Academic literature on the topic 'PROTOCOL ANALYSIS'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'PROTOCOL ANALYSIS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "PROTOCOL ANALYSIS"

1

S V Kharat, Gumaste. "Performance Analysis of DSR Protocol." International Journal of Scientific Engineering and Research 1, no. 3 (2013): 62–68. https://doi.org/10.70729/j201340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hussain, Kashif. "Comparative Analysis of DNA Extraction Protocols from Blood for Bovine Theileriosis." International Journal of Agriculture and Biology 34, no. 03 (2025): 340301. https://doi.org/10.17957/ijab/15.2361.

Full text
Abstract:
Genomic DNA serves as the foundation for molecular research and advancements including disease sureveillance, biodiversity conservation and environmental monitoring etc. Cost-effectiveness coupled with DNA quality and quantity are prerequisites for molecular tools, which depend on extraction protocols. The current study compared four DNA extraction protocols to evaluate DNA quantity, integrity, purity, cost-effectiveness and suitability for detecting theileriosis. The DNA concentration with 100 µL of blood was highest for Tris-HCL EDTA protocol (A) 209.6 ng/µL, followed by phenol-chloroform pr
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Fu Lin, Jie Yang, Hong Wei Zhou, and Ying Liu. "A New Dynamic Protocol Analysis Model." Advanced Materials Research 765-767 (September 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.

Full text
Abstract:
Traditional static analysis methods such as formal validation and theorem proving were used to analyze protocols security previously. These methods can not measure and evaluate actual security of protocols accurately for the setting and suppose are far from the actual conditions. This paper proposes a new dynamic protocol analysis model. The system based on the model can be used to active test in actual running conditions, analyze known protocols security, integrity, robustness, and analyze unknown protocols online, provide support for protocol designer. The systems structure, working flow and
APA, Harvard, Vancouver, ISO, and other styles
4

Zhao, Wen Hong. "Protocols Analysis by Base-Function." Applied Mechanics and Materials 530-531 (February 2014): 682–85. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.682.

Full text
Abstract:
A new description method of protocol structure is presented by base-function firstly. Then, a protocol analysis method base on it is proposed. To analyses the private protocols, a new self-learning algorithm is discussed. Finally, the flow of protocol analysis based on base-function is given. Experiment results show the efficiency of presented method.
APA, Harvard, Vancouver, ISO, and other styles
5

Owen, Stephen, Pearl Brereton, and David Budgen. "Protocol analysis." Communications of the ACM 49, no. 2 (2006): 117–22. http://dx.doi.org/10.1145/1113034.1113039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

KOVACIK, Cyril Filip, and Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK." Acta Electrotechnica et Informatica 1335-8243, no. 1338-3957 (2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.

Full text
Abstract:
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end devices, determination of the operational properties of this implementation, and their comparison in different conditions. VoIP traffic is compared at different bandwidths and implemented by different configurations of IP protocols. By investigated implementations of IP protocols are meant IPv4, IPv6, and IPv4 protocol with applied NAT. As part
APA, Harvard, Vancouver, ISO, and other styles
7

Anggriani, Sufy, Rizki Savira Firdaus, and Windy Amanda Siwi Suherlan. "Analisis Penyimpanan Protokol Notaris Secara Elektronik." Notaire 6, no. 3 (2023): 437–48. http://dx.doi.org/10.20473/ntr.v6i3.50802.

Full text
Abstract:
AbstractThe collapse of the efficiency of notary protocol storage that is carried out physically has resulted in the idea of developing a way for a notary to store the notary protocol, by transferring the storage media into electronic form. Thus, access in submitting notary protocols to the notary receiving the protocol is seen as more efficient because it involves technological advances. This research aims to analyze the importance of notary protocols being stored electronically and to analyze the criteria for notaries receiving electronic notary protocols. In this research, normative researc
APA, Harvard, Vancouver, ISO, and other styles
8

HU, YANJING, QINGQI PEI, and LIAOJUN PANG. "Instruction Clustering Analysis for Unknown Network Protocol's Abnormal Behavior." Journal of Interconnection Networks 15, no. 03n04 (2015): 1540002. http://dx.doi.org/10.1142/s0219265915400022.

Full text
Abstract:
Protocol's abnormal behavior analysis is an important task in protocol reverse analysis. Traditional protocol reverse analysis focus on the protocol message format, but protocol behavior especially the abnormal behavior is rare studied. In this paper, protocol behavior is represented by the labeled behavior instruction sequences. Similar behavior instruction sequences mean the similar protocol behavior. Using our developed virtual analysis platform HiddenDisc, we can capture a variety of known or unknown protocols' behavior instruction sequences. All kinds of executed or unexecuted instruction
APA, Harvard, Vancouver, ISO, and other styles
9

Neeru Kumari and Dr. Tilak Raj. "OSPF Metric Convergence and Variation Analysis During Redistribution with Routing Information Protocol." International Research Journal on Advanced Engineering and Management (IRJAEM) 2, no. 06 (2024): 1985–91. http://dx.doi.org/10.47392/irjaem.2024.0293.

Full text
Abstract:
Open Shortest Path First networking protocol falls under the category of Interior gateway routing protocols and is multi-vendor supported. The task of OSPF like any other routing protocol is to calculate the best path between source IP address and destination IP address within the organisation computer network. There are various other routing protocols like Routing Information Protocol, Border Gateway Protocol, Intermediate System - Intermediate System (IS-IS), Enhanced Interior Gateway Routing Protocol, etc. which are used in computer network. Routing protocols have different algorithms throu
APA, Harvard, Vancouver, ISO, and other styles
10

Muhammad Farhan, Muhammad Asif, Maaz Bin Ahmad, and Khalid Maqsood. "A Comparative Analysis of Unicast Routing Protocols for MPLS-VPN." Lahore Garrison University Research Journal of Computer Science and Information Technology 3, no. 1 (2019): 43–49. http://dx.doi.org/10.54692/lgurjcsit.2019.030167.

Full text
Abstract:
MPLS-VPN technology is introduced to provide secure transmission with minimum propagation delay. This paper presents a comparative analysis of unicast routing protocols for MPLSVPN enabled networks. The motive behind this analysis is to observe the consequence of unicast routing protocols on the performance of MPLS-VPN enabled networks and to choose most suitable routing protocol for such type of networks. To conduct the analysis, a test bed is established in GNS3 simulator. Three main unicast routing protocols i.e. Enhanced Interior Gateway Routing Protocol (EIGRP), Open Shortest Path First (
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "PROTOCOL ANALYSIS"

1

Brachfeld, Lawrence J. "Mobile internet protocol analysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369385.

Full text
Abstract:
Thesis (M.S. Computer Science) Naval Postgraduate School, September 1999.<br>"September 1999". Thesis advisor(s): Bert Lundy, Wolfgang Baer. Includes bibliographical references (p. 53). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
2

Kovan, Gerry. "SPP Secure Payment Protocol: Protocol Analysis, Implementation and Extensions." Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1079.

Full text
Abstract:
Internet commerce continues to grow rapidly. Over 60% of US households use the internet to shop online. A secure payment protocol is required to support this rapid growth. A new payment protocol was recently invented at IBM. We refer to the protocol as SPP or Secure Payment Protocol. This thesis presents a protocol analysis of SPP. It is essential that a thorough security analysis be done on any new payment protocol so that we can better understand its security properties. We first develop a method for analyzing payment protocols. This method includes a list of desi
APA, Harvard, Vancouver, ISO, and other styles
3

O'Shea, Nicholas. "Verification and validation of security protocol implementations." Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4753.

Full text
Abstract:
Security protocols are important and widely used because they enable secure communication to take place over insecure networks. Over the years numerous formal methods have been developed to assist protocol designers by analysing models of these protocols to determine their security properties. Beyond the design stage however, developers rarely employ formal methods when implementing security protocols. This may result in implementation flaws often leading to security breaches. This dissertation contributes to the study of security protocol analysis by advancing the emerging field of implementa
APA, Harvard, Vancouver, ISO, and other styles
4

Dobson, Lucas E. "Security analysis of session initiation protocol." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDobson.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2010.<br>Thesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
5

Araya, Cristian, and Manjinder Singh. "Web API protocol and security analysis." Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208934.

Full text
Abstract:
There is problem that every company has its own customer portal. This problem can be solved by creating a platform that gathers all customers’ portals in one place. For such platform, it is required a web API protocol that is fast, secure and has capacity for many users. Consequently, a survey of various web API protocols has been made by testing their performance and security. The task was to find out which web API protocol offered high security as well as high performance in terms of response time both at low and high load. This included an investigation of previous work to find out if certa
APA, Harvard, Vancouver, ISO, and other styles
6

Jayaswal, Tanu. "Events-induced tourism: a protocol analysis." AUT University, 2010. http://hdl.handle.net/10292/897.

Full text
Abstract:
Many destinations throughout the world have developed events portfolios as a strategic initiative to attract tourists and their associated economic benefits. The ability of events to attract people to a destination for the purpose of attending the event is well documented. However the ability of an event to add value to attract tourists before or after the event is not so clear. In other words, can an events portfolio positively influence the decision to visit a destination at a time when none of the promoted events are scheduled? As a first step towards answering this important question, this
APA, Harvard, Vancouver, ISO, and other styles
7

Jang, Beakcheol. "Wireless MAC Protocol Design and Analysis." NCSU, 2009. http://www.lib.ncsu.edu/theses/available/etd-05262009-175059/.

Full text
Abstract:
Wireless networks are becoming very common due to their advantages such as rapid deployment and support for mobility. In this dissertation, we design and analyze the Medium Access Control (MAC) protocol for two popular wireless networks: Wireless Sensor Networks (WSNs) and Wireless Local Area Networks (WLANs). For WSNs, we design and analyze an energy efficient MAC protocols. Energy efficiency is a key design factor of a MAC protocol for WSNs. Existing preamble-sampling based MAC protocols have large overheads due to their preambles and are inefficient at large wakeup intervals. Synchronous sc
APA, Harvard, Vancouver, ISO, and other styles
8

Lu, Chun, and Jian Song. "Protocol Analysis for Networked Acquirement System." International Foundation for Telemetering, 2014. http://hdl.handle.net/10150/577516.

Full text
Abstract:
ITC/USA 2014 Conference Proceedings / The Fiftieth Annual International Telemetering Conference and Technical Exhibition / October 20-23, 2014 / Town and Country Resort & Convention Center, San Diego, CA<br>This paper analyzed protocols may be used in each layer in networked telemetry systems, and also presents some deeper researches of the advantages of using synchronous time-division for the physical layer of a networked telemetry system.
APA, Harvard, Vancouver, ISO, and other styles
9

Hsu, Yating. "Formal Analysis of Network Protocol Security." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1317230784.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chu, Peil-Ying Mark. "Towards automating protocol synthesis and analysis /." The Ohio State University, 1989. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487598303840366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "PROTOCOL ANALYSIS"

1

New Zealand. Ministry for the Environment., ed. Solid waste analysis protocol. Ministry for the Environment, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Burns, Kevin. TCP/IP analysis and troubleshooting toolkit. Wiley Pub., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hodgson. Novell Netware protocol and network analysis. University of Manchester, Department of Computer Science, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1916-, Simon Herbert A., ed. Protocol analysis: Verbal reports as data. MIT Press, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

1916-, Simon Herbert Alexander, ed. Protocol analysis: Verbal reports as data. MIT Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Boyle, Robert J. Engineering analysis using a web-based protocol. National Aeronautics and Space Administration, Glenn Research Center, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

K, Luke Nancy, and Intelligent Buildings Institute Foundation, eds. Global protocol review & end-user needs analysis. The Foundation, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Song, Wei, Peijian Ju, and A.-Long Jin. Protocol Design and Analysis for Cooperative Wireless Networks. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-47726-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ontario. Ministry of the Environment. Laboratory Services Branch., ed. Protocol of accepted drinking water testing methods. Ministry of the Environment, Laboratory Services Branch, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Baker, Robert E. A study of novice systems analysts' problem solving behaviors using protocol analysis. Naval Postgraduate School, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "PROTOCOL ANALYSIS"

1

Ericsson, K. Anders. "Protocol Analysis." In A Companion to Cognitive Science. Blackwell Publishing Ltd, 2017. http://dx.doi.org/10.1002/9781405164535.ch33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nahler, Gerhard. "per-protocol analysis." In Dictionary of Pharmaceutical Medicine. Springer Vienna, 2009. http://dx.doi.org/10.1007/978-3-211-89836-9_1033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dong, Ling, and Kefei Chen. "Formalism of Protocol Security Analysis." In Cryptographic Protocol. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-24073-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dong, Ling, and Kefei Chen. "Informal Analysis Schemes of Cryptographic Protocols." In Cryptographic Protocol. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-24073-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dong, Ling, and Kefei Chen. "Security Analysis of Real World Protocols." In Cryptographic Protocol. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-24073-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rzempoluck, Edward J. "A Data Analysis Protocol." In Neural Network Data Analysis Using Simulnet™. Springer New York, 1998. http://dx.doi.org/10.1007/978-1-4612-1746-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Aparicio-Sánchez, Damián, Santiago Escobar, Catherine Meadows, José Meseguer, and Julia Sapiña. "Protocol Analysis with Time." In Progress in Cryptology – INDOCRYPT 2020. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65277-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Raymond Choo, Kim-Kwang. "Complementing Computational Protocol Analysis." In Advances in Information Security. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-87969-7_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Szymoniak, Sabina. "KaoChow Protocol Timed Analysis." In Advances in Soft and Hard Computing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03314-9_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Agapito, Giuseppe, and Mariamena Arbitrio. "Microarray Data Analysis Protocol." In Methods in Molecular Biology. Springer US, 2021. http://dx.doi.org/10.1007/978-1-0716-1839-4_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "PROTOCOL ANALYSIS"

1

Cai, Liujia, Tong Yu, Yumeng Li, et al. "SyntaxBridge: Protocol Description Transformer for Enhanced Formal Analysis of Security Protocols." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tan, Yang, and Bo Lv. "Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections." In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121209.

Full text
Abstract:
In 2012, De Cristofaro et al. proposed a protocol to calculate the Private Set Intersection and Union cardinality (PSI-CA and PSU-CA). This protocol's security is based on the famous DDH assumption. Since its publication, it has gained lots of popularity because of its efficiency (linear complexity in computation and communication) and concision. So far, it's still considered one of the most efficient PSI-CA protocols and the most cited (more than 170 citations) PSI-CA paper based on the Google Scholar search. However, when we tried to implement this protocol, we couldn't get the correct resul
APA, Harvard, Vancouver, ISO, and other styles
3

Tiflea, Denisa-Ionela. "Vulnerabilities of LRSAS Protocol." In 12th International Conference on Electronics, Communications and Computing. Technical University of Moldova, 2022. http://dx.doi.org/10.52326/ic-ecco.2022/sec.07.

Full text
Abstract:
The construction of secure and private RFID protocols is necessary with the increasing application of RFID technology in increasingly diverse fields. While security refers to unilateral or mutual authentication depending on the protocol, privacy is a more elaborate concept to which many studies and research have been dedicated. Unfortunately, many RFID protocols are still being developed without consistent security and privacy analysis in well-defined models, such as the Vaudenay model. In this paper, we aim to prove that a recently proposed authentication protocol, LRSAS, does not achieve any
APA, Harvard, Vancouver, ISO, and other styles
4

Plummer, Richard W. "SDLC protocol throughput analysis." In the 17th conference. ACM Press, 1985. http://dx.doi.org/10.1145/21850.253380.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jacobson, D. W. "Network protocol analysis (abstract)." In the 1986 ACM fourteenth annual conference. ACM Press, 1986. http://dx.doi.org/10.1145/324634.325067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

QasMarrogy, Ghassan. "Practical Analysis of IEEE 802.11ax Wireless Protocol in Wi-Fi Boosters Environments." In 3rd International Conference of Mathematics and its Applications. Salahaddin University-Erbil, 2020. http://dx.doi.org/10.31972/ticma22.04.

Full text
Abstract:
All the world now is depending on networks to share information between the users, where different data types are transferred wirelessly from network to network. Using wireless LANs are important to connect the users and share the data, these Wireless LANs have different types of obstacles that affect the data sharing or the wireless signal, such as, compatibility wireless protocol types, range coverage, walls penetration, moving devices, different routing protocols, data transferred types, weak signal, and many more. In this paper a practical analysis will be made to the latest IEEE 802.11ax
APA, Harvard, Vancouver, ISO, and other styles
7

Dorst, Kees, and Nigel Cross. "Protocol Analysis As a Research Technique for Analysing Design Activity." In ASME 1995 Design Engineering Technical Conferences collocated with the ASME 1995 15th International Computers in Engineering Conference and the ASME 1995 9th Annual Engineering Database Symposium. American Society of Mechanical Engineers, 1995. http://dx.doi.org/10.1115/detc1995-0190.

Full text
Abstract:
Abstract This paper offers a review of protocol analysis as a research technique for the investigation of design activity. It draws particularly on the results of a special international research workshop on protocol analysis of design activity, held in Delft, The Netherlands, in September 1994. The paper identifies major themes and issues in the use of protocol analysis arising from the workshop.
APA, Harvard, Vancouver, ISO, and other styles
8

"Performance Analysis of Basic Automatic Repeat Request Protocols and Hybrid Automatic Repeat Request Protocol." In 4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022). Cihan University, 2022. http://dx.doi.org/10.24086/cocos2022/paper.567.

Full text
Abstract:
The size of network and internet traffic is rising spontaneously by the day, with data usage at zettabyte to petabyte scale at an exponential high rate and therefore considered to generate huge traffic along the way which causes the chance of error in transmission to be high as well. Automatic Repeat Request (ARQ) protocol is an error control function for data transmission that uses acknowledgements. These protocols exist in Data link or Transport layers. ARQ is categorize into three major types such as Stop and wait, Go Bank N and Selective Repeat. Hybrid automatic repeat (HARQ) request which
APA, Harvard, Vancouver, ISO, and other styles
9

Berhea, Mohammed, Chunhong Chen, and Q. M. Jonathan Wu. "Protocol-level performance analysis for anti-collision protocols in RFID systems." In 2008 IEEE International Symposium on Circuits and Systems - ISCAS 2008. IEEE, 2008. http://dx.doi.org/10.1109/iscas.2008.4541591.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gong, Chuanqi, Sheng Wu, and Yanmin Jing. "ARAN protocol analysis and improvement." In 2012 3rd International Conference on System Science, Engineering Design and Manufacturing Informatization (ICSEM). IEEE, 2012. http://dx.doi.org/10.1109/icssem.2012.6340883.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "PROTOCOL ANALYSIS"

1

Tubesing, Philip. Protocols for Uranium Carbon Analysis - Testing Protocol Summary. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1783513.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Moy, J. OSPF Protocol Analysis. RFC Editor, 1991. http://dx.doi.org/10.17487/rfc1245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rekhter, Y. BGP Protocol Analysis. RFC Editor, 1991. http://dx.doi.org/10.17487/rfc1265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Traina, P., ed. BGP-4 Protocol Analysis. RFC Editor, 1995. http://dx.doi.org/10.17487/rfc1774.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Meyer, D., and K. Patel. BGP-4 Protocol Analysis. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4274.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Malkin, G. RIP Version 2 Protocol Analysis. RFC Editor, 1993. http://dx.doi.org/10.17487/rfc1387.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Malkin, G. RIP Version 2 Protocol Analysis. RFC Editor, 1994. http://dx.doi.org/10.17487/rfc1721.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sherry, S., and G. Meyer. Protocol Analysis for Triggered RIP. RFC Editor, 1997. http://dx.doi.org/10.17487/rfc2092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bromberger, S. Technical Analysis of SSP-21 Protocol. Office of Scientific and Technical Information (OSTI), 2017. http://dx.doi.org/10.2172/1366901.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Danley, M., D. Mulligan, J. Morris, and J. Peterson. Threat Analysis of the Geopriv Protocol. RFC Editor, 2004. http://dx.doi.org/10.17487/rfc3694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!