Academic literature on the topic 'Analysis protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Analysis protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Analysis protocol"
HU, YANJING, QINGQI PEI, and LIAOJUN PANG. "Instruction Clustering Analysis for Unknown Network Protocol's Abnormal Behavior." Journal of Interconnection Networks 15, no. 03n04 (September 2015): 1540002. http://dx.doi.org/10.1142/s0219265915400022.
Full textOwen, Stephen, Pearl Brereton, and David Budgen. "Protocol analysis." Communications of the ACM 49, no. 2 (February 2006): 117–22. http://dx.doi.org/10.1145/1113034.1113039.
Full textLi, Fu Lin, Jie Yang, Hong Wei Zhou, and Ying Liu. "A New Dynamic Protocol Analysis Model." Advanced Materials Research 765-767 (September 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.
Full textZhao, Wen Hong. "Protocols Analysis by Base-Function." Applied Mechanics and Materials 530-531 (February 2014): 682–85. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.682.
Full textKOVACIK, Cyril Filip, and Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK." Acta Electrotechnica et Informatica 1335-8243, no. 1338-3957 (June 9, 2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.
Full textYongming Yao, Yongming Yao, Yulin Wang Yongming Yao, Weiyi Jiang Yulin Wang, Ziyuan Wang Weiyi Jiang, and Song Huang Ziyuan Wang. "PPAdroid: An Approach to Android Privacy Protocol Analysis." 網際網路技術學刊 23, no. 3 (May 2022): 561–71. http://dx.doi.org/10.53106/160792642022052303014.
Full textAnggriani, Sufy, Rizki Savira Firdaus, and Windy Amanda Siwi Suherlan. "Analisis Penyimpanan Protokol Notaris Secara Elektronik." Notaire 6, no. 3 (December 4, 2023): 437–48. http://dx.doi.org/10.20473/ntr.v6i3.50802.
Full textMuhammad Farhan, Muhammad Asif, Maaz Bin Ahmad, and Khalid Maqsood. "A Comparative Analysis of Unicast Routing Protocols for MPLS-VPN." Lahore Garrison University Research Journal of Computer Science and Information Technology 3, no. 1 (March 29, 2019): 43–49. http://dx.doi.org/10.54692/lgurjcsit.2019.030167.
Full textZhao, Wen Hong. "Protocols Analysis Based on the Combination Mode of Walsh Function." Applied Mechanics and Materials 543-547 (March 2014): 3482–85. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3482.
Full textLu, Siqi, Qingdi Han, Xuyang Miao, and Yubo Liu. "Research on Security Protocol Analysis Tool SmartVerif." Journal of Physics: Conference Series 2132, no. 1 (December 1, 2021): 012022. http://dx.doi.org/10.1088/1742-6596/2132/1/012022.
Full textDissertations / Theses on the topic "Analysis protocol"
Brachfeld, Lawrence J. "Mobile internet protocol analysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369385.
Full text"September 1999". Thesis advisor(s): Bert Lundy, Wolfgang Baer. Includes bibliographical references (p. 53). Also available online.
Kovan, Gerry. "SPP Secure Payment Protocol: Protocol Analysis, Implementation and Extensions." Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1079.
Full textO'Shea, Nicholas. "Verification and validation of security protocol implementations." Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4753.
Full textDobson, Lucas E. "Security analysis of session initiation protocol." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDobson.pdf.
Full textThesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
Araya, Cristian, and Manjinder Singh. "Web API protocol and security analysis." Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208934.
Full textDet finns ett problem i dagens samhälle gällande att varje företag har sin egen kundportal. Detta problem kan lösas genom att skapa en plattform som samlar alla kundportaler på samma plats. För en sådan plattform krävs det ett web API protokoll som är snabb, säker och har kapacitet för många användare. Därför har en undersökning om olika web API protokolls prestanda samt säkerhetstester gjorts. Arbetet gick ut på att ta reda på vilket web API protokoll som erbjuder hög säkerhet och hög prestanda i form av svarstid både vid låg och hög belastning. Det ingick också i arbetet att göra en undersökning av tidigare arbeten för att ta reda på om eventuella protokoll kunde uteslutas. Under arbetet utvecklades också plattformens backend som implementerade de olika web API protokollen för att sedan kunna utföra tester på dessa. Testerna som utfördes var svarstid både med och utan belastning, uppkopplingstid samt belastning. Resultaten analyserades och visade att protokollen hade både för- och nackdelar. Avslutningsvis valdes ett protokoll som var lämpad för plattformen eftersom den hade hög säkerhet samt snabbast uppkopplingstid. Dessutom påverkades inte servern negativt av antalet uppkopplingar. Reactive REST valdes som web API protokoll för denna plattform.
Jayaswal, Tanu. "Events-induced tourism: a protocol analysis." AUT University, 2010. http://hdl.handle.net/10292/897.
Full textJang, Beakcheol. "Wireless MAC Protocol Design and Analysis." NCSU, 2009. http://www.lib.ncsu.edu/theses/available/etd-05262009-175059/.
Full textLu, Chun, and Jian Song. "Protocol Analysis for Networked Acquirement System." International Foundation for Telemetering, 2014. http://hdl.handle.net/10150/577516.
Full textThis paper analyzed protocols may be used in each layer in networked telemetry systems, and also presents some deeper researches of the advantages of using synchronous time-division for the physical layer of a networked telemetry system.
Hsu, Yating. "Formal Analysis of Network Protocol Security." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1317230784.
Full textChu, Peil-Ying Mark. "Towards automating protocol synthesis and analysis /." The Ohio State University, 1989. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487598303840366.
Full textBooks on the topic "Analysis protocol"
New Zealand. Ministry for the Environment., ed. Solid waste analysis protocol. Wellington, N.Z: Ministry for the Environment, 2002.
Find full textBurns, Kevin. TCP/IP analysis and troubleshooting toolkit. Indianapolis: Wiley Pub., 2003.
Find full textHodgson. Novell Netware protocol and network analysis. Manchester: University of Manchester, Department of Computer Science, 1996.
Find full text1916-, Simon Herbert Alexander, ed. Protocol analysis: Verbal reports as data. Cambridge, Mass: MIT Press, 1992.
Find full text1916-, Simon Herbert A., ed. Protocol analysis: Verbal reports as data. Cambridge, Mass: MIT Press, 1985.
Find full textBoyle, Robert J. Engineering analysis using a web-based protocol. Cleveland, Ohio: National Aeronautics and Space Administration, Glenn Research Center, 2002.
Find full textK, Luke Nancy, and Intelligent Buildings Institute Foundation, eds. Global protocol review & end-user needs analysis. Washington, DC: The Foundation, 1993.
Find full textSong, Wei, Peijian Ju, and A.-Long Jin. Protocol Design and Analysis for Cooperative Wireless Networks. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-47726-8.
Full textOntario. Ministry of the Environment. Laboratory Services Branch., ed. Protocol of accepted drinking water testing methods. Toronto: Ministry of the Environment, Laboratory Services Branch, 2003.
Find full textBaker, Robert E. A study of novice systems analysts' problem solving behaviors using protocol analysis. Monterey, Calif: Naval Postgraduate School, 1992.
Find full textBook chapters on the topic "Analysis protocol"
Ericsson, K. Anders. "Protocol Analysis." In A Companion to Cognitive Science, 425–32. Oxford, UK: Blackwell Publishing Ltd, 2017. http://dx.doi.org/10.1002/9781405164535.ch33.
Full textNahler, Gerhard. "per-protocol analysis." In Dictionary of Pharmaceutical Medicine, 134. Vienna: Springer Vienna, 2009. http://dx.doi.org/10.1007/978-3-211-89836-9_1033.
Full textDong, Ling, and Kefei Chen. "Formalism of Protocol Security Analysis." In Cryptographic Protocol, 249–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-24073-7_7.
Full textDong, Ling, and Kefei Chen. "Informal Analysis Schemes of Cryptographic Protocols." In Cryptographic Protocol, 83–152. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-24073-7_4.
Full textDong, Ling, and Kefei Chen. "Security Analysis of Real World Protocols." In Cryptographic Protocol, 153–213. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-24073-7_5.
Full textRzempoluck, Edward J. "A Data Analysis Protocol." In Neural Network Data Analysis Using Simulnet™, 203–11. New York, NY: Springer New York, 1998. http://dx.doi.org/10.1007/978-1-4612-1746-6_5.
Full textAparicio-Sánchez, Damián, Santiago Escobar, Catherine Meadows, José Meseguer, and Julia Sapiña. "Protocol Analysis with Time." In Progress in Cryptology – INDOCRYPT 2020, 128–50. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65277-7_7.
Full textRaymond Choo, Kim-Kwang. "Complementing Computational Protocol Analysis." In Advances in Information Security, 1–28. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-87969-7_10.
Full textSzymoniak, Sabina. "KaoChow Protocol Timed Analysis." In Advances in Soft and Hard Computing, 346–57. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03314-9_30.
Full textAgapito, Giuseppe, and Mariamena Arbitrio. "Microarray Data Analysis Protocol." In Methods in Molecular Biology, 263–71. New York, NY: Springer US, 2021. http://dx.doi.org/10.1007/978-1-0716-1839-4_17.
Full textConference papers on the topic "Analysis protocol"
Tan, Yang, and Bo Lv. "Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections." In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121209.
Full textTiflea, Denisa-Ionela. "Vulnerabilities of LRSAS Protocol." In 12th International Conference on Electronics, Communications and Computing. Technical University of Moldova, 2022. http://dx.doi.org/10.52326/ic-ecco.2022/sec.07.
Full textQasMarrogy, Ghassan. "Practical Analysis of IEEE 802.11ax Wireless Protocol in Wi-Fi Boosters Environments." In 3rd International Conference of Mathematics and its Applications. Salahaddin University-Erbil, 2020. http://dx.doi.org/10.31972/ticma22.04.
Full textDorst, Kees, and Nigel Cross. "Protocol Analysis As a Research Technique for Analysing Design Activity." In ASME 1995 Design Engineering Technical Conferences collocated with the ASME 1995 15th International Computers in Engineering Conference and the ASME 1995 9th Annual Engineering Database Symposium. American Society of Mechanical Engineers, 1995. http://dx.doi.org/10.1115/detc1995-0190.
Full textPlummer, Richard W. "SDLC protocol throughput analysis." In the 17th conference. New York, New York, USA: ACM Press, 1985. http://dx.doi.org/10.1145/21850.253380.
Full textJacobson, D. W. "Network protocol analysis (abstract)." In the 1986 ACM fourteenth annual conference. New York, New York, USA: ACM Press, 1986. http://dx.doi.org/10.1145/324634.325067.
Full text"Performance Analysis of Basic Automatic Repeat Request Protocols and Hybrid Automatic Repeat Request Protocol." In 4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022). Cihan University, 2022. http://dx.doi.org/10.24086/cocos2022/paper.567.
Full textDoostmohammadian, Mohammad Reza, and Hassan Sayyaadi. "Finite-Time Consensus in Undirected/Directed Network Topologies." In ASME 2010 10th Biennial Conference on Engineering Systems Design and Analysis. ASMEDC, 2010. http://dx.doi.org/10.1115/esda2010-24012.
Full textHess, Tim, and Joshua D. Summers. "Protocol Analysis: Studying Physical Manipulatives During Conceptual Design." In ASME 2014 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/detc2014-34183.
Full textBerhea, Mohammed, Chunhong Chen, and Q. M. Jonathan Wu. "Protocol-level performance analysis for anti-collision protocols in RFID systems." In 2008 IEEE International Symposium on Circuits and Systems - ISCAS 2008. IEEE, 2008. http://dx.doi.org/10.1109/iscas.2008.4541591.
Full textReports on the topic "Analysis protocol"
Tubesing, Philip. Protocols for Uranium Carbon Analysis - Testing Protocol Summary. Office of Scientific and Technical Information (OSTI), May 2021. http://dx.doi.org/10.2172/1783513.
Full textMoy, J. OSPF Protocol Analysis. RFC Editor, July 1991. http://dx.doi.org/10.17487/rfc1245.
Full textRekhter, Y. BGP Protocol Analysis. RFC Editor, October 1991. http://dx.doi.org/10.17487/rfc1265.
Full textTraina, P., ed. BGP-4 Protocol Analysis. RFC Editor, March 1995. http://dx.doi.org/10.17487/rfc1774.
Full textMeyer, D., and K. Patel. BGP-4 Protocol Analysis. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4274.
Full textMalkin, G. RIP Version 2 Protocol Analysis. RFC Editor, January 1993. http://dx.doi.org/10.17487/rfc1387.
Full textMalkin, G. RIP Version 2 Protocol Analysis. RFC Editor, November 1994. http://dx.doi.org/10.17487/rfc1721.
Full textSherry, S., and G. Meyer. Protocol Analysis for Triggered RIP. RFC Editor, January 1997. http://dx.doi.org/10.17487/rfc2092.
Full textBromberger, S. Technical Analysis of SSP-21 Protocol. Office of Scientific and Technical Information (OSTI), June 2017. http://dx.doi.org/10.2172/1366901.
Full textDanley, M., D. Mulligan, J. Morris, and J. Peterson. Threat Analysis of the Geopriv Protocol. RFC Editor, February 2004. http://dx.doi.org/10.17487/rfc3694.
Full text