Artykuły w czasopismach na temat „PROTOCOL ANALYSIS”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „PROTOCOL ANALYSIS”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
S V Kharat, Gumaste. "Performance Analysis of DSR Protocol." International Journal of Scientific Engineering and Research 1, no. 3 (2013): 62–68. https://doi.org/10.70729/j201340.
Pełny tekst źródłaHussain, Kashif. "Comparative Analysis of DNA Extraction Protocols from Blood for Bovine Theileriosis." International Journal of Agriculture and Biology 34, no. 03 (2025): 340301. https://doi.org/10.17957/ijab/15.2361.
Pełny tekst źródłaLi, Fu Lin, Jie Yang, Hong Wei Zhou, and Ying Liu. "A New Dynamic Protocol Analysis Model." Advanced Materials Research 765-767 (September 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.
Pełny tekst źródłaZhao, Wen Hong. "Protocols Analysis by Base-Function." Applied Mechanics and Materials 530-531 (February 2014): 682–85. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.682.
Pełny tekst źródłaOwen, Stephen, Pearl Brereton, and David Budgen. "Protocol analysis." Communications of the ACM 49, no. 2 (2006): 117–22. http://dx.doi.org/10.1145/1113034.1113039.
Pełny tekst źródłaKOVACIK, Cyril Filip, and Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK." Acta Electrotechnica et Informatica 1335-8243, no. 1338-3957 (2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.
Pełny tekst źródłaAnggriani, Sufy, Rizki Savira Firdaus, and Windy Amanda Siwi Suherlan. "Analisis Penyimpanan Protokol Notaris Secara Elektronik." Notaire 6, no. 3 (2023): 437–48. http://dx.doi.org/10.20473/ntr.v6i3.50802.
Pełny tekst źródłaHU, YANJING, QINGQI PEI, and LIAOJUN PANG. "Instruction Clustering Analysis for Unknown Network Protocol's Abnormal Behavior." Journal of Interconnection Networks 15, no. 03n04 (2015): 1540002. http://dx.doi.org/10.1142/s0219265915400022.
Pełny tekst źródłaNeeru Kumari and Dr. Tilak Raj. "OSPF Metric Convergence and Variation Analysis During Redistribution with Routing Information Protocol." International Research Journal on Advanced Engineering and Management (IRJAEM) 2, no. 06 (2024): 1985–91. http://dx.doi.org/10.47392/irjaem.2024.0293.
Pełny tekst źródłaMuhammad Farhan, Muhammad Asif, Maaz Bin Ahmad, and Khalid Maqsood. "A Comparative Analysis of Unicast Routing Protocols for MPLS-VPN." Lahore Garrison University Research Journal of Computer Science and Information Technology 3, no. 1 (2019): 43–49. http://dx.doi.org/10.54692/lgurjcsit.2019.030167.
Pełny tekst źródłaZhao, Wen Hong. "Protocols Analysis Based on the Combination Mode of Walsh Function." Applied Mechanics and Materials 543-547 (March 2014): 3482–85. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3482.
Pełny tekst źródłaYongming Yao, Yongming Yao, Yulin Wang Yongming Yao, Weiyi Jiang Yulin Wang, Ziyuan Wang Weiyi Jiang, and Song Huang Ziyuan Wang. "PPAdroid: An Approach to Android Privacy Protocol Analysis." 網際網路技術學刊 23, no. 3 (2022): 561–71. http://dx.doi.org/10.53106/160792642022052303014.
Pełny tekst źródłaLu, Siqi, Qingdi Han, Xuyang Miao, and Yubo Liu. "Research on Security Protocol Analysis Tool SmartVerif." Journal of Physics: Conference Series 2132, no. 1 (2021): 012022. http://dx.doi.org/10.1088/1742-6596/2132/1/012022.
Pełny tekst źródłaSmith, John, Dana Kay Smith, and Eileen Kupstas. "Automated Protocol Analysis." Human-Computer Interaction 8, no. 2 (1993): 101–45. http://dx.doi.org/10.1207/s15327051hci0802_2.
Pełny tekst źródłaRekhter, Yakov. "IDRP protocol analysis." ACM SIGCOMM Computer Communication Review 22, no. 2 (1992): 17–28. http://dx.doi.org/10.1145/141800.141802.
Pełny tekst źródłaGrossman, Stephen. "Khandwalla's protocol analysis." Creativity Research Journal 7, no. 1 (1994): 93–95. http://dx.doi.org/10.1080/10400419409534515.
Pełny tekst źródłaSedgwick, P. "Per protocol analysis." BMJ 340, apr07 1 (2010): c1825. http://dx.doi.org/10.1136/bmj.c1825.
Pełny tekst źródłaGurtov, Andrei. "Performance analysis of general backoff protocols." Journal of Communications Software and Systems 4, no. 1 (2008): 13. http://dx.doi.org/10.24138/jcomss.v4i1.233.
Pełny tekst źródłaXiao, Meihua, Weiwei Song, Ke Yang, Ri OuYang, and Hanyu Zhao. "Formal Analysis of the Security Protocol with Timestamp Using SPIN." Computational Intelligence and Neuroscience 2022 (August 23, 2022): 1–11. http://dx.doi.org/10.1155/2022/2420590.
Pełny tekst źródłaByun, Ilmu. "Cooperative Hybrid-ARQ Protocols: Unified Frameworks for Protocol Analysis." ETRI Journal 33, no. 5 (2011): 759–69. http://dx.doi.org/10.4218/etrij.11.0110.0630.
Pełny tekst źródłaSyahputra, Ramdhani, Rahmadi Kurnia, and Rian Ferdian. "Analysis of FHRP Design and Implementation in RIPv2 and OSPF Routing Protocols." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 1 (2020): 102–8. http://dx.doi.org/10.29207/resti.v4i1.1490.
Pełny tekst źródłaZheng, Mingwei, Qingkai Shi, Xuwei Liu, et al. "ParDiff: Practical Static Differential Analysis of Network Protocol Parsers." Proceedings of the ACM on Programming Languages 8, OOPSLA1 (2024): 1208–34. http://dx.doi.org/10.1145/3649854.
Pełny tekst źródłaMehri-Toonabi, Ali, Mahdi Davoudi Darareh, and Shahrooz Janbaz. "High-dimensional quantum key distribution using polarization-phase encoding: security analysis." International Journal of Quantum Information 18, no. 06 (2020): 2050031. http://dx.doi.org/10.1142/s0219749920500318.
Pełny tekst źródłaJin-Ze Du, Jin-Ze Du, Jun-Wei Liu Jin-Ze Du, Tao Feng Jun-Wei Liu, and Zhan-Ting Yuan Tao Feng. "Formal Analysis and Improvement of Z-Wave Protocol." 電腦學刊 34, no. 4 (2023): 025–39. http://dx.doi.org/10.53106/199115992023083404003.
Pełny tekst źródłaDebuisschert, Thierry, and Simon Fossier. "Security analysis of the time-coding quantum key distribution protocols." Quantum Information and Computation 11, no. 11&12 (2011): 968–87. http://dx.doi.org/10.26421/qic11.11-12-7.
Pełny tekst źródłaShadi, Nashwan, and M. Alshammari Bandar. "Formal Analysis of MCAP Protocol Against Replay Attack." British Journal of Mathematics & Computer Science 22, no. 1 (2017): 1–14. https://doi.org/10.9734/BJMCS/2017/32744.
Pełny tekst źródłaLin, Wen Qi, Yi Liu, Li Meng Song, Yuan Jiao Zhang, and Fei Guo. "Comparison and Analysis of MAC Protocol in Multimedia Communications." Applied Mechanics and Materials 519-520 (February 2014): 496–99. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.496.
Pełny tekst źródłaXiao, Meihua, Lina Chen, Ke Yang, and Zehuan Li. "Formal Analysis of Rational Exchange Protocols Based on the Improved Buttyan Model." Symmetry 17, no. 7 (2025): 1033. https://doi.org/10.3390/sym17071033.
Pełny tekst źródłaKang, Baoyuan, Yanbao Han, Kun Qian, and Jianqi Du. "Analysis and Improvement on an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment." Mathematical Problems in Engineering 2020 (June 23, 2020): 1–6. http://dx.doi.org/10.1155/2020/1970798.
Pełny tekst źródłaShi, Lu-Feng, Karen A. Doherty, Tammy M. Kordas, and Joseph T. Pellegrino. "Short-Term and Long-Term Hearing Aid Benefit and User Satisfaction: A Comparison between Two Fitting Protocols." Journal of the American Academy of Audiology 18, no. 06 (2007): 482–95. http://dx.doi.org/10.3766/jaaa.18.6.3.
Pełny tekst źródłaDey, Tanay, M. M. A. Hashem, and Subroto Kumar Mondal. "ON PERFORMANCE ANALYSIS OF AMBR PROTOCOL IN MOBILE AD HOC NETWORKS." IIUM Engineering Journal 11, no. 2 (2010): 240–54. http://dx.doi.org/10.31436/iiumej.v11i2.28.
Pełny tekst źródłaSarvaiya, Ms Shilpa B. "Analysis of IoT Data Transfer Messaging Protocols on Application Layer." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 1812–19. http://dx.doi.org/10.22214/ijraset.2022.45604.
Pełny tekst źródłaVasudha and Bhola Anoop. "Comprehensive Analysis on Cluster based Hierarchical Routing Protocols for Wireless Sensor Networks." Journal of Switching Hub 4, no. 1 (2019): 1–9. https://doi.org/10.5281/zenodo.2537434.
Pełny tekst źródłaRahul, Desai, P. Patil B, and Pal Sharma Davinder. "Routing Protocols for Mobile Ad Hoc Network: A Survey and Analysis." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (2017): 795–801. https://doi.org/10.11591/ijeecs.v7.i3.pp795-801.
Pełny tekst źródłaAbdulhameed, N. Hameed, Abdulghani Alabady Salah, and A. Thanoon Mohammad. "Performance analysis and evaluation of distance vector and link state routing protocols over a large area networks." TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 20, no. 6 (2022): 1189–99. https://doi.org/10.12928/telkomnika.v20i6.22211.
Pełny tekst źródłaAhsan, Usama, Muhammad Mubashir Khan, Asad Arfeen, and Khadija Azam. "Security analysis of KXB10 QKD protocol with higher-dimensional quantum states." International Journal of Quantum Information 18, no. 08 (2020): 2150005. http://dx.doi.org/10.1142/s0219749921500052.
Pełny tekst źródłaMaurya, Indubala, and Rakesh Garg. "Systematic review meta-analysis protocol preparation and registration – A narrative review." Indian Journal of Anaesthesia 69, no. 1 (2025): 132–37. https://doi.org/10.4103/ija.ija_1165_24.
Pełny tekst źródłaSabeeruddin, Shaik. "Comparative Analysis of Network Security Controls in the Modern Era." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 6 (2022): 1–7. https://doi.org/10.5281/zenodo.14866540.
Pełny tekst źródłaZain, Alaa, Heba El-khobby, Hatem M. Abd Elkader, and Mostafa Abdelnaby. "MANETs performance analysis with dos attack at different routing protocols." International Journal of Engineering & Technology 4, no. 2 (2015): 390. http://dx.doi.org/10.14419/ijet.v4i2.4609.
Pełny tekst źródłaWang, Wei, and Qing Feng Cheng. "Analysis of Two ID-Based Key Exchange Protocols." Applied Mechanics and Materials 135-136 (October 2011): 289–93. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.289.
Pełny tekst źródłaFeng, Tao, and Yi Wu. "Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol." Security and Communication Networks 2022 (July 12, 2022): 1–19. http://dx.doi.org/10.1155/2022/8104884.
Pełny tekst źródłaFlinn, Barry, Savanah Dale, Andrew Disharoon, and Stephen Kresovich. "Comparative Analysis of In Vitro Responses and Regeneration between Diverse Bioenergy Sorghum Genotypes." Plants 9, no. 2 (2020): 248. http://dx.doi.org/10.3390/plants9020248.
Pełny tekst źródłaShaefer, Jeffry R., Cara Joy Riley, Paul Caruso, and David Keith. "Analysis of Criteria for MRI Diagnosis of TMJ Disc Displacement and Arthralgia." International Journal of Dentistry 2012 (2012): 1–8. http://dx.doi.org/10.1155/2012/283163.
Pełny tekst źródłaFeng, Tao, Taining Chen, and Xiang Gong. "Formal Security Analysis of ISA100.11a Standard Protocol Based on Colored Petri Net Tool." Information 15, no. 2 (2024): 118. http://dx.doi.org/10.3390/info15020118.
Pełny tekst źródłaKaur, Arshdeep, Sandeep Kumar Arora, and Mahedi Masud. "Comparative Analysis of Clustering using AODV DSDV and CBRP." International Journal of Engineering & Technology 7, no. 3.8 (2018): 131. http://dx.doi.org/10.14419/ijet.v7i3.8.16847.
Pełny tekst źródłaDesai, Rahul M., B. P. Patil, and Davinder Pal Sharma. "Routing Protocols for Mobile Ad Hoc Network - A Survey and Analysis." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (2017): 795. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp795-801.
Pełny tekst źródłaWang, Qun, Zhonghao Sun, Zhangquan Wang, et al. "A Practical Format and Semantic Reverse Analysis Approach for Industrial Control Protocols." Security and Communication Networks 2021 (March 12, 2021): 1–11. http://dx.doi.org/10.1155/2021/6690988.
Pełny tekst źródłaKaranasiou, A., E. Diapouli, M. Viana, et al. "On the quantification of atmospheric carbonate carbon by thermal/optical analysis protocols." Atmospheric Measurement Techniques Discussions 3, no. 6 (2010): 5375–409. http://dx.doi.org/10.5194/amtd-3-5375-2010.
Pełny tekst źródłaSong, Daegene. "Numerical Analysis in Entanglement Swapping Protocols." NeuroQuantology 20, no. 2 (2022): 153–57. http://dx.doi.org/10.14704/nq.2022.20.2.nq22083.
Pełny tekst źródłaK.Thamizhmaran. "Optimization Link Sate Routing Analysis with Destination Sequenced Distance Vector for MANET." Journal of Research in Electrical Power System 1, no. 1 (2025): 31–37. https://doi.org/10.5281/zenodo.15210274.
Pełny tekst źródła