Journal articles on the topic 'PROTOCOL ANALYSIS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'PROTOCOL ANALYSIS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
S V Kharat, Gumaste. "Performance Analysis of DSR Protocol." International Journal of Scientific Engineering and Research 1, no. 3 (2013): 62–68. https://doi.org/10.70729/j201340.
Full textHussain, Kashif. "Comparative Analysis of DNA Extraction Protocols from Blood for Bovine Theileriosis." International Journal of Agriculture and Biology 34, no. 03 (2025): 340301. https://doi.org/10.17957/ijab/15.2361.
Full textLi, Fu Lin, Jie Yang, Hong Wei Zhou, and Ying Liu. "A New Dynamic Protocol Analysis Model." Advanced Materials Research 765-767 (September 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.
Full textZhao, Wen Hong. "Protocols Analysis by Base-Function." Applied Mechanics and Materials 530-531 (February 2014): 682–85. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.682.
Full textOwen, Stephen, Pearl Brereton, and David Budgen. "Protocol analysis." Communications of the ACM 49, no. 2 (2006): 117–22. http://dx.doi.org/10.1145/1113034.1113039.
Full textKOVACIK, Cyril Filip, and Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK." Acta Electrotechnica et Informatica 1335-8243, no. 1338-3957 (2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.
Full textAnggriani, Sufy, Rizki Savira Firdaus, and Windy Amanda Siwi Suherlan. "Analisis Penyimpanan Protokol Notaris Secara Elektronik." Notaire 6, no. 3 (2023): 437–48. http://dx.doi.org/10.20473/ntr.v6i3.50802.
Full textHU, YANJING, QINGQI PEI, and LIAOJUN PANG. "Instruction Clustering Analysis for Unknown Network Protocol's Abnormal Behavior." Journal of Interconnection Networks 15, no. 03n04 (2015): 1540002. http://dx.doi.org/10.1142/s0219265915400022.
Full textNeeru Kumari and Dr. Tilak Raj. "OSPF Metric Convergence and Variation Analysis During Redistribution with Routing Information Protocol." International Research Journal on Advanced Engineering and Management (IRJAEM) 2, no. 06 (2024): 1985–91. http://dx.doi.org/10.47392/irjaem.2024.0293.
Full textMuhammad Farhan, Muhammad Asif, Maaz Bin Ahmad, and Khalid Maqsood. "A Comparative Analysis of Unicast Routing Protocols for MPLS-VPN." Lahore Garrison University Research Journal of Computer Science and Information Technology 3, no. 1 (2019): 43–49. http://dx.doi.org/10.54692/lgurjcsit.2019.030167.
Full textZhao, Wen Hong. "Protocols Analysis Based on the Combination Mode of Walsh Function." Applied Mechanics and Materials 543-547 (March 2014): 3482–85. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3482.
Full textYongming Yao, Yongming Yao, Yulin Wang Yongming Yao, Weiyi Jiang Yulin Wang, Ziyuan Wang Weiyi Jiang, and Song Huang Ziyuan Wang. "PPAdroid: An Approach to Android Privacy Protocol Analysis." 網際網路技術學刊 23, no. 3 (2022): 561–71. http://dx.doi.org/10.53106/160792642022052303014.
Full textLu, Siqi, Qingdi Han, Xuyang Miao, and Yubo Liu. "Research on Security Protocol Analysis Tool SmartVerif." Journal of Physics: Conference Series 2132, no. 1 (2021): 012022. http://dx.doi.org/10.1088/1742-6596/2132/1/012022.
Full textSmith, John, Dana Kay Smith, and Eileen Kupstas. "Automated Protocol Analysis." Human-Computer Interaction 8, no. 2 (1993): 101–45. http://dx.doi.org/10.1207/s15327051hci0802_2.
Full textRekhter, Yakov. "IDRP protocol analysis." ACM SIGCOMM Computer Communication Review 22, no. 2 (1992): 17–28. http://dx.doi.org/10.1145/141800.141802.
Full textGrossman, Stephen. "Khandwalla's protocol analysis." Creativity Research Journal 7, no. 1 (1994): 93–95. http://dx.doi.org/10.1080/10400419409534515.
Full textSedgwick, P. "Per protocol analysis." BMJ 340, apr07 1 (2010): c1825. http://dx.doi.org/10.1136/bmj.c1825.
Full textGurtov, Andrei. "Performance analysis of general backoff protocols." Journal of Communications Software and Systems 4, no. 1 (2008): 13. http://dx.doi.org/10.24138/jcomss.v4i1.233.
Full textXiao, Meihua, Weiwei Song, Ke Yang, Ri OuYang, and Hanyu Zhao. "Formal Analysis of the Security Protocol with Timestamp Using SPIN." Computational Intelligence and Neuroscience 2022 (August 23, 2022): 1–11. http://dx.doi.org/10.1155/2022/2420590.
Full textByun, Ilmu. "Cooperative Hybrid-ARQ Protocols: Unified Frameworks for Protocol Analysis." ETRI Journal 33, no. 5 (2011): 759–69. http://dx.doi.org/10.4218/etrij.11.0110.0630.
Full textSyahputra, Ramdhani, Rahmadi Kurnia, and Rian Ferdian. "Analysis of FHRP Design and Implementation in RIPv2 and OSPF Routing Protocols." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 1 (2020): 102–8. http://dx.doi.org/10.29207/resti.v4i1.1490.
Full textZheng, Mingwei, Qingkai Shi, Xuwei Liu, et al. "ParDiff: Practical Static Differential Analysis of Network Protocol Parsers." Proceedings of the ACM on Programming Languages 8, OOPSLA1 (2024): 1208–34. http://dx.doi.org/10.1145/3649854.
Full textMehri-Toonabi, Ali, Mahdi Davoudi Darareh, and Shahrooz Janbaz. "High-dimensional quantum key distribution using polarization-phase encoding: security analysis." International Journal of Quantum Information 18, no. 06 (2020): 2050031. http://dx.doi.org/10.1142/s0219749920500318.
Full textJin-Ze Du, Jin-Ze Du, Jun-Wei Liu Jin-Ze Du, Tao Feng Jun-Wei Liu, and Zhan-Ting Yuan Tao Feng. "Formal Analysis and Improvement of Z-Wave Protocol." 電腦學刊 34, no. 4 (2023): 025–39. http://dx.doi.org/10.53106/199115992023083404003.
Full textDebuisschert, Thierry, and Simon Fossier. "Security analysis of the time-coding quantum key distribution protocols." Quantum Information and Computation 11, no. 11&12 (2011): 968–87. http://dx.doi.org/10.26421/qic11.11-12-7.
Full textShadi, Nashwan, and M. Alshammari Bandar. "Formal Analysis of MCAP Protocol Against Replay Attack." British Journal of Mathematics & Computer Science 22, no. 1 (2017): 1–14. https://doi.org/10.9734/BJMCS/2017/32744.
Full textLin, Wen Qi, Yi Liu, Li Meng Song, Yuan Jiao Zhang, and Fei Guo. "Comparison and Analysis of MAC Protocol in Multimedia Communications." Applied Mechanics and Materials 519-520 (February 2014): 496–99. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.496.
Full textXiao, Meihua, Lina Chen, Ke Yang, and Zehuan Li. "Formal Analysis of Rational Exchange Protocols Based on the Improved Buttyan Model." Symmetry 17, no. 7 (2025): 1033. https://doi.org/10.3390/sym17071033.
Full textKang, Baoyuan, Yanbao Han, Kun Qian, and Jianqi Du. "Analysis and Improvement on an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment." Mathematical Problems in Engineering 2020 (June 23, 2020): 1–6. http://dx.doi.org/10.1155/2020/1970798.
Full textShi, Lu-Feng, Karen A. Doherty, Tammy M. Kordas, and Joseph T. Pellegrino. "Short-Term and Long-Term Hearing Aid Benefit and User Satisfaction: A Comparison between Two Fitting Protocols." Journal of the American Academy of Audiology 18, no. 06 (2007): 482–95. http://dx.doi.org/10.3766/jaaa.18.6.3.
Full textDey, Tanay, M. M. A. Hashem, and Subroto Kumar Mondal. "ON PERFORMANCE ANALYSIS OF AMBR PROTOCOL IN MOBILE AD HOC NETWORKS." IIUM Engineering Journal 11, no. 2 (2010): 240–54. http://dx.doi.org/10.31436/iiumej.v11i2.28.
Full textSarvaiya, Ms Shilpa B. "Analysis of IoT Data Transfer Messaging Protocols on Application Layer." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 1812–19. http://dx.doi.org/10.22214/ijraset.2022.45604.
Full textVasudha and Bhola Anoop. "Comprehensive Analysis on Cluster based Hierarchical Routing Protocols for Wireless Sensor Networks." Journal of Switching Hub 4, no. 1 (2019): 1–9. https://doi.org/10.5281/zenodo.2537434.
Full textRahul, Desai, P. Patil B, and Pal Sharma Davinder. "Routing Protocols for Mobile Ad Hoc Network: A Survey and Analysis." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (2017): 795–801. https://doi.org/10.11591/ijeecs.v7.i3.pp795-801.
Full textAbdulhameed, N. Hameed, Abdulghani Alabady Salah, and A. Thanoon Mohammad. "Performance analysis and evaluation of distance vector and link state routing protocols over a large area networks." TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 20, no. 6 (2022): 1189–99. https://doi.org/10.12928/telkomnika.v20i6.22211.
Full textAhsan, Usama, Muhammad Mubashir Khan, Asad Arfeen, and Khadija Azam. "Security analysis of KXB10 QKD protocol with higher-dimensional quantum states." International Journal of Quantum Information 18, no. 08 (2020): 2150005. http://dx.doi.org/10.1142/s0219749921500052.
Full textMaurya, Indubala, and Rakesh Garg. "Systematic review meta-analysis protocol preparation and registration – A narrative review." Indian Journal of Anaesthesia 69, no. 1 (2025): 132–37. https://doi.org/10.4103/ija.ija_1165_24.
Full textSabeeruddin, Shaik. "Comparative Analysis of Network Security Controls in the Modern Era." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 6 (2022): 1–7. https://doi.org/10.5281/zenodo.14866540.
Full textZain, Alaa, Heba El-khobby, Hatem M. Abd Elkader, and Mostafa Abdelnaby. "MANETs performance analysis with dos attack at different routing protocols." International Journal of Engineering & Technology 4, no. 2 (2015): 390. http://dx.doi.org/10.14419/ijet.v4i2.4609.
Full textWang, Wei, and Qing Feng Cheng. "Analysis of Two ID-Based Key Exchange Protocols." Applied Mechanics and Materials 135-136 (October 2011): 289–93. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.289.
Full textFeng, Tao, and Yi Wu. "Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol." Security and Communication Networks 2022 (July 12, 2022): 1–19. http://dx.doi.org/10.1155/2022/8104884.
Full textFlinn, Barry, Savanah Dale, Andrew Disharoon, and Stephen Kresovich. "Comparative Analysis of In Vitro Responses and Regeneration between Diverse Bioenergy Sorghum Genotypes." Plants 9, no. 2 (2020): 248. http://dx.doi.org/10.3390/plants9020248.
Full textShaefer, Jeffry R., Cara Joy Riley, Paul Caruso, and David Keith. "Analysis of Criteria for MRI Diagnosis of TMJ Disc Displacement and Arthralgia." International Journal of Dentistry 2012 (2012): 1–8. http://dx.doi.org/10.1155/2012/283163.
Full textFeng, Tao, Taining Chen, and Xiang Gong. "Formal Security Analysis of ISA100.11a Standard Protocol Based on Colored Petri Net Tool." Information 15, no. 2 (2024): 118. http://dx.doi.org/10.3390/info15020118.
Full textKaur, Arshdeep, Sandeep Kumar Arora, and Mahedi Masud. "Comparative Analysis of Clustering using AODV DSDV and CBRP." International Journal of Engineering & Technology 7, no. 3.8 (2018): 131. http://dx.doi.org/10.14419/ijet.v7i3.8.16847.
Full textDesai, Rahul M., B. P. Patil, and Davinder Pal Sharma. "Routing Protocols for Mobile Ad Hoc Network - A Survey and Analysis." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (2017): 795. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp795-801.
Full textWang, Qun, Zhonghao Sun, Zhangquan Wang, et al. "A Practical Format and Semantic Reverse Analysis Approach for Industrial Control Protocols." Security and Communication Networks 2021 (March 12, 2021): 1–11. http://dx.doi.org/10.1155/2021/6690988.
Full textKaranasiou, A., E. Diapouli, M. Viana, et al. "On the quantification of atmospheric carbonate carbon by thermal/optical analysis protocols." Atmospheric Measurement Techniques Discussions 3, no. 6 (2010): 5375–409. http://dx.doi.org/10.5194/amtd-3-5375-2010.
Full textSong, Daegene. "Numerical Analysis in Entanglement Swapping Protocols." NeuroQuantology 20, no. 2 (2022): 153–57. http://dx.doi.org/10.14704/nq.2022.20.2.nq22083.
Full textK.Thamizhmaran. "Optimization Link Sate Routing Analysis with Destination Sequenced Distance Vector for MANET." Journal of Research in Electrical Power System 1, no. 1 (2025): 31–37. https://doi.org/10.5281/zenodo.15210274.
Full text