Journal articles on the topic 'Analysis protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Analysis protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
HU, YANJING, QINGQI PEI, and LIAOJUN PANG. "Instruction Clustering Analysis for Unknown Network Protocol's Abnormal Behavior." Journal of Interconnection Networks 15, no. 03n04 (September 2015): 1540002. http://dx.doi.org/10.1142/s0219265915400022.
Full textOwen, Stephen, Pearl Brereton, and David Budgen. "Protocol analysis." Communications of the ACM 49, no. 2 (February 2006): 117–22. http://dx.doi.org/10.1145/1113034.1113039.
Full textLi, Fu Lin, Jie Yang, Hong Wei Zhou, and Ying Liu. "A New Dynamic Protocol Analysis Model." Advanced Materials Research 765-767 (September 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.
Full textZhao, Wen Hong. "Protocols Analysis by Base-Function." Applied Mechanics and Materials 530-531 (February 2014): 682–85. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.682.
Full textKOVACIK, Cyril Filip, and Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK." Acta Electrotechnica et Informatica 1335-8243, no. 1338-3957 (June 9, 2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.
Full textYongming Yao, Yongming Yao, Yulin Wang Yongming Yao, Weiyi Jiang Yulin Wang, Ziyuan Wang Weiyi Jiang, and Song Huang Ziyuan Wang. "PPAdroid: An Approach to Android Privacy Protocol Analysis." 網際網路技術學刊 23, no. 3 (May 2022): 561–71. http://dx.doi.org/10.53106/160792642022052303014.
Full textAnggriani, Sufy, Rizki Savira Firdaus, and Windy Amanda Siwi Suherlan. "Analisis Penyimpanan Protokol Notaris Secara Elektronik." Notaire 6, no. 3 (December 4, 2023): 437–48. http://dx.doi.org/10.20473/ntr.v6i3.50802.
Full textMuhammad Farhan, Muhammad Asif, Maaz Bin Ahmad, and Khalid Maqsood. "A Comparative Analysis of Unicast Routing Protocols for MPLS-VPN." Lahore Garrison University Research Journal of Computer Science and Information Technology 3, no. 1 (March 29, 2019): 43–49. http://dx.doi.org/10.54692/lgurjcsit.2019.030167.
Full textZhao, Wen Hong. "Protocols Analysis Based on the Combination Mode of Walsh Function." Applied Mechanics and Materials 543-547 (March 2014): 3482–85. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3482.
Full textLu, Siqi, Qingdi Han, Xuyang Miao, and Yubo Liu. "Research on Security Protocol Analysis Tool SmartVerif." Journal of Physics: Conference Series 2132, no. 1 (December 1, 2021): 012022. http://dx.doi.org/10.1088/1742-6596/2132/1/012022.
Full textSmith, John, Dana Kay Smith, and Eileen Kupstas. "Automated Protocol Analysis." Human-Computer Interaction 8, no. 2 (June 1, 1993): 101–45. http://dx.doi.org/10.1207/s15327051hci0802_2.
Full textRekhter, Yakov. "IDRP protocol analysis." ACM SIGCOMM Computer Communication Review 22, no. 2 (April 1992): 17–28. http://dx.doi.org/10.1145/141800.141802.
Full textGrossman, Stephen. "Khandwalla's protocol analysis." Creativity Research Journal 7, no. 1 (January 1994): 93–95. http://dx.doi.org/10.1080/10400419409534515.
Full textSedgwick, P. "Per protocol analysis." BMJ 340, apr07 1 (April 7, 2010): c1825. http://dx.doi.org/10.1136/bmj.c1825.
Full textJin-Ze Du, Jin-Ze Du, Jun-Wei Liu Jin-Ze Du, Tao Feng Jun-Wei Liu, and Zhan-Ting Yuan Tao Feng. "Formal Analysis and Improvement of Z-Wave Protocol." 電腦學刊 34, no. 4 (August 2023): 025–39. http://dx.doi.org/10.53106/199115992023083404003.
Full textByun, Ilmu. "Cooperative Hybrid-ARQ Protocols: Unified Frameworks for Protocol Analysis." ETRI Journal 33, no. 5 (October 4, 2011): 759–69. http://dx.doi.org/10.4218/etrij.11.0110.0630.
Full textHuang, Kai Yin, Yan Xia Xu, Li Juan Wen, and Bao Jun Gao. "Performance Analysis of OLSR Routing Protocol Based on IPv6." Advanced Materials Research 268-270 (July 2011): 1940–42. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1940.
Full textGurtov, Andrei. "Performance analysis of general backoff protocols." Journal of Communications Software and Systems 4, no. 1 (March 20, 2008): 13. http://dx.doi.org/10.24138/jcomss.v4i1.233.
Full textZebrack, Brad, Karen Kayser, Laura Sundstrom, Sue Ann Savas, Chris Henrickson, Chiara Acquati, and Rebecca L. Tamas. "Psychosocial Distress Screening Implementation in Cancer Care: An Analysis of Adherence, Responsiveness, and Acceptability." Journal of Clinical Oncology 33, no. 10 (April 1, 2015): 1165–70. http://dx.doi.org/10.1200/jco.2014.57.4020.
Full textXiao, Meihua, Weiwei Song, Ke Yang, Ri OuYang, and Hanyu Zhao. "Formal Analysis of the Security Protocol with Timestamp Using SPIN." Computational Intelligence and Neuroscience 2022 (August 23, 2022): 1–11. http://dx.doi.org/10.1155/2022/2420590.
Full textHu, Yanjing, and Qingqi Pei. "Dynamic Combined with Static Analysis for Mining Network Protocol's Hidden Behavior." International Journal of Business Data Communications and Networking 13, no. 2 (July 2017): 1–14. http://dx.doi.org/10.4018/ijbdcn.2017070101.
Full textSyahputra, Ramdhani, Rahmadi Kurnia, and Rian Ferdian. "Analysis of FHRP Design and Implementation in RIPv2 and OSPF Routing Protocols." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 1 (February 8, 2020): 102–8. http://dx.doi.org/10.29207/resti.v4i1.1490.
Full textZheng, Mingwei, Qingkai Shi, Xuwei Liu, Xiangzhe Xu, Le Yu, Congyu Liu, Guannan Wei, and Xiangyu Zhang. "ParDiff: Practical Static Differential Analysis of Network Protocol Parsers." Proceedings of the ACM on Programming Languages 8, OOPSLA1 (April 29, 2024): 1208–34. http://dx.doi.org/10.1145/3649854.
Full textMehri-Toonabi, Ali, Mahdi Davoudi Darareh, and Shahrooz Janbaz. "High-dimensional quantum key distribution using polarization-phase encoding: security analysis." International Journal of Quantum Information 18, no. 06 (September 2020): 2050031. http://dx.doi.org/10.1142/s0219749920500318.
Full textLin, Wen Qi, Yi Liu, Li Meng Song, Yuan Jiao Zhang, and Fei Guo. "Comparison and Analysis of MAC Protocol in Multimedia Communications." Applied Mechanics and Materials 519-520 (February 2014): 496–99. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.496.
Full textDebuisschert, Thierry, and Simon Fossier. "Security analysis of the time-coding quantum key distribution protocols." Quantum Information and Computation 11, no. 11&12 (November 2011): 968–87. http://dx.doi.org/10.26421/qic11.11-12-7.
Full textSong, Daegene. "Numerical Analysis in Entanglement Swapping Protocols." NeuroQuantology 20, no. 2 (April 1, 2022): 153–57. http://dx.doi.org/10.14704/nq.2022.20.2.nq22083.
Full textKang, Baoyuan, Yanbao Han, Kun Qian, and Jianqi Du. "Analysis and Improvement on an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment." Mathematical Problems in Engineering 2020 (June 23, 2020): 1–6. http://dx.doi.org/10.1155/2020/1970798.
Full textDey, Tanay, M. M. A. Hashem, and Subroto Kumar Mondal. "ON PERFORMANCE ANALYSIS OF AMBR PROTOCOL IN MOBILE AD HOC NETWORKS." IIUM Engineering Journal 11, no. 2 (November 19, 2010): 240–54. http://dx.doi.org/10.31436/iiumej.v11i2.28.
Full textH. Ripon, Shamim, Syed Fahin Ahmed, Afroza Yasmin, Yeaminar Rashid, and K. M. Imtiaz-Ud-Din. "Formal Analysis of a Ranked Neighbour MANET Protocol Suite." International Journal of Future Computer and Communication 3, no. 5 (October 2014): 325–30. http://dx.doi.org/10.7763/ijfcc.2014.v3.320.
Full textKhare, Surbhi, and Ritesh Shrivastav. "Analysis of Performance Quality of Next Generation Protocol: IPv6." International Journal of Trend in Scientific Research and Development Volume-2, Issue-2 (February 28, 2018): 314–18. http://dx.doi.org/10.31142/ijtsrd8386.
Full textSarvaiya, Ms Shilpa B. "Analysis of IoT Data Transfer Messaging Protocols on Application Layer." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 1812–19. http://dx.doi.org/10.22214/ijraset.2022.45604.
Full textAhsan, Usama, Muhammad Mubashir Khan, Asad Arfeen, and Khadija Azam. "Security analysis of KXB10 QKD protocol with higher-dimensional quantum states." International Journal of Quantum Information 18, no. 08 (December 2020): 2150005. http://dx.doi.org/10.1142/s0219749921500052.
Full textTakkouche, Bahi, and Guy Norman. "Meta-analysis Protocol Registration." Epidemiology 21, no. 5 (September 2010): 614–15. http://dx.doi.org/10.1097/ede.0b013e3181e9bbbd.
Full textSedgwick, P. "Analysis by per protocol." BMJ 342, apr18 2 (April 18, 2011): d2330. http://dx.doi.org/10.1136/bmj.d2330.
Full textRodríguez, Raúl G. "The ethical analysis protocol." New Directions for Institutional Research 1992, no. 73 (1992): 57–66. http://dx.doi.org/10.1002/ir.37019927307.
Full textShi, Lu-Feng, Karen A. Doherty, Tammy M. Kordas, and Joseph T. Pellegrino. "Short-Term and Long-Term Hearing Aid Benefit and User Satisfaction: A Comparison between Two Fitting Protocols." Journal of the American Academy of Audiology 18, no. 06 (June 2007): 482–95. http://dx.doi.org/10.3766/jaaa.18.6.3.
Full textZain, Alaa, Heba El-khobby, Hatem M. Abd Elkader, and Mostafa Abdelnaby. "MANETs performance analysis with dos attack at different routing protocols." International Journal of Engineering & Technology 4, no. 2 (May 17, 2015): 390. http://dx.doi.org/10.14419/ijet.v4i2.4609.
Full textWei, Da Wei, Wei Liu, and Xiu Feng Zhao. "The Deniability Analysis for a Deniable Authentication Protocol." Applied Mechanics and Materials 195-196 (August 2012): 992–97. http://dx.doi.org/10.4028/www.scientific.net/amm.195-196.992.
Full textWang, Wei, and Qing Feng Cheng. "Analysis of Two ID-Based Key Exchange Protocols." Applied Mechanics and Materials 135-136 (October 2011): 289–93. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.289.
Full textKaur, Arshdeep, Sandeep Kumar Arora, and Mahedi Masud. "Comparative Analysis of Clustering using AODV DSDV and CBRP." International Journal of Engineering & Technology 7, no. 3.8 (July 7, 2018): 131. http://dx.doi.org/10.14419/ijet.v7i3.8.16847.
Full textFeng, Tao, and Yi Wu. "Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol." Security and Communication Networks 2022 (July 12, 2022): 1–19. http://dx.doi.org/10.1155/2022/8104884.
Full textShaefer, Jeffry R., Cara Joy Riley, Paul Caruso, and David Keith. "Analysis of Criteria for MRI Diagnosis of TMJ Disc Displacement and Arthralgia." International Journal of Dentistry 2012 (2012): 1–8. http://dx.doi.org/10.1155/2012/283163.
Full textFlinn, Barry, Savanah Dale, Andrew Disharoon, and Stephen Kresovich. "Comparative Analysis of In Vitro Responses and Regeneration between Diverse Bioenergy Sorghum Genotypes." Plants 9, no. 2 (February 14, 2020): 248. http://dx.doi.org/10.3390/plants9020248.
Full textFeng, Tao, Taining Chen, and Xiang Gong. "Formal Security Analysis of ISA100.11a Standard Protocol Based on Colored Petri Net Tool." Information 15, no. 2 (February 18, 2024): 118. http://dx.doi.org/10.3390/info15020118.
Full textDesai, Rahul M., B. P. Patil, and Davinder Pal Sharma. "Routing Protocols for Mobile Ad Hoc Network - A Survey and Analysis." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (September 1, 2017): 795. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp795-801.
Full textWang, Qun, Zhonghao Sun, Zhangquan Wang, Shiping Ye, Ziyi Su, Hao Chen, and Chao Hu. "A Practical Format and Semantic Reverse Analysis Approach for Industrial Control Protocols." Security and Communication Networks 2021 (March 12, 2021): 1–11. http://dx.doi.org/10.1155/2021/6690988.
Full textKaranasiou, A., E. Diapouli, M. Viana, A. Alastuey, X. Querol, C. Reche, and K. Eleftheriadis. "On the quantification of atmospheric carbonate carbon by thermal/optical analysis protocols." Atmospheric Measurement Techniques Discussions 3, no. 6 (November 25, 2010): 5375–409. http://dx.doi.org/10.5194/amtd-3-5375-2010.
Full textNovotný, Marián. "Formal analysis of security protocols for wireless sensor networks." Tatra Mountains Mathematical Publications 47, no. 1 (December 1, 2010): 81–97. http://dx.doi.org/10.2478/v10127-010-0032-7.
Full textZhang, Yan, Lixin Gao, and Changfei Tong. "On Distributed Reduced-Order Observer-Based Protocol for Linear Multiagent Consensus under Switching Topology." Abstract and Applied Analysis 2013 (2013): 1–13. http://dx.doi.org/10.1155/2013/793276.
Full text