Academic literature on the topic 'PROTOCOL ANALYSIS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'PROTOCOL ANALYSIS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "PROTOCOL ANALYSIS"
S V Kharat, Gumaste. "Performance Analysis of DSR Protocol." International Journal of Scientific Engineering and Research 1, no. 3 (2013): 62–68. https://doi.org/10.70729/j201340.
Full textHussain, Kashif. "Comparative Analysis of DNA Extraction Protocols from Blood for Bovine Theileriosis." International Journal of Agriculture and Biology 34, no. 03 (2025): 340301. https://doi.org/10.17957/ijab/15.2361.
Full textLi, Fu Lin, Jie Yang, Hong Wei Zhou, and Ying Liu. "A New Dynamic Protocol Analysis Model." Advanced Materials Research 765-767 (September 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.
Full textZhao, Wen Hong. "Protocols Analysis by Base-Function." Applied Mechanics and Materials 530-531 (February 2014): 682–85. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.682.
Full textOwen, Stephen, Pearl Brereton, and David Budgen. "Protocol analysis." Communications of the ACM 49, no. 2 (2006): 117–22. http://dx.doi.org/10.1145/1113034.1113039.
Full textKOVACIK, Cyril Filip, and Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK." Acta Electrotechnica et Informatica 1335-8243, no. 1338-3957 (2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.
Full textAnggriani, Sufy, Rizki Savira Firdaus, and Windy Amanda Siwi Suherlan. "Analisis Penyimpanan Protokol Notaris Secara Elektronik." Notaire 6, no. 3 (2023): 437–48. http://dx.doi.org/10.20473/ntr.v6i3.50802.
Full textHU, YANJING, QINGQI PEI, and LIAOJUN PANG. "Instruction Clustering Analysis for Unknown Network Protocol's Abnormal Behavior." Journal of Interconnection Networks 15, no. 03n04 (2015): 1540002. http://dx.doi.org/10.1142/s0219265915400022.
Full textNeeru Kumari and Dr. Tilak Raj. "OSPF Metric Convergence and Variation Analysis During Redistribution with Routing Information Protocol." International Research Journal on Advanced Engineering and Management (IRJAEM) 2, no. 06 (2024): 1985–91. http://dx.doi.org/10.47392/irjaem.2024.0293.
Full textMuhammad Farhan, Muhammad Asif, Maaz Bin Ahmad, and Khalid Maqsood. "A Comparative Analysis of Unicast Routing Protocols for MPLS-VPN." Lahore Garrison University Research Journal of Computer Science and Information Technology 3, no. 1 (2019): 43–49. http://dx.doi.org/10.54692/lgurjcsit.2019.030167.
Full textDissertations / Theses on the topic "PROTOCOL ANALYSIS"
Brachfeld, Lawrence J. "Mobile internet protocol analysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369385.
Full textKovan, Gerry. "SPP Secure Payment Protocol: Protocol Analysis, Implementation and Extensions." Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1079.
Full textO'Shea, Nicholas. "Verification and validation of security protocol implementations." Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4753.
Full textDobson, Lucas E. "Security analysis of session initiation protocol." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDobson.pdf.
Full textAraya, Cristian, and Manjinder Singh. "Web API protocol and security analysis." Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208934.
Full textJayaswal, Tanu. "Events-induced tourism: a protocol analysis." AUT University, 2010. http://hdl.handle.net/10292/897.
Full textJang, Beakcheol. "Wireless MAC Protocol Design and Analysis." NCSU, 2009. http://www.lib.ncsu.edu/theses/available/etd-05262009-175059/.
Full textLu, Chun, and Jian Song. "Protocol Analysis for Networked Acquirement System." International Foundation for Telemetering, 2014. http://hdl.handle.net/10150/577516.
Full textHsu, Yating. "Formal Analysis of Network Protocol Security." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1317230784.
Full textChu, Peil-Ying Mark. "Towards automating protocol synthesis and analysis /." The Ohio State University, 1989. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487598303840366.
Full textBooks on the topic "PROTOCOL ANALYSIS"
New Zealand. Ministry for the Environment., ed. Solid waste analysis protocol. Ministry for the Environment, 2002.
Find full textHodgson. Novell Netware protocol and network analysis. University of Manchester, Department of Computer Science, 1996.
Find full text1916-, Simon Herbert A., ed. Protocol analysis: Verbal reports as data. MIT Press, 1985.
Find full text1916-, Simon Herbert Alexander, ed. Protocol analysis: Verbal reports as data. MIT Press, 1992.
Find full textBoyle, Robert J. Engineering analysis using a web-based protocol. National Aeronautics and Space Administration, Glenn Research Center, 2002.
Find full textK, Luke Nancy, and Intelligent Buildings Institute Foundation, eds. Global protocol review & end-user needs analysis. The Foundation, 1993.
Find full textSong, Wei, Peijian Ju, and A.-Long Jin. Protocol Design and Analysis for Cooperative Wireless Networks. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-47726-8.
Full textOntario. Ministry of the Environment. Laboratory Services Branch., ed. Protocol of accepted drinking water testing methods. Ministry of the Environment, Laboratory Services Branch, 2003.
Find full textBaker, Robert E. A study of novice systems analysts' problem solving behaviors using protocol analysis. Naval Postgraduate School, 1992.
Find full textBook chapters on the topic "PROTOCOL ANALYSIS"
Ericsson, K. Anders. "Protocol Analysis." In A Companion to Cognitive Science. Blackwell Publishing Ltd, 2017. http://dx.doi.org/10.1002/9781405164535.ch33.
Full textNahler, Gerhard. "per-protocol analysis." In Dictionary of Pharmaceutical Medicine. Springer Vienna, 2009. http://dx.doi.org/10.1007/978-3-211-89836-9_1033.
Full textDong, Ling, and Kefei Chen. "Formalism of Protocol Security Analysis." In Cryptographic Protocol. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-24073-7_7.
Full textDong, Ling, and Kefei Chen. "Informal Analysis Schemes of Cryptographic Protocols." In Cryptographic Protocol. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-24073-7_4.
Full textDong, Ling, and Kefei Chen. "Security Analysis of Real World Protocols." In Cryptographic Protocol. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-24073-7_5.
Full textRzempoluck, Edward J. "A Data Analysis Protocol." In Neural Network Data Analysis Using Simulnet™. Springer New York, 1998. http://dx.doi.org/10.1007/978-1-4612-1746-6_5.
Full textAparicio-Sánchez, Damián, Santiago Escobar, Catherine Meadows, José Meseguer, and Julia Sapiña. "Protocol Analysis with Time." In Progress in Cryptology – INDOCRYPT 2020. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65277-7_7.
Full textRaymond Choo, Kim-Kwang. "Complementing Computational Protocol Analysis." In Advances in Information Security. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-87969-7_10.
Full textSzymoniak, Sabina. "KaoChow Protocol Timed Analysis." In Advances in Soft and Hard Computing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03314-9_30.
Full textAgapito, Giuseppe, and Mariamena Arbitrio. "Microarray Data Analysis Protocol." In Methods in Molecular Biology. Springer US, 2021. http://dx.doi.org/10.1007/978-1-0716-1839-4_17.
Full textConference papers on the topic "PROTOCOL ANALYSIS"
Cai, Liujia, Tong Yu, Yumeng Li, et al. "SyntaxBridge: Protocol Description Transformer for Enhanced Formal Analysis of Security Protocols." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00067.
Full textTan, Yang, and Bo Lv. "Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections." In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121209.
Full textTiflea, Denisa-Ionela. "Vulnerabilities of LRSAS Protocol." In 12th International Conference on Electronics, Communications and Computing. Technical University of Moldova, 2022. http://dx.doi.org/10.52326/ic-ecco.2022/sec.07.
Full textPlummer, Richard W. "SDLC protocol throughput analysis." In the 17th conference. ACM Press, 1985. http://dx.doi.org/10.1145/21850.253380.
Full textJacobson, D. W. "Network protocol analysis (abstract)." In the 1986 ACM fourteenth annual conference. ACM Press, 1986. http://dx.doi.org/10.1145/324634.325067.
Full textQasMarrogy, Ghassan. "Practical Analysis of IEEE 802.11ax Wireless Protocol in Wi-Fi Boosters Environments." In 3rd International Conference of Mathematics and its Applications. Salahaddin University-Erbil, 2020. http://dx.doi.org/10.31972/ticma22.04.
Full textDorst, Kees, and Nigel Cross. "Protocol Analysis As a Research Technique for Analysing Design Activity." In ASME 1995 Design Engineering Technical Conferences collocated with the ASME 1995 15th International Computers in Engineering Conference and the ASME 1995 9th Annual Engineering Database Symposium. American Society of Mechanical Engineers, 1995. http://dx.doi.org/10.1115/detc1995-0190.
Full text"Performance Analysis of Basic Automatic Repeat Request Protocols and Hybrid Automatic Repeat Request Protocol." In 4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022). Cihan University, 2022. http://dx.doi.org/10.24086/cocos2022/paper.567.
Full textBerhea, Mohammed, Chunhong Chen, and Q. M. Jonathan Wu. "Protocol-level performance analysis for anti-collision protocols in RFID systems." In 2008 IEEE International Symposium on Circuits and Systems - ISCAS 2008. IEEE, 2008. http://dx.doi.org/10.1109/iscas.2008.4541591.
Full textGong, Chuanqi, Sheng Wu, and Yanmin Jing. "ARAN protocol analysis and improvement." In 2012 3rd International Conference on System Science, Engineering Design and Manufacturing Informatization (ICSEM). IEEE, 2012. http://dx.doi.org/10.1109/icssem.2012.6340883.
Full textReports on the topic "PROTOCOL ANALYSIS"
Tubesing, Philip. Protocols for Uranium Carbon Analysis - Testing Protocol Summary. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1783513.
Full textRekhter, Y. BGP Protocol Analysis. RFC Editor, 1991. http://dx.doi.org/10.17487/rfc1265.
Full textTraina, P., ed. BGP-4 Protocol Analysis. RFC Editor, 1995. http://dx.doi.org/10.17487/rfc1774.
Full textMeyer, D., and K. Patel. BGP-4 Protocol Analysis. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4274.
Full textMalkin, G. RIP Version 2 Protocol Analysis. RFC Editor, 1993. http://dx.doi.org/10.17487/rfc1387.
Full textMalkin, G. RIP Version 2 Protocol Analysis. RFC Editor, 1994. http://dx.doi.org/10.17487/rfc1721.
Full textSherry, S., and G. Meyer. Protocol Analysis for Triggered RIP. RFC Editor, 1997. http://dx.doi.org/10.17487/rfc2092.
Full textBromberger, S. Technical Analysis of SSP-21 Protocol. Office of Scientific and Technical Information (OSTI), 2017. http://dx.doi.org/10.2172/1366901.
Full textDanley, M., D. Mulligan, J. Morris, and J. Peterson. Threat Analysis of the Geopriv Protocol. RFC Editor, 2004. http://dx.doi.org/10.17487/rfc3694.
Full text