Linux Open
Currently, the Internet is playing a vital role in educating students to boost industrial production. Various network components are employed to give a wide range of options and reliability for internet services. As the Internet continues …
View article
Design and Implementation of InBlock—A Distributed IP Address Registration System Open
The current mechanism to secure Border Gateway Protocol relies on the resource public key infrastructure (RPKI) for route origin authorization. The RPKI implements a hierarchical model that intrinsically makes lower layers in the hierarchy…
View article
SIPAV-SDN: Source Internet Protocol Address Validation for Software Defined Network Open
SDN technology is becoming every day more popular and big data centers and organizational networks have started deploying for its advantages. Current development of SDN network relies on target host IP address of packet and OFSwitches igno…
View article
IPChain: Blockchain-Based Security Protocol for IoT Address Management Servers in Smart Homes Open
The dynamic host configuration protocol (DHCP) servers are forms of an Internet of Things (IoT) address management server (IoTAMS) that gives network configuration settings to newly connected hosts. Administrators of a network may save tim…