Search

Your search keyword '"COMPUTER network protocols"' showing total 7,927 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Search Limiters Full Text Remove constraint Search Limiters: Full Text Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
7,927 results on '"COMPUTER network protocols"'

Search Results

251. A Firewall Policy Anomaly Detection Framework for Reliable Network Security.

252. Robust filtered Smith predictors for networked control systems with packet-based data transmission.

253. 5G-IPAKA: An Improved Primary Authentication and Key Agreement Protocol for 5G Networks.

254. IMPROVED ENERGY EFFICIENT CLUSTERING IN MANETS USING METAHEURISTIC OPTIMIZATION.

255. The dynamics of circulating SARS-CoV-2 lineages in Bogor and surrounding areas reflect variant shifting during the first and second waves of COVID-19 in Indonesia.

256. New RPL Protocol for IoT Applications.

257. Rule-Based Anomaly Detection Model with Stateful Correlation Enhancing Mobile Network Security.

258. Dynamic Analysis of Network Protocol Hiding Behavior Based on Perceptual Mining.

259. A Controller Switching Mechanism for Resilient Wireless Sensor–Actuator Networks.

260. Supermicrosurgical treatment for lymphedema: a systematic review and network meta-analysis protocol.

261. NOMA-Based Overlay Cognitive Integrated Satellite-Terrestrial Relay Networks With Secondary Network Selection.

262. Comparative effectiveness of adjunct non-pharmacological interventions on maternal and neonatal outcomes in gestational diabetes mellitus patients: A systematic review and network meta-analysis protocol of randomized controlled trials.

263. Coverage-guided differential testing of TLS implementations based on syntax mutation.

264. Performance evaluation and comparison study of adaptive MANET service location and discovery protocols for highly dynamic environments.

265. Clustered Wireless Sensor Network Assisted the Design of Intelligent Art System.

266. Network Communication Protocol Design from the Perspective of Batched Network Coding.

267. Applying Infinite Petri Nets to the Cybersecurity of Intelligent Networks, Grids and Clouds.

268. E-FLEACH: An Improved Fuzzy Based Clustering Protocol for Wireless Sensor Network.

269. Onboard coordination and scheduling of multiple autonomous satellites in an uncertain environment.

270. 天地一体化信息网络高速传输协议设计与若干关键技术研究.

271. 矿井随钻测量数据处理软件开发与应用.

272. Quality of Service in Cross Layered Framework.

273. Modelling and Simulation on Acoustic Channel of Underwater Sensor Networks.

274. A Review of P4 Programmable Data Planes for Network Security.

275. WND-Identifier: Automated and Efficient Identification of Wireless Network Devices.

276. Synchronous Transmissions in Low-Power Wireless: A Survey of Communication Protocols and Network Services.

277. Multi-Connectivity in Mobile Networks: Challenges and Benefits.

278. Research on X-Ray Inspection of Basin Insulators and Wireless Image Sensing Technology.

279. Construction of Modularized English Teaching Platform for Multimedia Wireless Network Based on NS2 Simulation Software.

280. Privacy Protection and Secondary Use of Health Data: Strategies and Methods.

281. Anomaly Detection for In-Vehicle Network Using CNN-LSTM With Attention Mechanism.

282. Application of network protocol improvement and image content search in mathematical calculus 3D modeling video analysis.

283. Monitoring of Energy Data with Seamless Temporal Accuracy Based on the Time-Sensitive Networking Standard and Enhanced µPMUs.

284. Relational Positioning Method for 2D and 3D Ad Hoc Sensor Networks in Industry 4.0.

285. Things that affects sleep quality among athletes and predicting their fitness through Internet of Things.

286. Strangely mined bitcoins: Empirical analysis of anomalies in the bitcoin blockchain transaction network.

287. A Secure and Efficient Lightweight Vehicle Group Authentication Protocol in 5G Networks.

288. Embedded Image and Video Coding Algorithm Based on Adaptive Filtering Equation.

289. FR-RED: Fractal Residual Based Real-Time Detection of the LDoS Attack.

290. Block Access Control in Wireless Blockchain Network: Design, Modeling and Analysis.

291. A META HEURISTIC HYBRID MOTH SEARCH ALGORITHM FOR OPTIMIZING LINK QUALITY AND SHORTEST PATH ROUTING IN WIRELESS SENSOR NETWORKS.

292. FQ-MEC: Fuzzy-Based Q-Learning Approach for Mobility-Aware Energy-Efficient Clustering in MANET.

293. Blockchain Network Propagation Mechanism Based on P4P Architecture.

294. ICPFuzzer: proprietary communication protocol fuzzing by using machine learning and feedback strategies.

295. Smart water grid: a review and a suggestion for water quality monitoring.

296. SKIP+: A Self-Stabilizing Skip Graph.

297. Predicting Spread Probability of Learning-Effect Computer Virus.

298. A Spontaneous Wireless Ad Hoc Trusted Neighbor Network Creation Protocol.

299. A Novel Approach for Detecting DGA-Based Botnets in DNS Queries Using Machine Learning Techniques.

300. Design, implementation, and testing of an energy consumption management system applied in Internet protocol data networks.

Catalog

Books, media, physical & digital resources