Academic literature on the topic 'Computer network protocols – Specifications'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer network protocols – Specifications.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer network protocols – Specifications"

1

Ayyagari, A., and A. Ray. "A Fiber-Optic Network Protocol for Computer Integrated Manufacturing." Journal of Engineering for Industry 114, no. 3 (August 1, 1992): 345–51. http://dx.doi.org/10.1115/1.2899802.

Full text
Abstract:
This paper presents the architecture and performance analysis of a fiber-optic-based network protocol for computer integrated manufacturing (CIM). Its adaptation as the common medium access control (MAC) layer protocol in the fiber-optic-based version of the Manufacturing Automation Protocol (MAP) and Technical and Office Protocols (TOP) will make their specifications identical up to the presentation layer; only the application layer which is user specific could be different.
APA, Harvard, Vancouver, ISO, and other styles
2

EL-GENDY, HAZEM, and NABIL EL-KADHI. "FORMAL METHOD FOR AUTOMATED TRANSFORMATION OF LOTOS SPECIFICATIONS TO ESTELLE SPECIFICATIONS." International Journal of Software Engineering and Knowledge Engineering 15, no. 05 (October 2005): 873–91. http://dx.doi.org/10.1142/s0218194005002567.

Full text
Abstract:
ISO and IEC have jointly developed two Formal Description Techniques (FDTs) for specifying distributed real time systems such as computer/telecommunications protocols. These are Lotos and Estelle. In this paper, a formal method for automated transformation of a Lotos specification to an Estelle specification is presented. The method is applicable to various Lotos specification styles and to various communications protocols of ISO OSI layers. Our method has applications in conformance testing of such systems and building common semantic model for the various FDTs. In this paper, we develop an algorithm for constructing a 'Data Oriented'-Restricted Behavior Tree T that represent both the control flow aspects and the data flow aspects of the system. Then, we develop an algorithm for constructing the Estelle specifications from T. A minimization rule is also developed to optimize the size of the Estelle specification by reducing both the number of states and the number of transitions.
APA, Harvard, Vancouver, ISO, and other styles
3

Sija, Baraka D., Young-Hoon Goo, Kyu-Seok Shim, Huru Hasanova, and Myung-Sup Kim. "A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View." Security and Communication Networks 2018 (2018): 1–17. http://dx.doi.org/10.1155/2018/8370341.

Full text
Abstract:
A network protocol defines rules that control communications between two or more machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines the way of extracting the structure of a network protocol without accessing its specifications. Enough knowledge on undocumented protocols is essential for security purposes, network policy implementation, and management of network resources. This paper reviews and analyzes a total of 39 approaches, methods, and tools towards Protocol Reverse Engineering (PRE) and classifies them into four divisions, approaches that reverse engineer protocol finite state machines, protocol formats, and both protocol finite state machines and protocol formats to approaches that focus directly on neither reverse engineering protocol formats nor protocol finite state machines. The efficiency of all approaches’ outputs based on their selected inputs is analyzed in general along with appropriate reverse engineering inputs format. Additionally, we present discussion and extended classification in terms of automated to manual approaches, known and novel categories of reverse engineered protocols, and a literature of reverse engineered protocols in relation to the seven layers’ OSI (Open Systems Interconnection) model.
APA, Harvard, Vancouver, ISO, and other styles
4

CHEN, BO, and SAMIRA SADAOUI. "A GENERIC FORMAL FRAMEWORK FOR CONSTRUCTING AGENT INTERACTION PROTOCOLS." International Journal of Software Engineering and Knowledge Engineering 15, no. 01 (February 2005): 61–85. http://dx.doi.org/10.1142/s0218194005001884.

Full text
Abstract:
Agent interaction protocols (AIP) design is one of the principal issues for building multi-agent systems. Indeed, the construction of AIP should integrate theories, methodologies and tools. We propose in this paper a unifying framework that provides a generic agent architecture to be reused as well as a methodology to construct and refine AIP specifications in an incremental way. This framework is based on the highly expressive formal language Lotos and its related technologies, such as finite state machines and temporal logics. Hence, the proposed framework also facilitates formal validation and verification of AIP specifications using rigorous tools. We argue that there are three layers of semantics of Lotos specifications that can improve Lotos expressivity in describing agent interaction. Therefore, this framework can describe almost all aspects of agent interaction and at different abstraction levels. In addition, we demonstrate how to generate an online auction protocol from the generic framework, and how to validate and verify this protocol.
APA, Harvard, Vancouver, ISO, and other styles
5

Tightiz, Lilia, and Hyosik Yang. "A Comprehensive Review on IoT Protocols’ Features in Smart Grid Communication." Energies 13, no. 11 (June 1, 2020): 2762. http://dx.doi.org/10.3390/en13112762.

Full text
Abstract:
Since the smart grid deals with a large mass of data and critical missions, it requires ubiquitous, reliable, and real-time communication. The Internet of Things (IoT) technology, which has the potential of connecting all objects over the globe through the Internet, excels in providing robust information transmission infrastructure in the smart grid. There are a multitude of possible protocols, standards, and configurations for communication in the smart grid. A commonly applied communication standard IEC 61850 recommends the use of Manufacturing Message Specification (MMS) protocol for communication in Local Area Network (LAN) and eXtensible Messaging and Presence Protocol (XMPP) in Wide Area Network (WAN). However, a plethora of research on this topic compares the behavior of other IoT protocols and standard recommendations in the smart grid. On the other hand, the sky-rocketing penetration of Renewable Energy Sources (RES), especially in the form of micro grid, transformed the central control structure of the smart grid into a distributed style called Multi-Agent Systems (MAS). This new approach defined new communication requirements and more particular IoT protocol characteristic requirements. However, a limited number of the existing studies have considered IoT protocol characteristic requirements of the smart grid and its new control structures. In this paper, we initially investigate the communication requirements of the smart grid and introduce all IoT protocols and their specifications. We analyze IoT protocol characteristics and performances in the smart grid through literature review based on the smart grid communication requirements. In this approach, we highlight weak points of these practices making them fail to acquire the holistic guidelines in utilizing proper IoT protocol that can meet the smart grid environment interaction requirements. Using the existing facilities, the public Internet, we follow the arrangement of cost-effective high penetration communication requirements for new structures of the smart grid, i.e., the MAS and multi-micro grid. In this case, we consider IoT protocol Quality of Services (QoS) requirements, especially in the case of security and reliability, to satisfy stakeholders, namely utilities and prosumers. Addressing effective elements in applying IoT in the smart grid’s future trends is another contribution to this paper.
APA, Harvard, Vancouver, ISO, and other styles
6

Ayyagari, A., and A. Ray. "A Fiber-Optic-Based Protocol for Manufacturing System Networks: Part I—Conceptual Development and Architecture." Journal of Dynamic Systems, Measurement, and Control 114, no. 1 (March 1, 1992): 113–20. http://dx.doi.org/10.1115/1.2896492.

Full text
Abstract:
The goal of Computer Integrated Manufacturing (CIM) is to put together the diverse areas of engineering, design and production processes, material inventory, sales and purchasing, and accounting and administration into a single interactive closed loop control system [1]. Essential to this distributed total manufacturing system is the integrated communications network over which the information leading to process interactions, and plant management and control will flow. Such a network must be capable of handling heterogeneous real-time (e.g., data packets for inter-machine communications at the factory floor) and non-real-time (e.g., Computer Aided Design (CAD) drawings, design specifications, and administrative information) traffic. This sequence of papers in two parts presents the development and analysis of a novel fiber-optic-based medium access control (MAC) protocol for integrated factory and office communications. Its adaptation as the common MAC layer protocol in the fiber-optic-based version of Manufacturing Automation Protocol (MAP) [2] and Technical and Office Protocols (TOP) [3], will make their specifications identical up to the presentation layer; only the application layer which is user-specific could be different. This first part provides the necessary background for the reported work and details of the protocol which is represented by a finite-state-machine model. Part II [4] presents the performance analysis of the protocol using a statistical model, and a comparison of the simulation and analytical results.
APA, Harvard, Vancouver, ISO, and other styles
7

Jmaiel, Mohamed, and Peter Pepper. "Development of communication protocols using algebraic and temporal specifications." Computer Networks 42, no. 6 (August 2003): 737–64. http://dx.doi.org/10.1016/s1389-1286(03)00215-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mayouf, Mabroka Ali, and Zarina Shukur. "Animation of Natural Language Specifications of Authentication Protocols." Journal of Computer Science 4, no. 7 (July 1, 2008): 503–8. http://dx.doi.org/10.3844/jcssp.2008.503.508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Letichevsky, A., J. Kapitonova, A. Letichevsky, V. Volkov, S. Baranov, and T. Weigert. "Basic protocols, message sequence charts, and the verification of requirements specifications." Computer Networks 49, no. 5 (December 2005): 661–75. http://dx.doi.org/10.1016/j.comnet.2005.05.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Wonsoo, Kumaran Vijayasankar, Mickael Chouteau, and Jianwei Zhou. "An Experimental Study of Sub-1 GHz Frequency-Hopping-Based 6LoWPAN Mesh Networking for Smart-Grid Applications." Journal of Computer Networks and Communications 2019 (May 16, 2019): 1–11. http://dx.doi.org/10.1155/2019/5787653.

Full text
Abstract:
This paper presents an experimental study of a multihop Internet Protocol Version 6 over Low-Power Wireless Personal Area Networks (6LoWPAN)-based mesh system that uses un-slotted channel hopping (USCH) medium access control (MAC). Designers of wireless smart-grid networks are using (or looking to use) the Sub-1 GHz spectrum, given its longer radio range compared to the traditional 2.4 GHz spectrum used in Wi-Fi® or Bluetooth® low energy. The frequency-hopping (FH) technique is attractive in this area, as it provides improved robustness and longer range owing to the higher transmission power that regulatory requirements allow. Although Sub-1 GHz allows for a longer range, smart-grid networks deployed over a large geographic area still require multiple hops to provide the required coverage. Many proprietary and standards-based solutions have been proposed to implement such a networking protocol. Notable specifications in this area include the Field Area Networks (FAN) specification from the Wi-SUN (smart utility networks) Alliance and the JupiterMesh specification from the Zigbee Alliance. Little is known about the performance of FH systems over a multihop network, however. This paper presents an implementation of an FH-based multihop networking protocol based on the Texas Instruments (TI) SimpleLink™ TI 15.4-stack, with an experimental study of such a system over multiple hops compared to a non-frequency-hopping (non-FH) system. Results show that the proposed FH-based 6LoWPAN mesh system significantly improves network coverage, network capacity, and communication robustness to interference while demonstrating coexistence capabilities.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Computer network protocols – Specifications"

1

Son, Chang Won. "Functional description and formal specification of a generic gateway." Diss., The University of Arizona, 1988. http://hdl.handle.net/10150/184534.

Full text
Abstract:
This dissertation is concerned with the design of a generic gateway which provides an interoperability between dissimilar computer networks. The generic gateway is decomposed with subnetwork dependent blocks and subnetwork independent blocks. The subnetwork dependent block is responsible to communicate with subnetwork nodes. The subnetwork independent block is responsible to interconnect the subnetwork dependent blocks. The communications between subnetwork dependent and independent blocks are done by service access points which defined independently to any specific subnetworks. Formal specification of a generic gateway is provided by LOTOS. The generic gateway specification is tested by a verifiable test method which is proposed in this dissertation. The correctness of the specification has been verified while the specified model is simulated. The major difference between conventional simulation and the verifiable test is in the objective of simulation. In the verifiable test method, the semantical properties are examined during the simulation process. The tester can be either human observer or other process.
APA, Harvard, Vancouver, ISO, and other styles
2

Cwikla, Joseph J. "Specifying, Implementing and Verifying Layered Network Protocols." University of Akron / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=akron1217270536.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tsiknis, George. "Specification-verification of protocols : the significant event temporal logic technique." Thesis, University of British Columbia, 1985. http://hdl.handle.net/2429/25047.

Full text
Abstract:
This thesis addresses the problem of protocol verification. We first present a brief review of the existing specification methods for communication protocols, with emphasis on the hybrid techniques. The alternating bit protocol is specified in ISO/FDT, BBN/FST and UNISPEX to provide a comparison between three interesting hybrid models of protocol specification. A method for applying the unbounded state Temporal Logic to verify a protocol specified in a hybrid technique (in particular FDT) is outlined. Finally, a new specification and verification method called SETL is proposed, which is based on event sequences and temporal logic. To illustrate the method two data transfer protocols namely, the stop-wait and alternating bit protocols are specified in SETL and verified. We demonstrate that SETL is a generalization of the hybrid techniques, it is sound and that it can be semi-automated.
Science, Faculty of
Computer Science, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Zheng. "A pattern-based approach to the specification and validation of web services interactions." Australasian Digital Thesis Program, 2007. http://adt.lib.swin.edu.au/public/adt-VSWT20070618.115228/index.html.

Full text
Abstract:
Thesis (MSc) - Swinburne University of Technology, Faculty of Information & Communication Technologies, 2006.
A thesis submitted to Faculty of Information and Communication Technologies, Swinburne University of Technology for the degree of Master of Science by Research, 2007. Typescript. Bibliography p. 107-112.
APA, Harvard, Vancouver, ISO, and other styles
5

Nguyen, Quoc The. "Protocols specification and validation for the movement of Grades 2 and 3 Bitstream data through the Virtual Channel Link Control layer of the return link of the CCSDS Principal Network (CPN)." Thesis, Virginia Tech, 1989. http://hdl.handle.net/10919/43293.

Full text
Abstract:
Specification of data communication protocols requirements requires a formal approach to ensure that the requirements are correctly and unambiguously specified. This research examines a proposed protocols specification for the movement of bitstream data through space segment by applying a formal definition technique known as the Language of Temporal Ordering System (LOTOS). Successful generation of the LOTOS specification to detail sequence of events and their internal structures in an implementation independent manner clarifies the requirements and provides a framework from which possible cases or events in each process can be tested. In addition, a LOTOS software tool called HIPPO is used in the research. HIPPO identifies any deadlock that could happen in the protocols and allows sequence of events to be interactively simulated to ascertain of the specification consistency.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
6

Irey, Philip Musser IV. "From specification to realization: implementing the express transfer protocol." Thesis, Virginia Tech, 1989. http://hdl.handle.net/10919/43088.

Full text
Abstract:
The research described in this thesis deals with effective protocol specification. The primary question addressed is whether the Express Transfer Protocol (XTP), a "real-time" Transport layer protocol, is sufficiently specified or are there "holes" in its specification? A new protocol evaluation process is formulated and applied to XTP in order to answer this question. The evaluation process combines a detailed analysis of the XTP specification with an attempt to implement parts of the protocol from the specification. Special attention is given to those aspects of the protocol that affect "real-time" naval tactical communications. The detailed analysis of the specification and its effect on the specification revision process are presented. The analysis is described in formal comment papers and electronic mail transmitted to the protocol designer, Dr. Greg Chesson. Elements of the protocol most applicable to tactical communication are selected for implementation. A number of assumptions are made so that an implementation can be built. The design of the prototype implementation and the assumptions made to build it are discussed. Both the hardware and software being used to build the implementation are presented. The protocol evaluation process is found to be appropriate for evaluating XTP. A comparison is made between this technique of protocol evaluation and existing techniques (i.e., simulation, complete implementation, and protocol verification). The principal conclusion of the protocol valuation process is that a number of areas of the XTP Protocol Definition (prior to Revision 3.3) are not sufficiently specified. These areas must be properly specified before a complete implementation can be built. Without a complete specification, the communications support intended for XTP is unlikely to be realized.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
7

Berglund, Anders. "On the understanding of computer network protocols." Licentiate thesis, Uppsala universitet, Avdelningen för datorteknik, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-86076.

Full text
Abstract:
How students learn about network protocols is studied in a project-centred, internationally distributed, university course in computer systems taught jointly by two universities. Insights into students' understanding of basic concepts within computer networks are gained through an empirical phenomenographic research approach. The use of phenomenography as a research approach makes it possible to learn about computer science, as it is experienced by the students. The context in which the research is carried out and issues concerning by whom the context is experienced, are investigated and form a part of the methodological basis. Students' understanding of some protocols that are used within the project, as well as their experience of the general concept of network protocols are investigated, and different ways of experiencing the protocols are discerned. Some aspects that indicate good learning outcomes are identified, such as being capable of understanding a protocol in different ways and of making relevant choices between the ways it could be experienced according to the context in which it appears. Based on these results a discussion on learning and teaching is developed. It is argued that a variation in the context in which the protocol is experienced promotes good learning, since different ways of experiencing a protocol are useful with different tasks to hand. A student with a good understanding of network protocols can choose in a situationally relevant way between different ways of experiencing a protocol.
APA, Harvard, Vancouver, ISO, and other styles
8

Perlman, Radia Joy. "Network layer protocols with Byzantine robustness." Thesis, Massachusetts Institute of Technology, 1988. http://hdl.handle.net/1721.1/14403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ford, Daniel Alexander. "Semi-automatic implementation of network protocols." Thesis, University of British Columbia, 1985. http://hdl.handle.net/2429/24665.

Full text
Abstract:
A compiler which achieves automatic implementation of network protocols by transforming specifications written in FDT into C programs is presented. A brief introduction to the the fundamentals of FDT, a standard language developed by ISO/TC97/SC 16/WG 1 Subgroup B for specifying network protocols, is given. We then present an overview of the compiler and discuss the problem of PASCAL to C translation. Transformation of a FDT specification into code is explained and illustrated by two implementation examples. The first example illustrates the implementation strategy by tracing the processing of a simple protocol. The second example demonstrates the validity of using automatically generated implementations by showing how a communication path was established between two hosts using code generated for the alternating bit protocol.
Science, Faculty of
Computer Science, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
10

Wibling, Oskar. "Creating Correct Network Protocols." Doctoral thesis, Uppsala universitet, Avdelningen för datorteknik, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-9361.

Full text
Abstract:
Network protocol construction is a complex and error prone task. The challenges originate both from the inherent complexity of developing correct program code and from the distributed nature of networked systems. Protocol errors can have devastating consequences. Even so, methods for ensuring protocol correctness are currently only used to a limited extent. A central reason for this is that they are often complex and expensive to employ. In this thesis, we develop methods to perform network protocol testing and verification, with the goal to make the techniques more accessible and readily adoptable. We examine how to formulate correctness requirements for ad hoc routing protocols used to set up forwarding paths in wireless networks. Model checking is a way to verify such requirements automatically. We investigate scalability of finite-state model checking, in terms of network size and topological complexity, and devise a manual abstraction technique to improve scalability. A methodology combining simulations, emulations, and real world experiments is developed for analyzing the performance of wireless protocol implementations. The technique is applied in a comparison of the ad hoc routing protocols AODV, DSR, and OLSR. Discrepancies between simulations and real world behavior are identified; these are due to absence of realistic radio propagation and mobility models in simulation. The issues are mainly related to how the protocols sense their network surroundings and we identify improvements to these capabilities. Finally, we develop a methodology and a tool for automatic verification of safety properties of infinite-state network protocols, modeled as graph transformation systems extended with negative application conditions. The verification uses symbolic backward reachability analysis. By introducing abstractions in the form of summary nodes, the method is extended to protocols with recursive data structures. Our tool automatically verifies correct routing of the DYMO ad hoc routing protocol and several nontrivial heap manipulating programs.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer network protocols – Specifications"

1

Tarnay, Katie. Protocol specification and testing. New York: Plenum Press, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

IEEE Computer Society. Technical Committee on Computer Communications., ed. Token-passing bus access method and physical layer specifications: IEEE standards for local area networks. New York, NY, USA: Institute of Electrical and Electronics Engineers, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tao, JianYi. Protocol interoperability between DDN and ISO protocols: A study and specification report. Tucson, Ariz: Computer Engineering Research Laboratory, University of Arizona, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

IFIP WG6.1 International Workshop on Protocol Specification, Testing and Verification (5th 1985 Toulouse-Moissac). Protocol specification, testing, and verification, V: Proceedings of the IFIP WG 6.1 fifth International Workshop on Protocol Specification, Testing, and Verification organized by the LAAS du CNRS, Toulouse-Moissac, France, June 10-13, 1985. Amsterdam: North-Holland, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

IFIP WG 6.1 International Workshop on Protocol Specification, Testing and Verification (6th Montreal, Quebec 1986). Protocol specification, testing and verification, VI: Proceedings of the IFIP WG6.1 sixth International Workshop on Protocol Specification Testing, and Verification organized by Concordia University and Université de Montréal Montreal, Quebec, Canada, June 10-13, 1986. Amsterdam: North-Holland, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

International, Organization for Standardization Technical Committee ISO/TC 46 Documentation SC4/WG4. Documentation, interlibrary loan protocol specification. [S.l: s.n., 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

IFIP, WG 6. 1. International Workshop on Protocol Specification Testing and Verification (4th 1984 Skytop Lodge Pa ). Protocol specification, testing, and verification, IV: Proceedings of the IFIP WG 6.1 International Workshop on Protocol Specification, Testing, and Verification. Amsterdam: North-Holland, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

IFIP WG 6.1 International Workshop on Protocol Specification, Testing, and Verification (5th 1985 Toulouse, France and Moissac, Tarn-et-Garonne, France). Protocol specification, testing, and verification, V: Proceedings of the IFIP WG 6.1 Fifth International Workshop on Protocol Specification, Testing, and Verification. Amsterdam: North-Holland, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

IFIP WG 6.1 International Workshop on Protocol Specification, Testing, and Verification (6th 1986 Montréal, Québec). Protocol specification, testing, and verification, VI: Proceedings of the IFIP WG 6.1 Sixth International Workshop on Protocol Specification, Testing, and Verification. Amsterdam: North-Holland, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

IFIP WG 6.1 International Workshop on Protocol Specification, Testing, and Verification (7th 1987 Zurich, Switzerland). Protocol specification, testing, and verification, VII: Proceedings of the IFIP WG 6.1 Seventh International Conference on Protocol Specification, Testing, and Verification. Amsterdam: North-Holland, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer network protocols – Specifications"

1

Bochmann, Gregor V., and Carl A. Sunshine. "Formal Methods for Protocol Specification and Validation." In Computer Network Architectures and Protocols, 513–31. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Abadi, Martín. "Security Protocols and Specifications." In Lecture Notes in Computer Science, 1–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-49019-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Harrim, Muhannad, Mohamed El-Wakil, and Ala Al-Fuqaha. "Network Layer Protocols." In Handbook of Computer Networks, 40–62. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118256053.ch4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kizza, Joseph Migga. "Computer Network Security Protocols." In Guide to Computer Network Security, 359–89. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kizza, Joseph Migga. "Computer Network Security Protocols." In Guide to Computer Network Security, 365–96. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kizza, Joseph Migga. "Computer Network Security Protocols." In Guide to Computer Network Security, 357–86. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kizza, Joseph Migga. "Computer Network Security Protocols." In Texts in Computer Science, 367–98. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38141-7_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schwartz, Mischa, and Thomas E. Stern. "Routing Protocols." In Computer Network Architectures and Protocols, 239–71. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jeannin, Jean-Baptiste, Guido de Caso, Juan Chen, Yuri Gurevich, Prasad Naldurg, and Nikhil Swamy. "dkal ⋆ : Constructing Executable Specifications of Authorization Protocols." In Lecture Notes in Computer Science, 139–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36563-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Papadimitriou, Christos H., Venkat Rangan, and Martha Sideri. "Designing secure communication protocols from trust specifications." In Lecture Notes in Computer Science, 360–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991. http://dx.doi.org/10.1007/3-540-54967-6_81.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer network protocols – Specifications"

1

Thu, Kyaw Myat, Myo Thet Naung, Kyaw Zaw Ye, and V. V. Devyatkov. "The Formal Logical Analysis of the Correctness of the Specifications of Network Protocol SIP." In 2016 UKSim-AMSS 18th International Conference on Computer Modelling and Simulation (UKSim). IEEE, 2016. http://dx.doi.org/10.1109/uksim.2016.47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

He, HuiHui, and YongJun Wang. "PNFUZZ: A Stateful Network Protocol Fuzzing Approach Based on Packet Clustering." In 6th International Conference on Computer Science, Engineering And Applications (CSEA 2020). AIRCC Publishing Corporation, 2020. http://dx.doi.org/10.5121/csit.2020.101805.

Full text
Abstract:
Due to the interactivity of stateful network protocol, network protocol fuzzing has higher blindness and lower testcase validity. The existing blackbox-based fuzzing has the disadvantages of high randomness and blindness. The manual description of protocol specification which requires more expert knowledge, is tedious and does not support the protocol without public document, which limits the effect of current network protocol fuzzer. In this paper, we present PNFUZZ, a fuzzer that adopts the state inference based on packet clustering algorithm and coverage oriented mutation strategy. We train a clustering model through the target protocol packet, and use the model to identify the server’s protocol state, thereby optimizing the process of testcase generation. The experimental results show that the proposed approach has a certain improvement in fuzzing effect.
APA, Harvard, Vancouver, ISO, and other styles
3

Ciobanu, G., and K. N. Sridhar. "Specifications and verification of network protocols by process algebra." In Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC'05). IEEE, 2005. http://dx.doi.org/10.1109/synasc.2005.68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Eunsoo, Dongkwan Kim, CheolJun Park, Insu Yun, and Yongdae Kim. "BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2021. http://dx.doi.org/10.14722/ndss.2021.24365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Oswald, Nicolai, Vijay Nagarajan, and Daniel J. Sorin. "ProtoGen: Automatically Generating Directory Cache Coherence Protocols from Atomic Specifications." In 2018 ACM/IEEE 45th Annual International Symposium on Computer Architecture (ISCA). IEEE, 2018. http://dx.doi.org/10.1109/isca.2018.00030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kalai, Yael Tauman, Xin Li, Anup Rao, and David Zuckerman. "Network Extractor Protocols." In 2008 IEEE 49th Annual IEEE Symposium on Foundations of Computer Science (FOCS). IEEE, 2008. http://dx.doi.org/10.1109/focs.2008.73.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Oliveira, Loreno, Andre Rodrigues, Kyller Gorgonio, and Angelo Perkusich. "Specification and analysis of a Bluetooth handoff protocol for real-time applications." In 2008 16th International Conference on Software, Telecommunications and Computer Networks. IEEE, 2008. http://dx.doi.org/10.1109/softcom.2008.4669475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vazquez Sandoval, Itzel, and Gabriele Lenzini. "Experience Report: How to Extract Security Protocols' Specifications from C Libraries." In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2018. http://dx.doi.org/10.1109/compsac.2018.10325.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Aslanyan, Levon, Hasmik Sahakyan, Vladimir Romanov, Georges Da Costa, and Rahim Kacimi. "Large Network Target Coverage Protocols." In 2019 Computer Science and Information Technologies (CSIT). IEEE, 2019. http://dx.doi.org/10.1109/csitechnol.2019.8895058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vinodh Kumar, B., and J. Ramesh. "Automotive in vehicle network protocols." In 2014 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2014. http://dx.doi.org/10.1109/iccci.2014.6921836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography