Journal articles on the topic 'Packet trace'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Packet trace.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yang, Ming, and Nikolaos Bourbakis. "ANALYSIS, MODELING AND SIMULATION OF NETWORK TRACES FOR VIDEO TRANSMISSION OVER IP NETWORKS." Journal of Integrated Design and Process Science: Transactions of the SDPS, Official Journal of the Society for Design and Process Science 13, no. 1 (2009): 15–32. http://dx.doi.org/10.3233/jid-2009-13102.
Full textYang, Ming Hour. "Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/239280.
Full textARYANTA, DWI, and BAYU AGUNG PRANATA. "Perancangan dan Analisis Redistribution Routing Protocol OSPF dan EIGRP." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 2, no. 2 (2014): 85. http://dx.doi.org/10.26760/elkomika.v2i2.85.
Full textPang, Ruoming, Mark Allman, Vern Paxson, and Jason Lee. "The devil and packet trace anonymization." ACM SIGCOMM Computer Communication Review 36, no. 1 (2006): 29–38. http://dx.doi.org/10.1145/1111322.1111330.
Full textDennis, Simone, and Helen Alexiou. "(Re)making smoking: Of packets and practice." Journal of Material Culture 23, no. 4 (2018): 459–71. http://dx.doi.org/10.1177/1359183518799537.
Full textARYANTA, DWI, ARSYAD RAMADHAN DARLIS, and DIMAS PRIYAMBODHO. "Analisis Kinerja EIGRP dan OSPF pada Topologi Ring dan Mesh." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 2, no. 1 (2014): 53. http://dx.doi.org/10.26760/elkomika.v2i1.53.
Full textPaxson, Vern. "Automated packet trace analysis of TCP implementations." ACM SIGCOMM Computer Communication Review 27, no. 4 (1997): 167–79. http://dx.doi.org/10.1145/263109.263160.
Full textEt. al., Dr B. Shadaksharappa,. "Attack Prediction By Using Greedy Algorithm For Diminishing The Drop And Delay In Wireless Sensor Networks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 1072–82. http://dx.doi.org/10.17762/turcomat.v12i6.2425.
Full textMemon, Mudasar Latif, Mukesh Kumar Maheshwari, Navrati Saxena, Abhishek Roy, and Dong Ryeol Shin. "Artificial Intelligence-Based Discontinuous Reception for Energy Saving in 5G Networks." Electronics 8, no. 7 (2019): 778. http://dx.doi.org/10.3390/electronics8070778.
Full textSpiekermann, Daniel, and Jörg Keller. "Requirements for Crafting Virtual Network Packet Captures." Journal of Cybersecurity and Privacy 2, no. 3 (2022): 516–26. http://dx.doi.org/10.3390/jcp2030026.
Full textLiu, X., J. Xu, J. Yue, and S. L. Vadas. "Numerical modeling study of the momentum deposition of small amplitude gravity waves in the thermosphere." Annales Geophysicae 31, no. 1 (2013): 1–14. http://dx.doi.org/10.5194/angeo-31-1-2013.
Full textBhuvaneshwari, P., and T. R. Jaya Chandra Lekha. "Design of Advanced High Performance Bus Tracer in System on Chip Using Matrix Based Compression for Low Power Applications." Journal of Computational and Theoretical Nanoscience 17, no. 4 (2020): 1852–56. http://dx.doi.org/10.1166/jctn.2020.8453.
Full textD., D., D. .., and B. Samitha. "Efficacious Framework for The Detection of Link Flooding Attack in Mobile Ad Hoc Network." International Journal of Wireless and Ad Hoc Communication 9, no. 1 (2025): 61–65. https://doi.org/10.54216/ijwac.090105.
Full textK.S, Poornima, and Nandhni J.P. "Enhanced RRED to Counter LDoS Attacks." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 08 (2013): 252–55. https://doi.org/10.5281/zenodo.14613317.
Full textLan, Haoliang, Jie Xu, Qun Wang, and Wei Ding. "Packet Loss Measurement Based on Sampled Flow." Symmetry 13, no. 11 (2021): 2149. http://dx.doi.org/10.3390/sym13112149.
Full textJiang, Xi, Shinan Liu, Aaron Gember-Jacobson, et al. "NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation." Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, no. 1 (2024): 1–32. http://dx.doi.org/10.1145/3639037.
Full textJiang, Xi, Shinan Liu, Aaron Gember-Jacobson, et al. "NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation." ACM SIGMETRICS Performance Evaluation Review 52, no. 1 (2024): 85–86. http://dx.doi.org/10.1145/3673660.3655071.
Full textChen, Jian, Siyu Kuai, Guoliang Chen, Lihua Yu, and Qiwen Zhan. "Dynamical Modulation of Transverse Orbital Angular Momentum in Highly Confined Spatiotemporal Optical Vortex." Photonics 10, no. 2 (2023): 148. http://dx.doi.org/10.3390/photonics10020148.
Full textMa, Naji, and Ming Diao. "CoFi: Coding-Assisted File Distribution over a Wireless LAN." Symmetry 11, no. 1 (2019): 71. http://dx.doi.org/10.3390/sym11010071.
Full textRoughan, Matt. "Public review for the devil and packet trace anonymization." ACM SIGCOMM Computer Communication Review 36, no. 1 (2006): 27–28. http://dx.doi.org/10.1145/1111322.1111329.
Full textYatskih, Alex, Yuri Yermolaev, Aleksandr Kosinov, and Nikolay Semionov. "Wave Packet Excitation and its Development in Supersonic Boundary Layer." Siberian Journal of Physics 8, no. 2 (2013): 70–78. http://dx.doi.org/10.54362/1818-7919-2013-8-2-70-78.
Full textMustapha, Oba Zubair, Muhammad Ali, Yim Fun Hu, and Raed A. Abd-Alhameed. "Service-aware LSP selection with fuzzy based packet scheduling scheme for non-real time traffics." International Journal of Informatics and Communication Technology (IJ-ICT) 10, no. 2 (2021): 126. http://dx.doi.org/10.11591/ijict.v10i2.pp126-139.
Full textKarande, Shirish S., Kiran Misra, and Hayder Radha. "Survival of the Fittest: An Active Queue Management Technique for Noisy Packet Flows." Advances in Multimedia 2007 (2007): 1–10. http://dx.doi.org/10.1155/2007/64695.
Full textAlyami, Mnassar, Abdulmajeed Alghamdi, Mohammed A. Alkhowaiter, Cliff Zou, and Yan Solihin. "Random Segmentation: New Traffic Obfuscation against Packet-Size-Based Side-Channel Attacks." Electronics 12, no. 18 (2023): 3816. http://dx.doi.org/10.3390/electronics12183816.
Full textObeidat, Ibrahim, Ala Mughaid, and Shadi Alzoubi. "A Secure Encrypted Protocol for Clients' Handshaking in the Same Network." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 05 (2019): 47. http://dx.doi.org/10.3991/ijim.v13i05.9845.
Full textIbrahim, Idris Skloul, Peter J. B. King, and Hans-Wolfgang Loidl. "NsGTFA: A GUI Tool to Easily Measure Network Performance through the Ns2 Trace File." Journal of Intelligent Systems 24, no. 4 (2015): 467–77. http://dx.doi.org/10.1515/jisys-2014-0153.
Full textDong, Wei. "IPMT, an IPv6 Packet Manipulation Tool: Design Considerations and Applications." Applied Mechanics and Materials 543-547 (March 2014): 3040–43. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3040.
Full textMiyim, Abubakar Muhammad. "Techniques for Throughput Enhancement in Wireless Networks." Journal of Communications Technology, Electronics and Computer Science 4 (February 16, 2016): 1. http://dx.doi.org/10.22385/jctecs.v4i0.11.
Full textAlArnaout, Zakwan, Nour Mostafa, Samer Alabed, Wael Hosny Fouad Aly, and Ahmed Shdefat. "RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks." Sensors 23, no. 1 (2022): 102. http://dx.doi.org/10.3390/s23010102.
Full textOhkuwa, Y., and T. Kitazoe. "Wave Packet in Quantum Cosmology and Definition of Semiclassical Time." International Journal of Modern Physics A 12, no. 05 (1997): 859–71. http://dx.doi.org/10.1142/s0217751x97000657.
Full textRusek, Krzysztof, Lucjan Janowski, and Zdzisław Papir. "Transient and stationary characteristics of a packet buffer modelled as an MAP/SM/1/b system." International Journal of Applied Mathematics and Computer Science 24, no. 2 (2014): 429–42. http://dx.doi.org/10.2478/amcs-2014-0033.
Full textMohammed, Alenezi, and J. Reed Martin. "TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS." International Journal of Network Security & Its Applications (IJNSA) 5, no. 2 (2013): 131–42. https://doi.org/10.5281/zenodo.4011669.
Full textTanveer Baig, Z., and Chandrasekar Shastry. "Smart Hybridized Routing Protocol for Animal Monitoring and Tracking Applications." Scalable Computing: Practice and Experience 23, no. 4 (2022): 339–49. http://dx.doi.org/10.12694/scpe.v23i4.2040.
Full textSarkar, Shambhu. "Challenges for Implementing Pharmaceuticals Drugs Traceability in Developing Countries." International Journal of Research Publications 103, no. 1 (2022): 760–66. https://doi.org/10.47119/IJRP1001031620223477.
Full textLin, Yi-Bing. "Parallel trace-driven simulation for packet loss in finite-buffered voice multiplexers." Parallel Computing 19, no. 2 (1993): 219–28. http://dx.doi.org/10.1016/0167-8191(93)90051-l.
Full textLin, Yi-Bing. "Parallel trace-driven simulation of packet-switched multiplexer under priority scheduling policy." Information Processing Letters 47, no. 4 (1993): 197–201. http://dx.doi.org/10.1016/0020-0190(93)90032-5.
Full textPeng, Han Chuan, Li Feng Sha, Qiang Gan, and Yu Wei. "Combining adaptive sigmoid packet and trace neural network for fast invariance-learning." Electronics Letters 34, no. 9 (1998): 898. http://dx.doi.org/10.1049/el:19980667.
Full textMarciniak, Marian. "Towards broadband global optical and wireless networking." Journal of Telecommunications and Information Technology, no. 3 (September 30, 2004): 1–6. http://dx.doi.org/10.26636/jtit.2004.3.249.
Full textRAHMIATI, PAULINE, DWI ARYANTA, and TAUFIQ AGUNG PRIYADI. "Perancangan dan Analisis Perbandingan Implementasi OSPF pada Jaringan IPv4 dan IPv6." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 2, no. 1 (2014): 40. http://dx.doi.org/10.26760/elkomika.v2i1.40.
Full textSAHNI, SARTAJ, and KUN SUK KIM. "EFFICIENT DYNAMIC LOOKUP FOR BURSTY ACCESS PATTERNS." International Journal of Foundations of Computer Science 15, no. 04 (2004): 567–91. http://dx.doi.org/10.1142/s0129054104002625.
Full textMishra, Abhishek kumar, Sara Ayoubi, Giulio Grassi, and Renata Teixeira. "NemFi." ACM SIGCOMM Computer Communication Review 51, no. 3 (2021): 2–8. http://dx.doi.org/10.1145/3477482.3477484.
Full textS. Raj, Jennifer, and Abul Basar. "QOS OPTIMIZATION OF ENERGY EFFICIENT ROUTING IN IOT WIRELESS SENSOR NETWORKS." Journal of ISMAC 01, no. 01 (2019): 12–23. http://dx.doi.org/10.36548/jismac.2019.1.002.
Full textGaliana-Merino, J. J., S. Parolai, and J. Rosa-Herranz. "Seismic wave characterization using complex trace analysis in the stationary wavelet packet domain." Soil Dynamics and Earthquake Engineering 31, no. 11 (2011): 1565–78. http://dx.doi.org/10.1016/j.soildyn.2011.06.009.
Full textKumar, Subodha, and Georgia Perakis. "A Brief History of the Internet and the World Wide Web." Management and Business Review 2, no. 1 (2022): 67–72. http://dx.doi.org/10.1177/2694105820220201001.
Full textJan, Naveed, Ali Al-Bayatti, Naseer Alalwan, and Ahmed Alzahrani. "An Enhanced Source Location Privacy based on Data Dissemination in Wireless Sensor Networks (DeLP)." Sensors 19, no. 9 (2019): 2050. http://dx.doi.org/10.3390/s19092050.
Full textZhao, Ning, Xue Li, Mei Yang, and Xin Ting Huang. "Vehicular Ad-Hoc Network and Routing Design." Applied Mechanics and Materials 641-642 (September 2014): 829–32. http://dx.doi.org/10.4028/www.scientific.net/amm.641-642.829.
Full textPeng, Guang-Qian, Guangtao Xue, and Yi-Chao Chen. "Network Measurement and Performance Analysis at Server Side." Future Internet 10, no. 7 (2018): 67. http://dx.doi.org/10.3390/fi10070067.
Full textChilwan, Shihab. "Dataset for DoS Detection Dataset: A Benchmark for AI-Driven Intrusion Detection and DoS Attack Analysis." Science Management Design Journal 2, no. 2 (2024): 22–28. https://doi.org/10.70295/smdj.2412023.
Full textMargam Suthar. "Development of Modified Random Waypoint Mobility Model of Routing Protocol for the Mobile ad-hoc Network." Power System Technology 48, no. 1 (2024): 2131–46. http://dx.doi.org/10.52783/pst.483.
Full textChiesa, Marco, and Fábio L. Verdi. "Network Monitoring on Multi-Pipe Switches." Proceedings of the ACM on Measurement and Analysis of Computing Systems 7, no. 1 (2023): 1–31. http://dx.doi.org/10.1145/3579321.
Full text