Search

Your search keyword '"COMPUTER network protocols"' showing total 913 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic computer network security Remove constraint Topic: computer network security
913 results on '"COMPUTER network protocols"'

Search Results

1. Key distribution scheme for preventing key reinstallation attack in wireless networks.

2. MuChat against active attacks, passive attacks, and traffic analysis methods: a free convert chat application for instant communication on mobile.

3. SECURING CYBERSPACE AGAINST CYBERBULLYING: A WIRELESS NETWORK SECURITY PERSPECTIVE.

4. A Secure Opportunistic Network with Efficient Routing for Enhanced Efficiency and Sustainability.

5. GCM Variants with Robust Initialization Vectors.

6. An Effective Approach to Detect and Prevent ARP Spoofing Attacks on WLAN.

7. Data security in smart devices: Advancement, constraints and future recommendations.

8. ESTABLISHING HIDDEN COMMUNICATION USING COVERT CHANNEL IN THE IP TIME TO LIVE FIELD.

9. A Survey on the Development of Network Protocol Fuzzing Techniques.

10. Unknown Binary Protocol Recognition Algorithm Based on One Class of Classification and One-Dimensional CNN.

11. An efficient Sheep Flock Optimization-based hybrid deep RaNN for secure and enhanced video transmission quality.

12. Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks.

13. Design and Analysis of Area and Energy Efficient Reconfigurable Cryptographic Accelerator for Securing IoT Devices.

14. Network Communication Protocol Reverse Engineering Based on Auto-Encoder.

15. A lightweight authentication and key agreement protocol for heterogeneous IoT with special attention to sensing devices and gateway.

16. Research on the optimization of communication protocol in network security protocol.

17. Industrial Network Security: HB-MP* as an Authentication Technique for Modbus TCP.

18. SATFuzz: A Stateful Network Protocol Fuzzing Framework from a Novel Perspective.

19. The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication.

20. Imperfect forward secrecy.

21. The Application of Machine Learning Models in Network Protocol Vulnerability Mining.

22. Deep-Learning-Based Approach to Detect ICMPv6 Flooding DDoS Attacks on IPv6 Networks.

23. A Firewall Policy Anomaly Detection Framework for Reliable Network Security.

24. Rule-Based Anomaly Detection Model with Stateful Correlation Enhancing Mobile Network Security.

25. An improved anonymous DoS-resistant authentication protocol in smart city.

26. Hybrid Bird Swarm Optimized Quasi Affine Algorithm Based Node Location in Wireless Sensor Networks.

27. ZigBee Jamming.

28. EDSM-Based Binary Protocol State Machine Reversing.

29. A Review of P4 Programmable Data Planes for Network Security.

30. WND-Identifier: Automated and Efficient Identification of Wireless Network Devices.

31. A systematic review on distributed denial of service attack defense mechanisms in programmable networks.

32. Automated State-Machine- Based Analysis of Hostname Verification in IPsec Implementations.

33. Cognitive Covert Traffic Synthesis Method Based on Generative Adversarial Network.

34. ID-based, Proxy, Threshold Signature Scheme.

35. Security Verification in the Context of 5G Sensor Networks.

36. Nowhere to Hide: A Novel Private Protocol Identification Algorithm.

37. Network Performance Measurement through Machine to Machine Communication in Tele-Robotics System.

38. Classification and Recognition of Unknown Network Protocol Characteristics.

39. A Split Bloom Filter for Better Performance.

40. SLAAC Attack Detection Mechanism.

41. Novel Approach of Key Predistribution for Grid Based Sensor Networks.

42. Research on the access control protocol Priccess design of network privacy protection.

43. Computer network security evaluation simulation model based on neural network.

44. A Multi-party Quantum Key Agreement Protocol Based on Shamir's Secret Sharing.

45. Networking Named Content.

46. Revisiting the Security of Qian et al.'s Revised Tree-LSHB+ Protocol.

47. Review of different classes of RFID authentication protocols.

48. A light-weight bit commitment protocol based on unpredictable channel noise.

49. An efficient and secure RFID authentication protocol using elliptic curve cryptography.

50. A Novel Multiserver Authentication Protocol with Multifactors for Cloud Service.

Catalog

Books, media, physical & digital resources