Gotowa bibliografia na temat „PROTOCOL ANALYSIS”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „PROTOCOL ANALYSIS”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "PROTOCOL ANALYSIS"

1

S V Kharat, Gumaste. "Performance Analysis of DSR Protocol." International Journal of Scientific Engineering and Research 1, no. 3 (2013): 62–68. https://doi.org/10.70729/j201340.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Hussain, Kashif. "Comparative Analysis of DNA Extraction Protocols from Blood for Bovine Theileriosis." International Journal of Agriculture and Biology 34, no. 03 (2025): 340301. https://doi.org/10.17957/ijab/15.2361.

Pełny tekst źródła
Streszczenie:
Genomic DNA serves as the foundation for molecular research and advancements including disease sureveillance, biodiversity conservation and environmental monitoring etc. Cost-effectiveness coupled with DNA quality and quantity are prerequisites for molecular tools, which depend on extraction protocols. The current study compared four DNA extraction protocols to evaluate DNA quantity, integrity, purity, cost-effectiveness and suitability for detecting theileriosis. The DNA concentration with 100 µL of blood was highest for Tris-HCL EDTA protocol (A) 209.6 ng/µL, followed by phenol-chloroform pr
Style APA, Harvard, Vancouver, ISO itp.
3

Li, Fu Lin, Jie Yang, Hong Wei Zhou, and Ying Liu. "A New Dynamic Protocol Analysis Model." Advanced Materials Research 765-767 (September 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.

Pełny tekst źródła
Streszczenie:
Traditional static analysis methods such as formal validation and theorem proving were used to analyze protocols security previously. These methods can not measure and evaluate actual security of protocols accurately for the setting and suppose are far from the actual conditions. This paper proposes a new dynamic protocol analysis model. The system based on the model can be used to active test in actual running conditions, analyze known protocols security, integrity, robustness, and analyze unknown protocols online, provide support for protocol designer. The systems structure, working flow and
Style APA, Harvard, Vancouver, ISO itp.
4

Zhao, Wen Hong. "Protocols Analysis by Base-Function." Applied Mechanics and Materials 530-531 (February 2014): 682–85. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.682.

Pełny tekst źródła
Streszczenie:
A new description method of protocol structure is presented by base-function firstly. Then, a protocol analysis method base on it is proposed. To analyses the private protocols, a new self-learning algorithm is discussed. Finally, the flow of protocol analysis based on base-function is given. Experiment results show the efficiency of presented method.
Style APA, Harvard, Vancouver, ISO itp.
5

Owen, Stephen, Pearl Brereton, and David Budgen. "Protocol analysis." Communications of the ACM 49, no. 2 (2006): 117–22. http://dx.doi.org/10.1145/1113034.1113039.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

KOVACIK, Cyril Filip, and Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK." Acta Electrotechnica et Informatica 1335-8243, no. 1338-3957 (2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.

Pełny tekst źródła
Streszczenie:
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end devices, determination of the operational properties of this implementation, and their comparison in different conditions. VoIP traffic is compared at different bandwidths and implemented by different configurations of IP protocols. By investigated implementations of IP protocols are meant IPv4, IPv6, and IPv4 protocol with applied NAT. As part
Style APA, Harvard, Vancouver, ISO itp.
7

Anggriani, Sufy, Rizki Savira Firdaus, and Windy Amanda Siwi Suherlan. "Analisis Penyimpanan Protokol Notaris Secara Elektronik." Notaire 6, no. 3 (2023): 437–48. http://dx.doi.org/10.20473/ntr.v6i3.50802.

Pełny tekst źródła
Streszczenie:
AbstractThe collapse of the efficiency of notary protocol storage that is carried out physically has resulted in the idea of developing a way for a notary to store the notary protocol, by transferring the storage media into electronic form. Thus, access in submitting notary protocols to the notary receiving the protocol is seen as more efficient because it involves technological advances. This research aims to analyze the importance of notary protocols being stored electronically and to analyze the criteria for notaries receiving electronic notary protocols. In this research, normative researc
Style APA, Harvard, Vancouver, ISO itp.
8

HU, YANJING, QINGQI PEI, and LIAOJUN PANG. "Instruction Clustering Analysis for Unknown Network Protocol's Abnormal Behavior." Journal of Interconnection Networks 15, no. 03n04 (2015): 1540002. http://dx.doi.org/10.1142/s0219265915400022.

Pełny tekst źródła
Streszczenie:
Protocol's abnormal behavior analysis is an important task in protocol reverse analysis. Traditional protocol reverse analysis focus on the protocol message format, but protocol behavior especially the abnormal behavior is rare studied. In this paper, protocol behavior is represented by the labeled behavior instruction sequences. Similar behavior instruction sequences mean the similar protocol behavior. Using our developed virtual analysis platform HiddenDisc, we can capture a variety of known or unknown protocols' behavior instruction sequences. All kinds of executed or unexecuted instruction
Style APA, Harvard, Vancouver, ISO itp.
9

Neeru Kumari and Dr. Tilak Raj. "OSPF Metric Convergence and Variation Analysis During Redistribution with Routing Information Protocol." International Research Journal on Advanced Engineering and Management (IRJAEM) 2, no. 06 (2024): 1985–91. http://dx.doi.org/10.47392/irjaem.2024.0293.

Pełny tekst źródła
Streszczenie:
Open Shortest Path First networking protocol falls under the category of Interior gateway routing protocols and is multi-vendor supported. The task of OSPF like any other routing protocol is to calculate the best path between source IP address and destination IP address within the organisation computer network. There are various other routing protocols like Routing Information Protocol, Border Gateway Protocol, Intermediate System - Intermediate System (IS-IS), Enhanced Interior Gateway Routing Protocol, etc. which are used in computer network. Routing protocols have different algorithms throu
Style APA, Harvard, Vancouver, ISO itp.
10

Muhammad Farhan, Muhammad Asif, Maaz Bin Ahmad, and Khalid Maqsood. "A Comparative Analysis of Unicast Routing Protocols for MPLS-VPN." Lahore Garrison University Research Journal of Computer Science and Information Technology 3, no. 1 (2019): 43–49. http://dx.doi.org/10.54692/lgurjcsit.2019.030167.

Pełny tekst źródła
Streszczenie:
MPLS-VPN technology is introduced to provide secure transmission with minimum propagation delay. This paper presents a comparative analysis of unicast routing protocols for MPLSVPN enabled networks. The motive behind this analysis is to observe the consequence of unicast routing protocols on the performance of MPLS-VPN enabled networks and to choose most suitable routing protocol for such type of networks. To conduct the analysis, a test bed is established in GNS3 simulator. Three main unicast routing protocols i.e. Enhanced Interior Gateway Routing Protocol (EIGRP), Open Shortest Path First (
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "PROTOCOL ANALYSIS"

1

Brachfeld, Lawrence J. "Mobile internet protocol analysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369385.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. Computer Science) Naval Postgraduate School, September 1999.<br>"September 1999". Thesis advisor(s): Bert Lundy, Wolfgang Baer. Includes bibliographical references (p. 53). Also available online.
Style APA, Harvard, Vancouver, ISO itp.
2

Kovan, Gerry. "SPP Secure Payment Protocol: Protocol Analysis, Implementation and Extensions." Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1079.

Pełny tekst źródła
Streszczenie:
Internet commerce continues to grow rapidly. Over 60% of US households use the internet to shop online. A secure payment protocol is required to support this rapid growth. A new payment protocol was recently invented at IBM. We refer to the protocol as SPP or Secure Payment Protocol. This thesis presents a protocol analysis of SPP. It is essential that a thorough security analysis be done on any new payment protocol so that we can better understand its security properties. We first develop a method for analyzing payment protocols. This method includes a list of desi
Style APA, Harvard, Vancouver, ISO itp.
3

O'Shea, Nicholas. "Verification and validation of security protocol implementations." Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4753.

Pełny tekst źródła
Streszczenie:
Security protocols are important and widely used because they enable secure communication to take place over insecure networks. Over the years numerous formal methods have been developed to assist protocol designers by analysing models of these protocols to determine their security properties. Beyond the design stage however, developers rarely employ formal methods when implementing security protocols. This may result in implementation flaws often leading to security breaches. This dissertation contributes to the study of security protocol analysis by advancing the emerging field of implementa
Style APA, Harvard, Vancouver, ISO itp.
4

Dobson, Lucas E. "Security analysis of session initiation protocol." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDobson.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2010.<br>Thesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
Style APA, Harvard, Vancouver, ISO itp.
5

Araya, Cristian, and Manjinder Singh. "Web API protocol and security analysis." Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208934.

Pełny tekst źródła
Streszczenie:
There is problem that every company has its own customer portal. This problem can be solved by creating a platform that gathers all customers’ portals in one place. For such platform, it is required a web API protocol that is fast, secure and has capacity for many users. Consequently, a survey of various web API protocols has been made by testing their performance and security. The task was to find out which web API protocol offered high security as well as high performance in terms of response time both at low and high load. This included an investigation of previous work to find out if certa
Style APA, Harvard, Vancouver, ISO itp.
6

Jayaswal, Tanu. "Events-induced tourism: a protocol analysis." AUT University, 2010. http://hdl.handle.net/10292/897.

Pełny tekst źródła
Streszczenie:
Many destinations throughout the world have developed events portfolios as a strategic initiative to attract tourists and their associated economic benefits. The ability of events to attract people to a destination for the purpose of attending the event is well documented. However the ability of an event to add value to attract tourists before or after the event is not so clear. In other words, can an events portfolio positively influence the decision to visit a destination at a time when none of the promoted events are scheduled? As a first step towards answering this important question, this
Style APA, Harvard, Vancouver, ISO itp.
7

Jang, Beakcheol. "Wireless MAC Protocol Design and Analysis." NCSU, 2009. http://www.lib.ncsu.edu/theses/available/etd-05262009-175059/.

Pełny tekst źródła
Streszczenie:
Wireless networks are becoming very common due to their advantages such as rapid deployment and support for mobility. In this dissertation, we design and analyze the Medium Access Control (MAC) protocol for two popular wireless networks: Wireless Sensor Networks (WSNs) and Wireless Local Area Networks (WLANs). For WSNs, we design and analyze an energy efficient MAC protocols. Energy efficiency is a key design factor of a MAC protocol for WSNs. Existing preamble-sampling based MAC protocols have large overheads due to their preambles and are inefficient at large wakeup intervals. Synchronous sc
Style APA, Harvard, Vancouver, ISO itp.
8

Lu, Chun, and Jian Song. "Protocol Analysis for Networked Acquirement System." International Foundation for Telemetering, 2014. http://hdl.handle.net/10150/577516.

Pełny tekst źródła
Streszczenie:
ITC/USA 2014 Conference Proceedings / The Fiftieth Annual International Telemetering Conference and Technical Exhibition / October 20-23, 2014 / Town and Country Resort & Convention Center, San Diego, CA<br>This paper analyzed protocols may be used in each layer in networked telemetry systems, and also presents some deeper researches of the advantages of using synchronous time-division for the physical layer of a networked telemetry system.
Style APA, Harvard, Vancouver, ISO itp.
9

Hsu, Yating. "Formal Analysis of Network Protocol Security." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1317230784.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Chu, Peil-Ying Mark. "Towards automating protocol synthesis and analysis /." The Ohio State University, 1989. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487598303840366.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Książki na temat "PROTOCOL ANALYSIS"

1

New Zealand. Ministry for the Environment., ed. Solid waste analysis protocol. Ministry for the Environment, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Burns, Kevin. TCP/IP analysis and troubleshooting toolkit. Wiley Pub., 2003.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Hodgson. Novell Netware protocol and network analysis. University of Manchester, Department of Computer Science, 1996.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

1916-, Simon Herbert A., ed. Protocol analysis: Verbal reports as data. MIT Press, 1985.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

1916-, Simon Herbert Alexander, ed. Protocol analysis: Verbal reports as data. MIT Press, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Boyle, Robert J. Engineering analysis using a web-based protocol. National Aeronautics and Space Administration, Glenn Research Center, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

K, Luke Nancy, and Intelligent Buildings Institute Foundation, eds. Global protocol review & end-user needs analysis. The Foundation, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Song, Wei, Peijian Ju, and A.-Long Jin. Protocol Design and Analysis for Cooperative Wireless Networks. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-47726-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Ontario. Ministry of the Environment. Laboratory Services Branch., ed. Protocol of accepted drinking water testing methods. Ministry of the Environment, Laboratory Services Branch, 2003.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Baker, Robert E. A study of novice systems analysts' problem solving behaviors using protocol analysis. Naval Postgraduate School, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Części książek na temat "PROTOCOL ANALYSIS"

1

Ericsson, K. Anders. "Protocol Analysis." In A Companion to Cognitive Science. Blackwell Publishing Ltd, 2017. http://dx.doi.org/10.1002/9781405164535.ch33.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Nahler, Gerhard. "per-protocol analysis." In Dictionary of Pharmaceutical Medicine. Springer Vienna, 2009. http://dx.doi.org/10.1007/978-3-211-89836-9_1033.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Dong, Ling, and Kefei Chen. "Formalism of Protocol Security Analysis." In Cryptographic Protocol. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-24073-7_7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Dong, Ling, and Kefei Chen. "Informal Analysis Schemes of Cryptographic Protocols." In Cryptographic Protocol. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-24073-7_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Dong, Ling, and Kefei Chen. "Security Analysis of Real World Protocols." In Cryptographic Protocol. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-24073-7_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Rzempoluck, Edward J. "A Data Analysis Protocol." In Neural Network Data Analysis Using Simulnet™. Springer New York, 1998. http://dx.doi.org/10.1007/978-1-4612-1746-6_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Aparicio-Sánchez, Damián, Santiago Escobar, Catherine Meadows, José Meseguer, and Julia Sapiña. "Protocol Analysis with Time." In Progress in Cryptology – INDOCRYPT 2020. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65277-7_7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Raymond Choo, Kim-Kwang. "Complementing Computational Protocol Analysis." In Advances in Information Security. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-87969-7_10.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Szymoniak, Sabina. "KaoChow Protocol Timed Analysis." In Advances in Soft and Hard Computing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03314-9_30.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Agapito, Giuseppe, and Mariamena Arbitrio. "Microarray Data Analysis Protocol." In Methods in Molecular Biology. Springer US, 2021. http://dx.doi.org/10.1007/978-1-0716-1839-4_17.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "PROTOCOL ANALYSIS"

1

Cai, Liujia, Tong Yu, Yumeng Li, et al. "SyntaxBridge: Protocol Description Transformer for Enhanced Formal Analysis of Security Protocols." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00067.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Tan, Yang, and Bo Lv. "Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections." In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121209.

Pełny tekst źródła
Streszczenie:
In 2012, De Cristofaro et al. proposed a protocol to calculate the Private Set Intersection and Union cardinality (PSI-CA and PSU-CA). This protocol's security is based on the famous DDH assumption. Since its publication, it has gained lots of popularity because of its efficiency (linear complexity in computation and communication) and concision. So far, it's still considered one of the most efficient PSI-CA protocols and the most cited (more than 170 citations) PSI-CA paper based on the Google Scholar search. However, when we tried to implement this protocol, we couldn't get the correct resul
Style APA, Harvard, Vancouver, ISO itp.
3

Tiflea, Denisa-Ionela. "Vulnerabilities of LRSAS Protocol." In 12th International Conference on Electronics, Communications and Computing. Technical University of Moldova, 2022. http://dx.doi.org/10.52326/ic-ecco.2022/sec.07.

Pełny tekst źródła
Streszczenie:
The construction of secure and private RFID protocols is necessary with the increasing application of RFID technology in increasingly diverse fields. While security refers to unilateral or mutual authentication depending on the protocol, privacy is a more elaborate concept to which many studies and research have been dedicated. Unfortunately, many RFID protocols are still being developed without consistent security and privacy analysis in well-defined models, such as the Vaudenay model. In this paper, we aim to prove that a recently proposed authentication protocol, LRSAS, does not achieve any
Style APA, Harvard, Vancouver, ISO itp.
4

Plummer, Richard W. "SDLC protocol throughput analysis." In the 17th conference. ACM Press, 1985. http://dx.doi.org/10.1145/21850.253380.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Jacobson, D. W. "Network protocol analysis (abstract)." In the 1986 ACM fourteenth annual conference. ACM Press, 1986. http://dx.doi.org/10.1145/324634.325067.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

QasMarrogy, Ghassan. "Practical Analysis of IEEE 802.11ax Wireless Protocol in Wi-Fi Boosters Environments." In 3rd International Conference of Mathematics and its Applications. Salahaddin University-Erbil, 2020. http://dx.doi.org/10.31972/ticma22.04.

Pełny tekst źródła
Streszczenie:
All the world now is depending on networks to share information between the users, where different data types are transferred wirelessly from network to network. Using wireless LANs are important to connect the users and share the data, these Wireless LANs have different types of obstacles that affect the data sharing or the wireless signal, such as, compatibility wireless protocol types, range coverage, walls penetration, moving devices, different routing protocols, data transferred types, weak signal, and many more. In this paper a practical analysis will be made to the latest IEEE 802.11ax
Style APA, Harvard, Vancouver, ISO itp.
7

Dorst, Kees, and Nigel Cross. "Protocol Analysis As a Research Technique for Analysing Design Activity." In ASME 1995 Design Engineering Technical Conferences collocated with the ASME 1995 15th International Computers in Engineering Conference and the ASME 1995 9th Annual Engineering Database Symposium. American Society of Mechanical Engineers, 1995. http://dx.doi.org/10.1115/detc1995-0190.

Pełny tekst źródła
Streszczenie:
Abstract This paper offers a review of protocol analysis as a research technique for the investigation of design activity. It draws particularly on the results of a special international research workshop on protocol analysis of design activity, held in Delft, The Netherlands, in September 1994. The paper identifies major themes and issues in the use of protocol analysis arising from the workshop.
Style APA, Harvard, Vancouver, ISO itp.
8

"Performance Analysis of Basic Automatic Repeat Request Protocols and Hybrid Automatic Repeat Request Protocol." In 4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022). Cihan University, 2022. http://dx.doi.org/10.24086/cocos2022/paper.567.

Pełny tekst źródła
Streszczenie:
The size of network and internet traffic is rising spontaneously by the day, with data usage at zettabyte to petabyte scale at an exponential high rate and therefore considered to generate huge traffic along the way which causes the chance of error in transmission to be high as well. Automatic Repeat Request (ARQ) protocol is an error control function for data transmission that uses acknowledgements. These protocols exist in Data link or Transport layers. ARQ is categorize into three major types such as Stop and wait, Go Bank N and Selective Repeat. Hybrid automatic repeat (HARQ) request which
Style APA, Harvard, Vancouver, ISO itp.
9

Berhea, Mohammed, Chunhong Chen, and Q. M. Jonathan Wu. "Protocol-level performance analysis for anti-collision protocols in RFID systems." In 2008 IEEE International Symposium on Circuits and Systems - ISCAS 2008. IEEE, 2008. http://dx.doi.org/10.1109/iscas.2008.4541591.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Gong, Chuanqi, Sheng Wu, and Yanmin Jing. "ARAN protocol analysis and improvement." In 2012 3rd International Conference on System Science, Engineering Design and Manufacturing Informatization (ICSEM). IEEE, 2012. http://dx.doi.org/10.1109/icssem.2012.6340883.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "PROTOCOL ANALYSIS"

1

Tubesing, Philip. Protocols for Uranium Carbon Analysis - Testing Protocol Summary. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1783513.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Moy, J. OSPF Protocol Analysis. RFC Editor, 1991. http://dx.doi.org/10.17487/rfc1245.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Rekhter, Y. BGP Protocol Analysis. RFC Editor, 1991. http://dx.doi.org/10.17487/rfc1265.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Traina, P., ed. BGP-4 Protocol Analysis. RFC Editor, 1995. http://dx.doi.org/10.17487/rfc1774.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Meyer, D., and K. Patel. BGP-4 Protocol Analysis. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4274.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Malkin, G. RIP Version 2 Protocol Analysis. RFC Editor, 1993. http://dx.doi.org/10.17487/rfc1387.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Malkin, G. RIP Version 2 Protocol Analysis. RFC Editor, 1994. http://dx.doi.org/10.17487/rfc1721.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Sherry, S., and G. Meyer. Protocol Analysis for Triggered RIP. RFC Editor, 1997. http://dx.doi.org/10.17487/rfc2092.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Bromberger, S. Technical Analysis of SSP-21 Protocol. Office of Scientific and Technical Information (OSTI), 2017. http://dx.doi.org/10.2172/1366901.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Danley, M., D. Mulligan, J. Morris, and J. Peterson. Threat Analysis of the Geopriv Protocol. RFC Editor, 2004. http://dx.doi.org/10.17487/rfc3694.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!