Journal articles on the topic 'OSI-Open System Interconnection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 37 journal articles for your research on the topic 'OSI-Open System Interconnection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Tuma, T., I. Fajfar, M. Perko, F. Bratkovič, and J. Puhan. "A Hands-On Approach to Teaching the Basic OSI Reference Model." International Journal of Electrical Engineering & Education 37, no. 2 (2000): 157–66. http://dx.doi.org/10.7227/ijeee.37.2.5.
Full textSusilawati Susilawati, Marcel Ade Satria, Khaila Mardina, Juniwan Juniwan, and Didik Aribowo. "Implementasi Teknologi Komunikasi Data Menggunakan Open System Interconnection (OSI) Untuk Berkirim Pesan Antar Perangkat." Venus: Jurnal Publikasi Rumpun Ilmu Teknik 2, no. 3 (2024): 124–29. http://dx.doi.org/10.61132/venus.v2i3.307.
Full textShi, Yu Qing, and Yue Long Zhu. "A Framework for Development the Open Systems Interconnection of Integrated Intelligent Knowledge for Management of Networks." Applied Mechanics and Materials 411-414 (September 2013): 795–98. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.795.
Full textJakobs, Kai. "Why Then Did the X.400 E-mail Standard Fail? Reasons and Lessons to be Learned." Journal of Information Technology 28, no. 1 (2013): 63–73. http://dx.doi.org/10.1057/jit.2012.35.
Full textYalgʻashov, Anvar Ikrom oʻgʻli Fayzullayev Ikrom Yusub o'g'li Norqobilov Sobir Hamza o'g'li. "DDOS ATTACKS AND PROTECTION AGAINST THEM." EURASIAN JOURNAL OF ACADEMIC RESEARCH 2, no. 13 (2022): 1009–12. https://doi.org/10.5281/zenodo.7476343.
Full textSabelkin, Mike, and François Gagnon. "Data Transmission Oriented on the Object, Communication Media, Application, and State of Communication Systems." International Journal of Interdisciplinary Telecommunications and Networking 3, no. 2 (2011): 51–65. http://dx.doi.org/10.4018/jitn.2011040104.
Full textCuinas, Inigo. "An Introduction to Cybersecurity at Physical Layer: Obstacles at Radio Channel to Mitigate Hackers’ Chance." Elektronika ir Elektrotechnika 26, no. 6 (2020): 58–65. http://dx.doi.org/10.5755/j01.eie.26.6.28006.
Full textVenkatesh, Thamarai Kannan, and Chakravarthi Rekha. "Efficient addressing schemes for internet of things." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 4 (2022): 4415–29. https://doi.org/10.11591/ijece.v12i4.pp4415-4429.
Full textКузавков, Василь, В’ячеслав Солодовник та Юлія Болотюк. "ПОБУДОВА ПЕРЕВІРНОЇ ТЕСТОВОЇ ПОСЛІДОВНОСТІ ДЛЯ ОЦІНКИ ТЕХНІЧНОГО СТАНУ ОБ’ЄКТІВ З ВБУДОВАНИМ ПРОГРАМНИМ ЗАБЕЗПЕЧЕННЯМ". Ukrainian Scientific Journal of Information Security 30, № 1 (2024): 29–36. http://dx.doi.org/10.18372/2225-5036.30.18578.
Full textVitria, Rikki, Ratna Dewi, and Ariq Naufal. "ANALYSIS OF DATA COMMUNICATION BETWEEN ANDROID APPLICATIONS AND WEB SERVER." JURNAL INTEGRASI 11, no. 2 (2019): 91–96. http://dx.doi.org/10.30871/ji.v11i2.1654.
Full textH. Sawalmeh, Ahmad, and Noor Shamsiah Othman. "An Overview of Collision Avoidance Approaches and Network Architecture of Unmanned Aerial Vehicles (UAVs)." International Journal of Engineering & Technology 7, no. 4.35 (2018): 924. http://dx.doi.org/10.14419/ijet.v7i4.35.27395.
Full textMasue, Wilbard G., Daniel Ngondya, and Tabu S. Kondo. "Quantifying Vulnerabilities: A Systematic Review of the State-of-the-Art Web-Based Systems." Journal of ICT Systems 2, no. 1 (2024): 72–86. http://dx.doi.org/10.56279/jicts.v2i1.51.
Full textTatarkanov, Aslan A., Аlexander А. Umyskov, Ruslan Kh Tekeev, and Vladimir Zh Kuklin. "Model Development of Universal Hardware and Software Module for Medical Information System." International Journal of Emerging Technology and Advanced Engineering 12, no. 10 (2022): 136–46. http://dx.doi.org/10.46338/ijetae1022_15.
Full textOktavianus, Yoppi Lisyadi, Ikhwana Elfitri, and Onno Widodo Purbo. "Perancangan dan Analisis Jaringan FTTB Berbasis Teknologi GPON Pada Bangunan Hotel." INOVTEK Polbeng - Seri Informatika 8, no. 1 (2023): 88. http://dx.doi.org/10.35314/isi.v8i1.3213.
Full textAminu, Aminu Muazu, and Ismaila Audi Umar. "Network Configuration by Utilizing Cisco Technologies with Proper Segmentation of Broadcast Domain in FNAS-UMYUK Nigeria." Journal of Network Security and Data Mining 4, no. 1 (2021): 1–13. https://doi.org/10.5281/zenodo.4776375.
Full textHuening, Felix, Holger Heuermann, Franz-Josef Wache, and Rami Audisho Jajo. "A new wireless sensor interface using dual-mode radio." Journal of Sensors and Sensor Systems 7, no. 2 (2018): 507–15. http://dx.doi.org/10.5194/jsss-7-507-2018.
Full textQabalin, Majdi K., Muawya Naser, Wafa M. Hawajreh, and Saja Abu-Zaideh. "GPS Week Number Rollover Timestamp Complement." Sensors 21, no. 23 (2021): 7826. http://dx.doi.org/10.3390/s21237826.
Full textObando, Christian Alexander. "Seguridad a nivel de enlace de datos en el modelo de interconexión de sistemas abiertos (OSI)." Ingente Americana 2, no. 2 (2022): 71–78. http://dx.doi.org/10.21803/ingecana.2.2.405.
Full textJohn, Joshua, and Egba Anwaitu Fraser. "DDoS Attacks on Cloud Computing and IoT Devices: Strategies for Mitigation." Kasu Journal of Computer Science 1, no. 4 (2024): 778–95. https://doi.org/10.47514/kjcs/2024.1.4.006.
Full textAlasri, Abbas, and Rossilawati Sulaiman. "Protection of XML-Based Denail-of-Service and Httpflooding Attacks in Web Services Using the Middleware Tool." International Journal of Engineering & Technology 7, no. 4.7 (2018): 322. http://dx.doi.org/10.14419/ijet.v7i4.7.20570.
Full textMohammed, Mustafa Khan. "Developing Comprehensive Web Application Firewall (WAF) Policies for Multiple Environments, Enhancing Web Application Security." Journal of Scientific and Engineering Research 11, no. 4 (2024): 358–65. https://doi.org/10.5281/zenodo.13950690.
Full textSchürmann, Gerd. "The evolution from open systems interconnection (OSI) to open distributed processing (ODP)." Computer Standards & Interfaces 17, no. 1 (1995): 107–13. http://dx.doi.org/10.1016/0920-5489(93)e0065-a.
Full textHartmann, Ulrich. "Open systems interconnection (OSI): Status, trends and european information technology manufacturers' activities." Computer Standards & Interfaces 7, no. 1-2 (1988): 119–26. http://dx.doi.org/10.1016/0920-5489(88)90056-6.
Full textLinn, R. J., and J. S. Nightingale. "Testing OSI (Open Systems Interconnection) protocols at the National Bureau of Standards." Computers & Security 7, no. 5 (1988): 514. http://dx.doi.org/10.1016/0167-4048(88)90234-9.
Full textMcLean, Neil. "Information Control: Open Systems Interconnection and Networking Strategies." Alexandria: The Journal of National and International Library and Information Issues 1, no. 1 (1989): 43–50. http://dx.doi.org/10.1177/095574908900100104.
Full textBaumgarten, Bernd, Heinz-Jürgen Burkhardt, Peter Ochsenschläger, and Rainer Prinoth. "PROSIT - An R&D project stimulated by the standardization work on Open Systems Interconnection (OSI)." Computer Standards & Interfaces 17, no. 1 (1995): 45–53. http://dx.doi.org/10.1016/0920-5489(93)e0068-d.
Full textAbdulameer Abdulmonim, Dhafer, and Zainab Hassan Muhamad. "Comparative Study Between the OSI Model and the TCP/IP Model: Architecture and Protocols in Computer Networking Systems." International Journal of Engineering and Computer Science 13, no. 08 (2024): 26358–72. http://dx.doi.org/10.18535/ijecs/v13i08.4880.
Full textChandnani, Manali, Mukesh Kumar Khandelwal, and Meeta Sharma. "A Survey on Synchronization Approach in MAC Layer Protocols." International Journal of Business Data Communications and Networking 13, no. 1 (2017): 9–27. http://dx.doi.org/10.4018/ijbdcn.2017010102.
Full textBaranov, Vladimir V., and Alexander A. Shelupanov. "Cognitive Model for Assessing the Security of Information Systems for Various Purposes." Symmetry 14, no. 12 (2022): 2631. http://dx.doi.org/10.3390/sym14122631.
Full textKułacz, Łukasz, Paweł Kryszkiewicz, and Adrian Kliks. "Waveform Flexibility for Network Slicing." Wireless Communications and Mobile Computing 2019 (March 27, 2019): 1–15. http://dx.doi.org/10.1155/2019/6250804.
Full textSija, Baraka D., Young-Hoon Goo, Kyu-Seok Shim, Huru Hasanova, and Myung-Sup Kim. "A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View." Security and Communication Networks 2018 (2018): 1–17. http://dx.doi.org/10.1155/2018/8370341.
Full textMiss.Vinodini, Salvi, and Prasad Bapat Mr. "Mode of Data Flow in the OSI Model." IJIERT - International Journal of Innovations in Engineering Research and Technology 2, no. 3 (2015). https://doi.org/10.5281/zenodo.1471811.
Full text"Analysis and Theoretical Evaluation of Iraqi High Voltage Power Transmission Line." Iraqi Journal of Computer, Communication, Control and System Engineering, September 16, 2018, 63–76. http://dx.doi.org/10.33103/uot.ijccce.18.2.6.
Full textOlawoyin, L. A. "Hybridization of OFDMand Physical Layer Techniques for Information Security in Wireless System." SLU Journal of Science and Technology, March 31, 2023, 21–29. http://dx.doi.org/10.56471/slujst.v6i.301.
Full textMs., Shubhangi Mohan Ingole. "A STUDY OF CYBER SECURITY THREATS IN THE OSI-REFERENCE MODEL." April 26, 2022. https://doi.org/10.5281/zenodo.7093414.
Full text"Pro-Active and Pre-Emptive Intelligent Network Management Strategies in Internet of Things." International Journal of Recent Technology and Engineering 8, no. 4 (2019): 7174–79. http://dx.doi.org/10.35940/ijrte.d5305.118419.
Full textAzevedo, Andrei C., Eder J. Scheid, Muriel F. Franco, Demétrio F. F. Boeira, Luciano Zembruzki, and Lisandro Z. Granville. "The Role of Network Centralization in Shaping Digital Sovereignty: An Analysis Under the DNS Lens." International Journal of Network Management, October 24, 2024. http://dx.doi.org/10.1002/nem.2309.
Full text