Search

Your search keyword '"COMPUTER network protocols"' showing total 2,625 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Publisher springer nature Remove constraint Publisher: springer nature
2,625 results on '"COMPUTER network protocols"'

Search Results

1. A comprehensive survey of localization schemes and routing protocols with fault tolerant mechanism in UWSN- Recent progress and future prospects.

2. K-LionER: meta-heuristic approach for energy efficient cluster based routing for WSN-assisted IoT networks.

3. An empirical study of reflection attacks using NetFlow data.

4. Networking Aspects of the Electronic Health Records: Hypertext Transfer Protocol Version 2 (HTTP/2) vs HTTP/3.

5. SEKad: a scalable protocol for blockchain networks with enhanced broadcast efficiency.

6. Design of a distributed offloading and real-time data unified access platform for IoT within command and control communication networks.

7. MuChat against active attacks, passive attacks, and traffic analysis methods: a free convert chat application for instant communication on mobile.

8. Analysis and Performance Comparison of IoT Message Transfer Protocols Applying in Real Photovoltaic System.

9. Correlation-based advanced feature analysis for wireless sensor networks.

10. An energy efficient data fault prediction based clustering and routing protocol using hybrid ASSO with MERNN in wireless sensor network.

11. Analyzing the robustness of decentralized horizontal and vertical federated learning architectures in a non-IID scenario.

12. Impact of noise on data routing in flying Ad hoc networks.

13. A formal security analysis of the fast authentication procedure based on the security context in 5G networks.

14. Sdn based emergency message dissemination protocol for IoV-Fog networks.

15. UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks.

16. Using Wireless Network Sensors as a New Medium of Communication for Sustainable Eco-cultural Tourism.

17. MSLFuzzer: black-box fuzzing of SOHO router devices via message segment list inference.

18. Discovering golden ratio in the world's first five-agent network in ancient China.

19. EQRSRL: an energy-aware and QoS-based routing schema using reinforcement learning in IoMT.

20. Experimental Study of Uncertainty in Comparing Time Scales of National Standards of Kazakhstan and Russia on the Internet Using NTP Servers.

21. Implementation of SSL/TLS Security with MQTT Protocol in IoT Environment.

22. Privacy-preserving routing using jointly established protocol in IoT network environment.

23. A Q-learning-based distributed queuing Mac protocol for Internet-of-Things networks.

24. LDES: detector design for version number attack detection using linear temporal logic based on discrete event system.

25. LoRa network communication protocol based on location and time planning.

26. TCP-RLLD: TCP with reinforcement learning based loss differentiation for mobile adhoc networks.

27. A Novel Hybrid Protocol in Achieving QoS Regarding Data Aggregation and Dynamic Traffic Routing in IoT WSNs.

28. Machine learning interpretability meets TLS fingerprinting.

29. Multi-BSS Multi-User Full Duplex MAC Protocol based on AP Cooperation for the Next Generation WLAN.

30. Adaptive Data Aggregation Scheme with Optimal Hop Selection Using Optimized Distributed Voronoi-Based Cooperation with Energy-Aware Dual-Path Geographic Routing Protocol.

31. Fuzzy-based cluster routing in wireless sensor network.

32. Implementation and Evaluation of IPv6 with Compression and Fragmentation for Throughput Improvement of Internet of Things Networks over IEEE 802.15.4.

33. Performance Comparison of Wireless Body Area Network Protocol with Dual Carrier Modulations.

34. Clustering unknown network traffic with dual-path autoencoder.

35. An efficient Sheep Flock Optimization-based hybrid deep RaNN for secure and enhanced video transmission quality.

36. An adaptive centralized authentication control method to reduce association delay in the IoT 802.11ah protocol.

37. Abstracting IoT protocols using timed process algebra and SPIN model checker.

38. Design of a new CPEDSR Protocol for Optimizing the Communication in Mobile Network.

39. Blockchain-based differentiated authentication mechanism for 6G heterogeneous networks.

40. Impact Analysis of Rank Attack on RPL-Based 6LoWPAN Networks in Internet of Things and Aftermaths.

41. A Survey on Clock Synchronization in the Industrial Internet.

42. EDSF: Efficient Distributed Scheduling Function for IETF 6TiSCH-based Industrial Wireless Networks.

43. A decentralized honeypot for IoT Protocols based on Android devices.

44. Internetworking framework in underwater wireless sensor network protocol to a certain connectivity using probabilistic approaches.

45. NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices.

46. A Novel Hybrid Optimization for Cluster‐Based Routing Protocol in Information-Centric Wireless Sensor Networks for IoT Based Mobile Edge Computing.

47. Recurrent Network Based Protocol Design for Spectrum Sensing in Cognitive Users.

48. Trusted consensus protocol for blockchain networks based on fuzzy inference system.

49. A lightweight authentication and key agreement protocol for heterogeneous IoT with special attention to sensing devices and gateway.

50. Verification of RabbitMQ with Kerberos Using Timed Automata.

Catalog

Books, media, physical & digital resources