Search

Your search keyword '"Network protocol"' showing total 360 results

Search Constraints

Start Over You searched for: Descriptor "Network protocol" Remove constraint Descriptor: "Network protocol"
360 results on '"Network protocol"'

Search Results

1. Protecting Instant Messaging Notifications against Physical Attacks: A Novel Instant Messaging Notification Protocol Based on Signal Protocol.

2. Networking Aspects of the Electronic Health Records: Hypertext Transfer Protocol Version 2 (HTTP/2) vs HTTP/3.

3. Wi‐Fi 6‐based home area network for demand response in smart grid.

4. A Novel Network Protocol Syntax Extracting Method for Grammar-Based Fuzzing.

5. 区块链P2P网络及安全研究.

6. Mobile Handoff with 6LoWPAN Neighbour Discovery Auxiliary Communication.

7. Protecting Instant Messaging Notifications against Physical Attacks: A Novel Instant Messaging Notification Protocol Based on Signal Protocol

8. A Simulation-Driven Data Collection Method of External Wall by Integrating UAV and AR

9. TLS Guard for TLS 1.3 zero round-trip time (0-RTT) in a distributed environment

10. A Novel Network Protocol Syntax Extracting Method for Grammar-Based Fuzzing

11. A Survey on the Development of Network Protocol Fuzzing Techniques.

12. A Survey on IoT Protocol and Threat Matrix

13. Integration of IoT and Fog Computing for the Development of COVID-19 Cluster Tracking System in Urban Cities

14. Testcase Filtering Method Based on QRNN for Network Protocol Fuzzing

15. Automotive Vehicle Security Metrics

16. A Hierarchical Model of Control Logic for Simplifying Complex Networks Protocol Design

17. Shared-Dining: Broadcasting Secret Shares Using Dining-Cryptographers Groups

18. Data Gathering in UWA Sensor Networks: Practical Considerations and Lessons from Sea Trials.

19. Flooding with Absorption: An Efficient Protocol for Heterogeneous Bandits over Complex Networks

20. A Formal Method for Verifying the Ability of a Protocol to Resist Replay Attacks

21. Multipath Redundant Network Protocol Without Delivery Guarantee

22. Application of network protocol improvement and image content search in mathematical calculus 3D modeling video analysis

23. ВИЯВЛЕННЯ ТА БЛОКУВАННЯ ПОВІЛЬНИХ DDOS-АТАК ЗА ДОПОМОГОЮ ПРОГНОЗУВАННЯ ПОВЕДІНКИ КОРИСТУВАЧА.

24. Attack Graph Generation with Machine Learning for Network Security †.

25. Design and Performance Evaluation of On-Board Computer Network Protocol Stack Based on Spacecraft Operating System

26. Network Protocol Analysis Base on WeChat PC Version

27. Tiny WireGuard Tweak

28. LEO Mega-Constellations for 6G Global Coverage: Challenges and Opportunities

29. Potential Legal Challenges for Blockchain Technology in Competition Law

30. Application of network protocol improvement and image content search in mathematical calculus 3D modeling video analysis.

31. A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing.

32. Data Gathering in UWA Sensor Networks: Practical Considerations and Lessons from Sea Trials

33. Potential Legal Challenges for Blockchain Technology in Competition Law.

34. Network layer protocol architecture for many-nets internetworking

35. SPFuzz: A Hierarchical Scheduling Framework for Stateful Network Protocol Fuzzing

36. NPVT: Network Protocol Validation Testbed for Integrated Space-Terrestrial Network

37. A DECENTRALIZED AUTHORITATIVE MULTIPLAYER ARCHITECTURE FOR GAMES ON THE EDGE.

38. Research on information steganography based on network data stream.

40. OSI-INTERLAYER CONSISTENCY PROBLEM

41. Identifying and Verifying Vulnerabilities through PLC Network Protocol and Memory Structure Analysis.

42. A Variable-Length Network Encoding Protocol for Big Genomic Data

43. TLS Guard for TLS 1.3 zero round-trip time (0-RTT) in a distributed environment.

44. A Survey of Network Attacks Based on Protocol Vulnerabilities

45. A privacy preserved and credible network protocol.

46. Application of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) in Teleconference System.

47. 用于万网互联的网络层协议体系.

48. Approach to Real-Time Communications in Wi-Fi Networks.

49. An online target tracking protocol for vehicular Ad Hoc networks.

50. Connection Establishment Algorithm for Multidestination Protocol

Catalog

Books, media, physical & digital resources