Search

Your search keyword '"Network protocol"' showing total 194 results

Search Constraints

Start Over You searched for: Descriptor "Network protocol" Remove constraint Descriptor: "Network protocol" Search Limiters Full Text Remove constraint Search Limiters: Full Text
194 results on '"Network protocol"'

Search Results

1. Protecting Instant Messaging Notifications against Physical Attacks: A Novel Instant Messaging Notification Protocol Based on Signal Protocol.

2. A Novel Network Protocol Syntax Extracting Method for Grammar-Based Fuzzing.

3. Mobile Handoff with 6LoWPAN Neighbour Discovery Auxiliary Communication.

4. Protecting Instant Messaging Notifications against Physical Attacks: A Novel Instant Messaging Notification Protocol Based on Signal Protocol

5. TLS Guard for TLS 1.3 zero round-trip time (0-RTT) in a distributed environment

6. A Novel Network Protocol Syntax Extracting Method for Grammar-Based Fuzzing

7. A Survey on the Development of Network Protocol Fuzzing Techniques.

8. Testcase Filtering Method Based on QRNN for Network Protocol Fuzzing

9. Data Gathering in UWA Sensor Networks: Practical Considerations and Lessons from Sea Trials.

10. Flooding with Absorption: An Efficient Protocol for Heterogeneous Bandits over Complex Networks

11. Application of network protocol improvement and image content search in mathematical calculus 3D modeling video analysis

12. Attack Graph Generation with Machine Learning for Network Security †.

13. LEO Mega-Constellations for 6G Global Coverage: Challenges and Opportunities

14. Potential Legal Challenges for Blockchain Technology in Competition Law

15. Application of network protocol improvement and image content search in mathematical calculus 3D modeling video analysis.

16. Data Gathering in UWA Sensor Networks: Practical Considerations and Lessons from Sea Trials

17. Potential Legal Challenges for Blockchain Technology in Competition Law.

18. Network layer protocol architecture for many-nets internetworking

19. SPFuzz: A Hierarchical Scheduling Framework for Stateful Network Protocol Fuzzing

20. NPVT: Network Protocol Validation Testbed for Integrated Space-Terrestrial Network

21. A DECENTRALIZED AUTHORITATIVE MULTIPLAYER ARCHITECTURE FOR GAMES ON THE EDGE.

22. OSI-INTERLAYER CONSISTENCY PROBLEM

23. TLS Guard for TLS 1.3 zero round-trip time (0-RTT) in a distributed environment.

24. A privacy preserved and credible network protocol.

25. Application of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) in Teleconference System.

26. 用于万网互联的网络层协议体系.

27. Connection Establishment Algorithm for Multidestination Protocol

28. MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols

29. Energy-Efficient and Fast MAC Protocol in UAV-Aided Wireless Sensor Networks for Time-Critical Applications

30. ORGANIZING INTERMODULAR COMMUNICATION FOR HETEROGENEOUS MODULAR MOBILE ROBOT.

31. Instrumental Supporting System for Developing and Analysis of Software-Defined Networks of Mobile Objects

32. ВИЯВЛЕННЯ ТА БЛОКУВАННЯ ПОВІЛЬНИХ DDOS-АТАК ЗА ДОПОМОГОЮ ПРОГНОЗУВАННЯ ПОВЕДІНКИ КОРИСТУВАЧА

33. A Decentralized Authoritative Multiplayer Architecture for Games on the Edge

34. Attack Graph Generation with Machine Learning for Network Security

35. Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol

36. Potential Legal Challenges for Blockchain Technology in Competition Law

37. Follicular phase estradiol administration can be the easiest way of cycle scheduling and follicular synchronization

38. Online Distributed Evolutionary Optimization of Time Division Multiple Access Protocols

39. A LoRa-based solution for multimedia communications in 'extreme environments'

40. A Practical Solution for Time Synchronization in Wireless Sensor Networks

41. Event Streaming Open Network

42. Energy-Efficient Medium Access Control Protocols for Cognitive Radio Sensor Networks: A Comparative Survey

43. Online distributed evolutionary optimization of Time Division Multiple Access protocols.

44. A Pheromone-Aided Multipath QoS Routing Protocol and its Applications in MANETs

45. Security analysis of network protocols through model checking: a case study on mobile IPv6.

46. Broadcast privacy for blockchains

47. Shared-Dining: Broadcasting Secret Shares Using Dining-Cryptographers Groups

48. Gray and Black Hole Attack Identification Using Control Packets in MANETs.

49. Energy-Efficient and Fast MAC Protocol in UAV-Aided Wireless Sensor Networks for Time-Critical Applications

50. Executivo Multi-Tarefa para Processador Frontal de Rede

Catalog

Books, media, physical & digital resources