To see the other types of publications on this topic, follow the link: File transfer protocol.

Journal articles on the topic 'File transfer protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'File transfer protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yogadharani, M., R. Sathishwar, Kamil M. Mohamed, Selavan K. Anbu, and M. Vinoth. "Gen AI Based File Transfer Using Protocols." International Journal of Innovative Science and Research Technology (IJISRT) 9, no. 12 (2024): 675–79. https://doi.org/10.5281/zenodo.14539933.

Full text
Abstract:
File transfer protocols are the backbone of digital communication, enabling seamless and efficient data exchange across networks. These protocols standardize the process of transferring files, addressing key challenges such as reliability, security, efficiency, and compatibility. As the demand for rapid and secure data exchange grows across domains, file transfer protocols play a pivotal role in ensuring smooth operations. Prominent protocols such as File Transfer Protocol (FTP), Secure File Transfer Protocol (SFTP), and Hypertext Transfer Protocol (HTTP/HTTPS) cater to specific use cases rang
APA, Harvard, Vancouver, ISO, and other styles
2

Muppa, Naveen. "Secure File Transfer Protocol Using Kiteworks." International Journal of Science and Research (IJSR) 11, no. 11 (2022): 1520–23. http://dx.doi.org/10.21275/sr24430150631.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Makushin, A. V., and A. P. Sinyavina. "COMPARISON OF FILE TRANSFER PROTOCOL AND HYPERTEXT TRANSFER PROTOCOL FOR FILE TRANSFER IN A NETWORK WITH INTERFERENCE." International Journal of Applied and Fundamental Research (Международный журнал прикладных и фундаментальных исследований), no. 4 2025 (2025): 38–42. https://doi.org/10.17513/mjpfi.13717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rajapandian, P., Gubbala Nagendra Prasad, and A. Thamizh priyan. "PRIVATE LINK TRANSFER HUB: A SECURE PROTOCOL FOR PRIVATE FILE TRANSFERS." International Scientific Journal of Engineering and Management 03, no. 12 (2024): 1–7. https://doi.org/10.55041/isjem02144.

Full text
Abstract:
This paper introduces a secure file and message transferring website, Private link transfer, designed to prioritize extreme privacy and user control. The platform enables users to send files through One- Time Temporary Links, which are both expirable and highly configurable. These links can be tailored with a range of limitations, including access duration, IP restrictions, password protection, authentication keys, custom encryption, and a defined number of allowable views. Such features ensure a high level of security and privacy, minimizing unauthorized access or prolonged data exposure. In
APA, Harvard, Vancouver, ISO, and other styles
5

Anggraini Yolandari, Nezza, Gloria Citra Hasiana Rajagukguk, Romatua Situmorang, and Dedy Kiswanto. "ANALISIS PERFORMA TRANSFER FILE MENGGUNAKAN NETWORK FILE SYSTEM (NFS) DAN FILE TRANSFER PROTOCOL (FTP) PADA RED HAT 9.0." JATI (Jurnal Mahasiswa Teknik Informatika) 8, no. 6 (2024): 12521–28. https://doi.org/10.36040/jati.v8i6.11988.

Full text
Abstract:
Kemajuan teknologi jaringan komputer telah meningkatkan kebutuhan akan protokol transfer file yang efisien dan andal, terutama dalam lingkungan jaringan lokal dan internet. Network File System (NFS) dan File Transfer Protocol (FTP) adalah dua protokol yang banyak digunakan dalam transfer file, masing-masing dengan keunggulan berbeda. Penelitian ini bertujuan untuk menganalisis perbandingan performa kedua protokol dalam penggunaan CPU, memori, dan bandwidth pada sistem operasi Red Hat 9.0, yang masih digunakan dalam beberapa lingkungan industri. Dengan metode eksperimen, pengujian dilakukan dal
APA, Harvard, Vancouver, ISO, and other styles
6

Downes, P. K. "Newsgroups/file transfer protocol." British Dental Journal 185, no. 6 (1998): 270–74. http://dx.doi.org/10.1038/sj.bdj.4809790.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tambunan, Alexander Theo Philus, Adi Prijuna Lubis, and Syartika Anggraini. "Perancangan Sistem Keamanan File Transfer Protocol Dengan Secure Socket Layer Pada Server Centos 7." J-Com (Journal of Computer) 1, no. 2 (2021): 95–102. http://dx.doi.org/10.33330/j-com.v2i1.1206.

Full text
Abstract:
Abstract: An advancement in communication technology currently has an influence on developments in data management in the joints of life, making the need for a media center something a must in digital archive storage. Data will not always be stored in personal computers, but it would be better if there was a centralized data container to be a solution in storage media, in order to prevent data loss or data backup. The term network (network) is used when there are at least two or more devices that are connected to one another. To carry out data exchange in this network, a protocol is used that
APA, Harvard, Vancouver, ISO, and other styles
8

Rajasekaran, G., S. Suman Rajest, R. Regin, M. Mohamed Sameer Ali, and S. Ramesh Kumar. "A Dual-Protocol File Transfer Application: Balancing Speed and Reliability in Peer-to-Peer Networks." International Journal of Human Computing Studies 7, no. 1 (2025): 46–59. https://doi.org/10.31149/ijhcs.v7i1.5467.

Full text
Abstract:
In today’s digital era, secure and efficient file transfer mechanisms are crucial as digital communication becomes increasingly prevalent. This paper presents a File Transfer Application that enables collaborative file sharing among multiple users over a network. The application uses a client-server architecture, integrating UDP for fast communication and TCP for secure and reliable file transfers. The server manages client registrations, maintains a dynamic table of active users, and broadcasts file availability updates, fostering real-time collaboration. Clients register with the server by s
APA, Harvard, Vancouver, ISO, and other styles
9

Tulasiram, Yadavalli. "Optimizing Network Protocol Selection for Managed File Transfer (MFT) Platforms: A Comparative Analysis." Journal of Scientific and Engineering Research 6, no. 5 (2019): 272–79. https://doi.org/10.5281/zenodo.15044812.

Full text
Abstract:
Selecting the right network protocol for Managed File Transfer (MFT) platforms is critical. The decision impacts security, performance, reliability, compatibility, and cost. Each protocol offers different strengths and weaknesses. For example, FTP is widely used but lacks strong security features. SFTP and FTPS provide better encryption but may slow down file transfers. Protocols like ATM and IP enhance speed and efficiency but may lack advanced security or compatibility with certain systems. IBM Connect:Direct, while proprietary, delivers robust reliability and performance, but at a higher co
APA, Harvard, Vancouver, ISO, and other styles
10

Rahim, Robbi, Solly Aryza, Pristisal Wibowo, et al. "Prototype File Transfer Protocol Application for LAN and Wi-Fi Communication." International Journal of Engineering & Technology 7, no. 2.13 (2018): 345. http://dx.doi.org/10.14419/ijet.v7i2.13.16917.

Full text
Abstract:
FTP (File Transfer Protocol) is one of the earliest Internet protocols developed. An FTP server can be accessed by using a URI (Universal Resource Identifier), using FTP file exchange between client and server is easier to do because the communication is done directly without going through an intermediary, for communication using FTP need to be designed an application that allows communication between the client and server directly without using the browser, for it is designed an FTP application using programming language in this case is Borland Delphi programming language, the ease of sending
APA, Harvard, Vancouver, ISO, and other styles
11

Prashanth, Kodurupati. "SFTP Alternatives for Secure File Transfers between Host Server and Clients." Journal of Scientific and Engineering Research 7, no. 10 (2020): 221–24. https://doi.org/10.5281/zenodo.11216412.

Full text
Abstract:
Secure File Transfer Protocol (SFTP) is a widely used protocol to ensure safe file transfers, but in instances when it's not set up/established on the client end, the host server has to establish an alternative method for secure file transfers. Some commonly used alternatives include setting up an HTTP mailbox, creating an IBM Sterling Mailbox (if the host uses this B2B integrator), using a cloud-storage intermediary, or MFT As A Service (MFTaaS). All these solutions require minimal setup and effort from the client end.
APA, Harvard, Vancouver, ISO, and other styles
12

Aggarwal, S., K. Sabnani, and B. Gopinath. "A New File Transfer Protocol." AT&T Technical Journal 64, no. 10 (1985): 2387–411. http://dx.doi.org/10.1002/j.1538-7305.1985.tb00009.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Rajendraprasad, Chittimalla. "Optimizing SFTP File Transfers in IBM Sterling: Addressing the Concurrent Session Limit." European Journal of Advances in Engineering and Technology 10, no. 8 (2023): 84–89. https://doi.org/10.5281/zenodo.13837409.

Full text
Abstract:
In IBM Sterling SFTP 2.0, the default limit of 10 max concurrent sessions is a significant constraint for file transfers when you upgrade sterling to 6.1.2.X. This limitation affects the efficiency of Secure File Transfer Protocol (SFTP) operations, especially for organizations handling high volumes of data. Despite this, SFTP remains widely used due to its superior ability to handle multiple file transfers compared to HTTPS. SFTP offers robust security and efficient data transfer capabilities, making it a preferred choice. Addressing the session limit through configuration adjustments and res
APA, Harvard, Vancouver, ISO, and other styles
14

Afonso, João, Cédric Caffy, Mihai Patrascoiu, et al. "An HTTP REST API for Tape-backed Storage." EPJ Web of Conferences 295 (2024): 01008. http://dx.doi.org/10.1051/epjconf/202429501008.

Full text
Abstract:
The goal of the HTTP REST API for Tape project is to provide a simple, minimalistic and uniform interface to manage data transfers between Storage Endpoints (SEs) where the source file is on tape. The project is a collaboration between the developers of WLCG storage systems (EOS+CTA, dCache, StoRM) and data transfer clients (gfal2, FTS). For some years, HTTP has been growing in popularity as the preferred data transfer protocol between many WLCG SEs. However — unlike other protocols such as XRootD and SRM — HTTP does not include a method to stage files from tape to disk prior to transfer, forc
APA, Harvard, Vancouver, ISO, and other styles
15

Bertolazzi, Marco, and Carlo Caini. "Mars to Earth Data Downloading: A Directory Synchronization Approach." Future Internet 11, no. 8 (2019): 173. http://dx.doi.org/10.3390/fi11080173.

Full text
Abstract:
This paper aims to present a possible alternative to direct file transfer in “challenged networks”, by using DTNbox, a recent application for peer-to-peer directory synchronization between DTN nodes. This application uses the Bundle Protocol (BP) to tackle long delays and link intermittency typical of challenged networks. The directory synchronization approach proposed in the paper consists of delegating the transmission of bulk data files to DTNbox, instead of modifying source applications to interface with the API of a specific BP implementation, or making use of custom scripts for file tran
APA, Harvard, Vancouver, ISO, and other styles
16

Febrian, Febrian, and Ade Hastuty. "Penerapan Algoritma Vernam Chiper Pada File Transfer Protocol Server Berbasis Php." Jurnal Sintaks Logika 3, no. 3 (2023): 45–52. http://dx.doi.org/10.31850/jsilog.v3i3.2590.

Full text
Abstract:
Pencurian data dengan metode phising, cracking dan serangan lainnya dalam jaringan yang menyebabkan pelaku dapat mengetahui username, password dan file yang diupload dan di download client, oleh karena itu, diperlukan algoritma yang dapat melakukan enkripsi terhadap file yang akan dikirim. File Transfer Protocol (FTP) masih menjadi metode yang sering dugunakan dalam kegiatan pertukaran data atau file karena memiliki keunggulan dalam pengiriman file besar dalam jaringan internet. Karena ukuran file yang dapat dikirim media lain terbatas contohnya media yang sering digunakan yaitu email.. Peneli
APA, Harvard, Vancouver, ISO, and other styles
17

Pradana, Bagus Satria, Reza Pahlevi, and Bowo Sumarjono. "IMPLEMENTASI FTP SERVER DENGAN METODE TRANSFER LAYER SECURITY UNTUK KEAMANAN TRANSFER DATA MENGGUNAKAN CENTOS 5.8." JURNAL COMPUTECH & BISNIS 12, no. 2 (2018): 150–53. https://doi.org/10.5281/zenodo.3373761.

Full text
Abstract:
<em>Information needed in life, to get information and exchange information needed is easy to do anytime and anywhere. File and data information, computer network is one of the important things for transfer information. One of the media that can be used is FTP (File Transfer Protocol), an application to exchange data between clients and servers on a network, by means of clients uploading files stored on the server hard disk and accessible through clients connected to the internet network.</em> <em>Through the development of current technology, important files that are uploaded and downloaded a
APA, Harvard, Vancouver, ISO, and other styles
18

Krishna, Murali, Pradeep Jamwal, K. S. R. Chaitanya, and B. Vinod Kumar. "Secure File Multi Transfer Protocol Design." Journal of Software Engineering and Applications 04, no. 05 (2011): 311–15. http://dx.doi.org/10.4236/jsea.2011.45034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Ruwaida, Devi, and Dian Kurnia. "RANCANG BANGUN FILE TRANSFER PROTOCOL (FTP) DENGAN PENGAMANAN OPEN SSL PADA JARINGAN VPN MIKROTIK DI SMK DWIWARNA." Computer Engineering, Science and System Journal 3, no. 1 (2018): 45. http://dx.doi.org/10.24114/cess.v3i1.8267.

Full text
Abstract:
File Transfer Protocol (FTP) server merupakan jenis sistem yang menghubungkan hak pengakses (client) dan penyedia (server) dalam melakukan pertukaran data yang melewati port 21, yang semula ftp server berjalan pada protocol yang tidak terlindungi di dalam port 21, kemudian dengan OpenSSL ini di amankan agar data dapat sampai ke tujuan. Pada penelitian ini akan dibangun Rancang Bangun File Transfer Protocol (Ftp) Dengan Pengamanan Open Ssl Pada Jaringan Vpn Mikrotik Di Smk Dwiwarna yang akan di konfigurasi pada debian 9.1 dengan di tambahnya pengaman sertifikat ssl , dengan harapan melindungi p
APA, Harvard, Vancouver, ISO, and other styles
20

Sofyan and Yessy Asri. "Implementation of File Sharing and Remote Desktop Connection (RDC) by Utilizing Local Area Network (LAN)." Jurnal Inotera 9, no. 2 (2024): 314–22. http://dx.doi.org/10.31572/inotera.vol9.iss2.2024.id366.

Full text
Abstract:
The exchange of information between devices in a network is very important for efficiency and collaboration. One technology that supports the exchange of information is File Sharing and Remote Desktop Connection (RDC). This research aims to implement these two technologies in a Local Area Network (LAN) to facilitate file exchange and remote access to computer desktops. File sharing allows users to easily share data and resources between computers on a network. This study examines various methods and protocols used in file sharing, such as SMB (Server Message Block) and FTP (File Transfer Proto
APA, Harvard, Vancouver, ISO, and other styles
21

Robinson, Lyn. "Volume 2, transferring files with file transfer protocol (FTP)." International Journal of Information Management 14, no. 5 (1994): 390–91. http://dx.doi.org/10.1016/0268-4012(94)90082-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Subhani, Shaik. "Enhancing Data Security with Secure FTP." European Journal of Advances in Engineering and Technology 9, no. 9 (2022): 56–60. https://doi.org/10.5281/zenodo.11898895.

Full text
Abstract:
Secure FTP (File Transfer Protocol) stands as a cornerstone in modern data exchange, providing a robust mechanism for secure file transfers over networks. This abstract delves into the fundamental principles and key features of Secure FTP, shedding light on its pivotal role in safeguarding data integrity and confidentiality. Secure FTP encompasses two primary implementations: FTPS (FTP Secure) and SFTP (SSH File Transfer Protocol), each offering distinct encryption methods and authentication mechanisms. FTPS extends the traditional FTP protocol with Transport Layer Security (TLS) or Secure Soc
APA, Harvard, Vancouver, ISO, and other styles
23

Sahputra, Mahandika Dias, and I. Made Suartana. "Implementasi FTP Server Dengan Performa Secure File Transfer Protocol Berbasis Virtualiasasi Dan Container." Journal of Informatics and Computer Science (JINACS) 6, no. 01 (2024): 284–96. https://doi.org/10.26740/jinacs.v6n01.p284-296.

Full text
Abstract:
Dalam upaya memanfaatkan jaringan komputer, File Transfer Protocol (FTP) merupakan metode pilihan yang tepat dalam penyimpanan data dengan kecepatan transfer yang lebih baik, terutama file berukuran besar, namun seiring dengan semakinaberkembangnya teknologi, semakin banyak alat-alat yang digunakan untuk melakukan kejahatan termasuk penyerangan, seperti Sniffing contohnya. Sniffing dilakukan dengan memantau atau menganalisa paketadata yang dikirim kan dari komputer client ke komputer server melalui jaringan komputer dan merupakan tindakan hacking yang paling mudah dan sulit diantisipasi dengan
APA, Harvard, Vancouver, ISO, and other styles
24

Posner, E., and Z. Reichstein. "Configurations for File Transfer Protocol Error Protection." IEEE Transactions on Communications 34, no. 3 (1986): 294–97. http://dx.doi.org/10.1109/tcom.1986.1096527.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Daka, J. S. J., and A. J. Waters. "A high performance broadcast file transfer protocol." ACM SIGCOMM Computer Communication Review 18, no. 4 (1988): 274–81. http://dx.doi.org/10.1145/52325.52352.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Liu, Kang, Li Shen Yang, and Yong Li Tang. "The Research and Implementation of Safety Isolation System SNMP Agent." Advanced Materials Research 971-973 (June 2014): 1998–2003. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1998.

Full text
Abstract:
In order to monitor and control the security isolation system remotely, this paper analyzes the implementation technology of simple network management protocol (SNMP) and secure file transfer protocol (SFTP), aiming at the problem that SNMP can not send a large amount of data, proposes an approach that extends the Manager/Agent model of SNMP, with customing flag OID variables and manager configure the file transfer-realated OID variables adaptively in the MIB of SNMP agent, call the SFTP client embedded SNMP agent to upload and download the configurati on file from specifies designated SFTP se
APA, Harvard, Vancouver, ISO, and other styles
27

M, Indushree, Manjit Kaur, Manish Raj, Shashidhara R, and Heung-No Lee. "Cross Channel Scripting and Code Injection Attacks on Web and Cloud-Based Applications: A Comprehensive Review." Sensors 22, no. 5 (2022): 1959. http://dx.doi.org/10.3390/s22051959.

Full text
Abstract:
Cross channel scripting (XCS) is a common web application vulnerability, which is a variant of a cross-site scripting (XSS) attack. An XCS attack vector can be injected through network protocol and smart devices that have web interfaces such as routers, photo frames, and cameras. In this attack scenario, the network devices allow the web administrator to carry out various functions related to accessing the web content from the server. After the injection of malicious code into web interfaces, XCS attack vectors can be exploited in the client browser. In addition, scripted content can be inject
APA, Harvard, Vancouver, ISO, and other styles
28

Noori Mazher, Alaa, Alyaa Hussain Ali, and Taif Sami Hassan. "Development of an Adaptive File Transfer Protocol (AFTP )." Engineering and Technology Journal 29, no. 11 (2011): 2234–43. http://dx.doi.org/10.30684/etj.29.11.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Nurhayati, Ade, Risnu Pradana Holiyastuta, and Ade Rahmat Iskandar. "Implementasi Virtual Private Network Pada Jaringan Multi Protocol Label Switching Traffic Engineering." Journal of Informatics and Communication Technology (JICT) 2, no. 1 (2020): 11–18. http://dx.doi.org/10.52661/j_ict.v2i1.47.

Full text
Abstract:
Along with the development of telecommunications technology, we need a network that provides traffic services to send data to distant places quickly but does not forget about security, some solutions are the Multi Protocol Label Switching method, Virtual Private Network, and Traffic Engineering. MPLS VPN TE is a combination of several methods that can be used for this problem. In this research, simulation is carried out using GNS3 software and the results of the analysis are carried out using a Wireshark software. This scenario uses the measurement load using FTP and HTTP. The measurement para
APA, Harvard, Vancouver, ISO, and other styles
30

Hari, Prasad Bomma. "Navigating the Challenges of Data Encryption and Compliance Regulations: FTP vs. SFTP." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 9, no. 5 (2021): 1–6. https://doi.org/10.5281/zenodo.14851241.

Full text
Abstract:
Data encryption and compliance regulations have become increasingly critical, as organizations strive to protect sensitive information and adhere to legal and industry standards. One of the key challenges in this domain is the choice between traditional File Transfer Protocol and the more secure Secure File Transfer Protocol for data transmission. Moreover, the consequences of non-compliance can be severe, leading to substantial financial losses, reputational damage, and legal repercussions. This research paper aims to explore the nuances of data encryption, compliance regulations, and the com
APA, Harvard, Vancouver, ISO, and other styles
31

Varatnitski, Y. I., and R. A. Rumas. "Architecture of Hardware and Software for Unidirectional Data Transmission in Computer Networks." Doklady BGUIR 21, no. 3 (2023): 96–101. http://dx.doi.org/10.35596/1729-7648-2023-21-3-96-101.

Full text
Abstract:
The results of a study of the architecture of hardware and software for unidirectional data transmission in computer networks are presented. The architecture is presented in the form of optical galvanic isolation, media converters and proxy servers, excluding bidirectional data transmission at the hardware level. Work on unidirectional data transmission is carried out on the basis of the UDP transport protocol, which provides operation without establishing bidirectional interaction. Unidirectional data transfer is carried out by a proxy server running a special sender’s software that performs
APA, Harvard, Vancouver, ISO, and other styles
32

Cherckesova, Larisa, Olga Safaryan, Nikolay Boldyrikhin, Boris Akishin, and Vasiliy Yukhnov. "Development of an import–substituting software package for secure file transfer, based on the modified protocol of EL–GAMAL." E3S Web of Conferences 273 (2021): 08049. http://dx.doi.org/10.1051/e3sconf/202127308049.

Full text
Abstract:
The article describes the development of modified encryption protocol based on the El–Gamal cryptoalgorithm. The development of an import–substituting software package for secure file transfer, based on the modified protocol of El–Gamal was made also.
APA, Harvard, Vancouver, ISO, and other styles
33

Seo, Hyungyoon, and Goo Kim. "DASH Live Broadcast Traffic Model: A Time-Bound Delay Model for IP-Based Digital Terrestrial Broadcasting Systems." Applied Sciences 11, no. 1 (2020): 247. http://dx.doi.org/10.3390/app11010247.

Full text
Abstract:
This paper proposes a live broadcast traffic model for an internet protocol (IP)-based terrestrial digital broadcasting system to transmit dynamic adaptive streaming over hypertext transfer protocol (DASH) media. The IP-based terrestrial digital broadcasting systems such as Advanced Television Systems Committee (ATSC) 3.0 transmit media content (e.g., full high definition and ultra-high definition) in units of DASH segment files. Although the DASH segment file has the same quality and playback time, the size of each DASH segment file can vary according to the media composition. The transmissio
APA, Harvard, Vancouver, ISO, and other styles
34

Watters, Paul Andrew, and Maya Espinosa Walters. "Implications of Distributed Information Technology for South Pacific Development." South Pacific Journal of Psychology 9 (1997): 75–80. http://dx.doi.org/10.1017/s0257543400001188.

Full text
Abstract:
AbstractThe global digital communications network, colloquially known as the “internet”, has received much attention in recent years from business, media, cultural, and government interests. This paper looks behind the hype and sales-pitches, at the essential features of the medium which have made it (and will continue to make it) the central technology for the dissemination of information in the next century. It is a particularly important technology for remote communities, since all information resources (educational, commercial, and recreational) can be transmitted using a standard set of p
APA, Harvard, Vancouver, ISO, and other styles
35

Mamayeva, Oydinoy Ismoiljon qizi, and Abdulhay Abdulaziz o'g'li Abduqodirov. "HTTP VA FTP PROTOKOLLARIDA ISHLASH UNUMDORLIGINI TAHLILI." GOLDEN BRAIN 1, no. 27 (2023): 24–28. https://doi.org/10.5281/zenodo.8411892.

Full text
Abstract:
<em>Ushbu maqolada HTTP (HyperText Transfer Protocol) va FTP (File Transfer Protocol) protokollari o&lsquo;rtasidagi muhim farqlarni tahlil qilingan, shu bilan bir qatorda&nbsp; HTTP va FTP &mdash; bu ikki o&lsquo;zaro aloqador protokollar, ulardan biri ma&rsquo;lum bir veb sahifasidan ma&rsquo;lumotlarni yuklab olish, boshqa esa fayllarni ko&lsquo;chirish usullari samaradorligi ko&lsquo;rib chiqilgan.</em>
APA, Harvard, Vancouver, ISO, and other styles
36

Evans, Neil, and Helen Treharne. "Investigating a file transfer protocol using CSP and B." Software & Systems Modeling 4, no. 3 (2005): 258–76. http://dx.doi.org/10.1007/s10270-005-0084-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Moskvichev, Anton, and Ksenia Moskvicheva. "Using DNS Tunneling to Transfer Malicious Software." Voprosy kiberbezopasnosti, no. 4(50) (2022): 91–99. http://dx.doi.org/10.21681/2311-3456-2022-4-91-99.

Full text
Abstract:
Purpose of the article: to develop a way to increase the level of protection of an information system from an attack using DNS tunneling. Method: using entropy to identify domains and subdomains used when transferring data through a DNS tunnel. The result: a method of data transmission through the DNS protocol bypassing the information security tools is considered. A malicious file was transferred using DNS tunneling, and an analysis was made of the operation of information protection tools during transmission. Information security tools do not detect the transfer of a malicious file via the D
APA, Harvard, Vancouver, ISO, and other styles
38

Partyka, Olha, Bohdan Fihol, and Taras Nakonechnyi. "INTEGRATED APPROACH TO DETECTING BLUETOOTH THREATS USING WIRESHARK AND SPLUNK SIEM." Cybersecurity: Education, Science, Technique 2, no. 26 (2024): 223–34. https://doi.org/10.28925/2663-4023.2024.26.684.

Full text
Abstract:
In the modern world, the Bluetooth protocol is one of the most widespread wireless communication technologies used to transfer data between various devices, ensuring their mobility and functionality. Despite its numerous advantages, the Bluetooth protocol remains vulnerable to cyber threats such as DoS attacks, spoofing, and malicious file transfer. These threats pose risks to data confidentiality, integrity, and availability. They can also lead to device failures and hazards in critical systems such as medical equipment or IoT infrastructure. This article focuses on an integrated approach to
APA, Harvard, Vancouver, ISO, and other styles
39

Liu, Chun, and Kun Tan. "Research and Implementation of the Secure Database-Update Mechanism." Applied Mechanics and Materials 513-517 (February 2014): 1752–55. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1752.

Full text
Abstract:
For a safety critical computer, large-scale data like database which has to be transferred in an instant time cannot be voted directly. This paper proposes a database update algorithm for safety critical computer based on status vote,which is to vote the database status instead of database itself. This algorithm can solve the problem of voting too much data in a short time, and compare versions of database of different modules in real time. A Markov model is built to calculate the safety and reliability of this algorithm. The results show that this algorithm meets the update requirement of saf
APA, Harvard, Vancouver, ISO, and other styles
40

Wei, Chong Yu, Zu Ping Gu, and Shuai Huang. "The Application of an SD Card in Debugging an Embedded System." Advanced Materials Research 468-471 (February 2012): 1622–25. http://dx.doi.org/10.4028/www.scientific.net/amr.468-471.1622.

Full text
Abstract:
In this paper, a new method using a Secure Digital Card in debugging an embedded system based on Android and its implementation are introduced. In debugging an embedded system, downloading image files to a RAM on a printed circuit board generally uses a net interface module and a server based on Trivial File Transfer Protocol (TFTP). Here a new method using an SD card is introduced. Compared with downloading by a TFTP server, the method is simple and inexpensive. In the paper, an SD card and its controller are introduced first. Then the designed circuit is presented. Third, two operation modes
APA, Harvard, Vancouver, ISO, and other styles
41

Arman, Molavi. "Rancang Bangun Pengamanan FTP Server dengan Menggunakan Secure Sockets Layer." JURNAL INTEGRASI 9, no. 1 (2017): 16. http://dx.doi.org/10.30871/ji.v9i1.272.

Full text
Abstract:
Teknologi informasi yang berkembang pesat didalam kehidupan manusia, membuat kebutuhan akan sistem penyimpanan data terpusat menjadi sesuatu yang penting dalam penyimpanan arsip digital. Data tidak hanya disimpan dalam sebuah personal computer desktop tetapi media penyimpanan data terpusat menjadi alternatif dalam media penyimpanan, guna menjaga dari kehilangan data atau backup data.&#x0D; Teknologi jaringan (network) komputer merupakan solusi yang dapat dimanfaatkan untuk memenuhi penyimpanan data. Jaringan komputer merupakan kumpulan beberapa komputer dan perangkat jaringan lain yang saling
APA, Harvard, Vancouver, ISO, and other styles
42

Bracke, Stephan, Alexandre Gonsette, Jean Rasson, Antoine Poncelet, and Olivier Hendrickx. "Automated observatory in Antarctica: real-time data transfer on constrained networks in practice." Geoscientific Instrumentation, Methods and Data Systems 6, no. 2 (2017): 285–92. http://dx.doi.org/10.5194/gi-6-285-2017.

Full text
Abstract:
Abstract. In 2013 a project was started by the geophysical centre in Dourbes to install a fully automated magnetic observatory in Antarctica. This isolated place comes with specific requirements: unmanned station during 6 months, low temperatures with extreme values down to −50 °C, minimum power consumption and satellite bandwidth limited to 56 Kbit s−1. The ultimate aim is to transfer real-time magnetic data every second: vector data from a LEMI-25 vector magnetometer, absolute F measurements from a GEM Systems scalar proton magnetometer and absolute magnetic inclination–declination (DI) meas
APA, Harvard, Vancouver, ISO, and other styles
43

Ji, Hong. "Research on Communication Automation with Design and Implementation of FTP Based on Serv-U." Advanced Materials Research 738 (August 2013): 276–79. http://dx.doi.org/10.4028/www.scientific.net/amr.738.276.

Full text
Abstract:
With the rapid development of network technology, communication automation system is widely used. It includes cabling system, broadband network system, mobile phone coverage system, cable and digital communication system. Use of the network is one of the functions of communication automation, and FTP (File Transfer Protocol) is one of the widely used protocols in the Internet. Based on the network platform, people use FTP service to transfer files and share information resources. The paper discusses the construction, working principle and access methods of FTP site. According to the security p
APA, Harvard, Vancouver, ISO, and other styles
44

Ugaz, Walter Antonio Campos, Maria del Rocío Hende Santolaya, Handry Martín Rodas Purizaga, et al. "Hybrid Internet Architecture and Protocol (HIAP): A Self-Evolving and Transformative Framework for Enabling Seamless Real-Time Applications and Secure Peer-to-Peer File Sharing in the Internet of Everything (IoE)." Journal of Internet Services and Information Security 13, no. 3 (2023): 58–77. http://dx.doi.org/10.58346/jisis.2023.i3.005.

Full text
Abstract:
The Internet of Everything (IoE) is rapidly growing and utilized in various applications. However, the growing mobile traffic and services pose significant challenges in flexibility, movement, accessibility, and safety. The existing internet architecture and protocol must be improved to address the challenges. The article examines the attributes and prerequisites of forthcoming networking applications while emphasizing the constraints of conventional network architecture and protocols in fulfilling these needs. The research presents a new Hybrid Internet Architecture and Protocol (HIAP), the S
APA, Harvard, Vancouver, ISO, and other styles
45

Konala, Pandu Ranga Reddy, V. SaiAbhinav Reddy, D. Krishna Chaitanya Varma, and Radhika G. "Access mechanism using inter planetary file system." International Journal of Engineering & Technology 7, no. 4 (2019): 5142–46. http://dx.doi.org/10.14419/ijet.v7i4.25030.

Full text
Abstract:
Withthe advent of Internet of Things, trust is one of the important factor for provisioning secure, reliable, seamless communications and services. Connected devices are the order of the day, where IoT plays a vital role in the functioning. However, these IoT devices use various protocols for communication mostly a centralized architecture for data transfer. Some of these protocols are Message Queue Telemetry Transport (MQTT), which is a Pub-Sub (publisher and subscriber) protocol used for a device-to-device communication on TCP through a broker. This centralized server can be a third party se
APA, Harvard, Vancouver, ISO, and other styles
46

Ahn, Jae-Won, Beom-Jin Choi, Sung-Jin Ok, Jung-Ha Kang, Jae-Young Kim, and Eun-Gi Kim. "Design and implementation of file transfer protocol supporting security functionalities." Journal of the Korea Academia-Industrial cooperation Society 15, no. 5 (2014): 3086–92. http://dx.doi.org/10.5762/kais.2014.15.5.3086.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Pratama, Redo, Mira Orisa, and FX Ariwibisono. "APLIKASI MONITORING DAN CONTROLLING SERVER MENGGUNAKAN PROTOCOL ICMP (INTERNET CONTROL MESSAGE PROTOCOL) DAN SSH (SECURE SHELL) BERBASIS WEBSITE." JATI (Jurnal Mahasiswa Teknik Informatika) 4, no. 1 (2020): 397–403. http://dx.doi.org/10.36040/jati.v4i1.2310.

Full text
Abstract:
Sistem monitoring server sangat dibutuhkan bagi seorang administrator. Sebab memastika setiap server dalam kondisi yang baik merupakan tugas utama dari administrator, karena sifat server yang harus dalam kondisi online atau hidup setiap Sistem monitoring yang saat ini digunakan ialah dengan cara mengecek setiap server yang dikelolanya. Dengan cara tersebut maka administrator dapat mengetahui kondisi fisik serta keadaan server dalam keadaan up atau down.&#x0D; Dengan menggunakan protocoi ICMP (Internet Control Message Protocol) untuk menjalankan fitur monitoring server secara real time, serta m
APA, Harvard, Vancouver, ISO, and other styles
48

Wintolo, Hero, Yuliani Indrianingsih, Wahyu Hamdani, and Syafrudin Abdie. "Descriptive Analysis and ANOVA Test with File Sending on Computer Networks Attacked with Rogue's Dynamic Host Configuration Protocol (DHCP)." Jurnal Ilmiah Teknik Elektro Komputer dan Informatika 9, no. 2 (2023): 375–84. https://doi.org/10.26555/jiteki.v9i2.26167.

Full text
Abstract:
The requirement for a computer that is physically connected to a computer network to be able to access existing resources on a computer network in the form of an IP address obtained statically or dynamically. On a static IP address, there are not many problems that arise because it is loaded directly into the computer, while for a dynamic IP address, security problems arise in the form of a dynamic IP address sharing server in the form of DHCP Rogue. The configuration that is added to the first router when the network is hit by a DHCP rogue attack is to configure the main router, in this case,
APA, Harvard, Vancouver, ISO, and other styles
49

Sangeetha, J., Keerthiraj Nagaraj, K. N. Balasubramanya Murthy, and Ram P. Rustagi. "A New Approach for Analyzing the Performance of the WiMAX Networks based on QoS Traffic Prediction Routing Protocol using Gene Expression Programming." International Journal of Applied Metaheuristic Computing 7, no. 2 (2016): 16–38. http://dx.doi.org/10.4018/ijamc.2016040102.

Full text
Abstract:
WiMAX is one of the broadband wireless access technologies, which provides the efficient QoS to the large number of users. The multimedia applications such as real time and non-real time services are gaining importance in the WiMAX network. To support such applications, there is a need to propose an efficient QoS traffic prediction routing protocol for the WiMAX networks. To address this, the authors are using Gene Expression Programming technique. They have generated datasets for CBR based traffic and file transfer applications. Here, they focus to develop the mathematical expressions for thr
APA, Harvard, Vancouver, ISO, and other styles
50

Murray, Steven, Mihai Patrascoiu, Luca Mascetti, Joao Pedro Lopes, Shubhangi Misra, and Eraldo Silva Junior. "FTS Service Evolution and LHC Run-3 Operations." EPJ Web of Conferences 295 (2024): 01031. http://dx.doi.org/10.1051/epjconf/202429501031.

Full text
Abstract:
The File Transfer Service (FTS) is a software system responsible for queuing, scheduling, dispatching and retrying file transfer requests, it is used by three of the LHC experiments, namely ATLAS, CMS and LHCb, as well as non LHC experiments including AMS, Dune and NA62. FTS is critical to the success of many experiments and the service must remain available and performant during the entire LHC Run-3. Experiments use FTS to manage the transfer of their physics files all over the World or more specifically all over the Worldwide LHC Computing Grid (WLCG). Since the start of LHC Run-3 (from 5th
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!