Search

Showing total 11,702 results

Search Constraints

Start Over You searched for: Topic computer network protocols Remove constraint Topic: computer network protocols Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years
11,702 results

Search Results

1. Digital Twin Technology-Based Networking Solution in Low Earth Orbit Satellite Constellations.

2. Call for Papers.

3. Using Pen and Paper to Control Networked Appliances.

4. SPLAT: a unified SIP services platform for VoIP applications<FNR></FNR><FN>An early version of the paper appeared in ICCCN 2004. </FN>.

5. Modelling of wireless TCP for short-lived flows<FNR></FNR><FN>A preliminary version of this paper has appeared in the Proceedings of the IEEE Vehicular Technology Conference (VTC) 2003-Spring, Jeju, Korea, April 2003. </FN>.

6. Call for Papers.

7. Call for Papers.

8. Call for Papers.

9. Call for Papers.

10. Measurement-based admission control scheme with priority and service classes for application in wireless IP networks<FNR></FNR><FN>This paper was partly presented at the 2002 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS2002), San Diego, CA, July 14–19, 2002. </FN>

11. Smart water grid: a review and a suggestion for water quality monitoring.

12. Adaptive MAC Protocol for Solar Energy Harvesting Based Wireless Sensor Networks in Agriculture.

13. Intrusion Detection with Unsupervised Techniques for Network Management Protocols over Smart Grids.

14. Special issue on 6G and satellite communications.

15. How to strongly link data and its medium: the paper case.

16. Concise Papers.

17. Detecting Brute Force Attacks on SSH and FTP Protocol Using Machine Learning: A Survey.

18. Enhancing network security with hybrid feedback systems in chaotic optical communication.

19. Internet of Things: Reflected on Web of Science.

20. Review paper on Leach protocal in Wireless Sensor Network.

21. Cybersecurity anatomization and assurance of industrial control systems.

22. Editorial: Long-range dependent processes: theory and applications, volume II.

23. Application of Concurrency to System Design, the Seventh Special Issue.

24. Call for Papers.

25. A Review Paper on Software Defined Networking.

26. Performance Impact of Nested Congestion Control on Transport-Layer Multipath Tunneling.

28. A Secure Opportunistic Network with Efficient Routing for Enhanced Efficiency and Sustainability.

29. Code Bad Smells: a review of current knowledge.

30. A comparative study of blockchain's largest permissionless networks.

31. Research on the optimization of communication protocol in network security protocol.

32. ECR-IoT: Energy-efficient and cluster-based routing method for WSN-based IoT using Harris hawk's and whale optimization algorithms.

33. An efficient neural network LEACH protocol to extended lifetime of wireless sensor networks.

34. Generating Payloads of Power Monitoring Systems Compliant with Power Network Protocols Using Generative Adversarial Networks.

35. 基于字段感知的文本协议灰盒模糊测试方法.

36. A contrived dataset of substation automation for cybersecurity research in the smart grid networks based on IEC61850.

37. A comprehensive survey of localization schemes and routing protocols with fault tolerant mechanism in UWSN- Recent progress and future prospects.

38. Performance Evaluation of UDP-Based Data Transmission with Acknowledgment for Various Network Topologies in IoT Environments.

39. On the Reliability of Wireless Sensor Networks with Multiple Sinks.

40. Formal analysis of some secure procedures for certificate delivery<FNR></FNR><FN>An early version of this paper appeared as ‘Automated analysis of some security mechanisms of SCEP’ by Fabio Martinelli, Marinella Petrocchi and Anna Vaccarelli in Proceedings of the Fifth International Information Security Conference (ISC 2002), (Lecture Notes in Computer Science, vol. 2433), pp. 414–427 [1], Copyright © 2002 Springer-Verlag. This revised and extended version appears here with the permission of Springer-Verlag </FN>

41. Robust position-based routing in wireless ad hoc networks with irregular transmission ranges<FNR></FNR><FN>A preliminary version of this paper appeared in the proceedings of the 5th Int. Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIALM), July 2001. </FN>

42. The Client's Side of the World-Web Web.

43. Review Paper for Improvement Life of Wireless Sensor Network using Leach Design.

44. The role of intrusion detection systems and machine in protecting industrial control systems "ICS" environments.

45. LoRa network communication protocol based on location and time planning.

46. Improving Quality of Service for Control Plane Using Optimal Routing Protocols.

47. Air Quality Supervision System using the IoT Platform.

48. The Application of Machine Learning Models in Network Protocol Vulnerability Mining.

49. Mobile virtual private networks with dynamic MIP home agent assignment<FNR></FNR><FN>A preliminary version of this paper was published in the Proceedings of IEEE Vehicular Technology Conference (Los Angeles, CA, U.S.A.), pp. 3281–3285, Sept. 2004. </FN>

50. Design and Performance Analysis of an In-Band Full-Duplex MAC Protocol for Ad Hoc Networks.