Journal articles on the topic 'Computer network protocols – Testing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Computer network protocols – Testing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Che, Xiaoping, and Stephane Maag. "Passive performance testing of network protocols." Computer Communications 51 (September 2014): 36–47. http://dx.doi.org/10.1016/j.comcom.2014.06.001.
Full textSidhu, D. P., and C. S. Chang. "Probabilistic testing of protocols." ACM SIGCOMM Computer Communication Review 19, no. 4 (August 1989): 295–302. http://dx.doi.org/10.1145/75247.75275.
Full textYang, Xiao Jing, and Sheng Li Chen. "Study on a Wireless Temperature and Humidity Monitoring System for Workshop with Constant Temperature Based on SCM." Applied Mechanics and Materials 701-702 (December 2014): 593–97. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.593.
Full textJedermann, Reiner, Markus Becker, Carmelita Gorg, and Walter Lang. "Testing network protocols and signal attenuation in packed food transports." International Journal of Sensor Networks 9, no. 3/4 (2011): 170. http://dx.doi.org/10.1504/ijsnet.2011.040238.
Full textOlenev, Valentin, Irina Lavrovskaya, Yuriy Sheynin, Ilya Korobkov, Elena Suvorova, Elena Podgornova, Dmitry Dymov, and Sergey Kochura. "STP-ISS Transport Protocol for SpaceWire On-Board Networks." International Journal of Embedded and Real-Time Communication Systems 5, no. 4 (October 2014): 45–76. http://dx.doi.org/10.4018/ijertcs.2014100103.
Full textRiska, Riska, and Hendri Alamsyah. "Analisis Perbandingan Protokol Transport Pada Video Streaming di Jaringan Lokal (LAN) Menggunakan Videolan Client." JURNAL MEDIA INFORMATIKA BUDIDARMA 3, no. 2 (April 14, 2019): 126. http://dx.doi.org/10.30865/mib.v3i2.1110.
Full textWarman, Indra, and Alex Franozal. "QoS Analysis on OSPFv3 And RIPng Using GRE Tunneling on IPv6 Integrated Ipv4 Network." MATEC Web of Conferences 215 (2018): 01005. http://dx.doi.org/10.1051/matecconf/201821501005.
Full textZhang, Yujun. "Transport Mechanism Applied to Computer Network Protocol Conformance Testing." Journal of Computer Research and Development 42, no. 1 (2005): 102. http://dx.doi.org/10.1360/crad20050114.
Full textMohd Fuzi, Mohd Faris, Khairunnisa Abdullah, Iman Hazwam Abd Halim, and Rafiza Ruslan. "Network Automation using Ansible for EIGRP Network." Journal of Computing Research and Innovation 6, no. 4 (September 20, 2021): 59–69. http://dx.doi.org/10.24191/jcrinn.v6i4.237.
Full textWang, Qun, Zhonghao Sun, Zhangquan Wang, Shiping Ye, Ziyi Su, Hao Chen, and Chao Hu. "A Practical Format and Semantic Reverse Analysis Approach for Industrial Control Protocols." Security and Communication Networks 2021 (March 12, 2021): 1–11. http://dx.doi.org/10.1155/2021/6690988.
Full textLiu, Xinyao, Baojiang Cui, Junsong Fu, and Jinxin Ma. "HFuzz: Towards automatic fuzzing testing of NB-IoT core network protocols implementations." Future Generation Computer Systems 108 (July 2020): 390–400. http://dx.doi.org/10.1016/j.future.2019.12.032.
Full textUyar, M. Ümit, Mariusz A. Fecko, Adarshpal S. Sethi, and Paul D. Amer. "Testing protocols modeled as FSMs with timing parameters." Computer Networks 31, no. 18 (August 1999): 1967–88. http://dx.doi.org/10.1016/s1389-1286(99)00007-9.
Full textCheung, Long Fung, King Shan Lui, Kenneth Kin Yip Wong, Wing Kin Lee, and Philip W. T. Pong. "A Laboratory-Based Smart Grid Sensor Network Testbed." Applied Mechanics and Materials 479-480 (December 2013): 747–52. http://dx.doi.org/10.4028/www.scientific.net/amm.479-480.747.
Full textLin, Weiwei, Hongwei Zeng, Honghao Gao, Huaikou Miao, and Xiaolin Wang. "Test Sequence Reduction of Wireless Protocol Conformance Testing to Internet of Things." Security and Communication Networks 2018 (November 1, 2018): 1–13. http://dx.doi.org/10.1155/2018/3723691.
Full textWang, Alf Inge, Martin Jarrett, and Eivind Sorteberg. "Experiences from Implementing a Mobile Multiplayer Real-Time Game for Wireless Networks with High Latency." International Journal of Computer Games Technology 2009 (2009): 1–14. http://dx.doi.org/10.1155/2009/530367.
Full textUmar, Rusydi, Imam Riadi, and Ridho Surya Kusuma. "Mitigating Sodinokibi Ransomware Attack on Cloud Network Using Software-Defined Networking (SDN)." International Journal of Safety and Security Engineering 11, no. 3 (June 30, 2021): 239–46. http://dx.doi.org/10.18280/ijsse.110304.
Full textHerschel, Richard, Hamid Nemati, and David Steiger. "Knowledge Exchange Protocols: A Second Study." Journal of Information & Knowledge Management 02, no. 02 (June 2003): 153–63. http://dx.doi.org/10.1142/s0219649203000085.
Full textBishop, Steve, Matthew Fairbairn, Michael Norrish, Peter Sewell, Michael Smith, and Keith Wansbrough. "Rigorous specification and conformance testing techniques for network protocols, as applied to TCP, UDP, and sockets." ACM SIGCOMM Computer Communication Review 35, no. 4 (October 2005): 265–76. http://dx.doi.org/10.1145/1090191.1080123.
Full textKorniyenko, Bogdan, and Liliya Galata. "MODELING OF INFORMATION SECURITY SYSTEM IN COMPUTER NETWORK." Information systems and technologies security, no. 1 (1) (2019): 36–41. http://dx.doi.org/10.17721/ists.2019.1.36-41.
Full textZhang, Hong, and Jie Li. "Dynamical Topology Analysis Of Vanet Based On Complex Networks Theory." Cybernetics and Information Technologies 14, no. 5 (December 1, 2014): 172–86. http://dx.doi.org/10.2478/cait-2014-0053.
Full textKhattak, Hasan, Zoobia Ameer, Ud Din, and Muhammad Khan. "Cross-layer design and optimization techniques in wireless multimedia sensor networks for smart cities." Computer Science and Information Systems 16, no. 1 (2019): 1–17. http://dx.doi.org/10.2298/csis181115004k.
Full textDyce, Keir, and Mary Barrett. "Taking Care of (E)-Business?: Australian IT Professionals’ Views of Wireless Network Vulnerability Assessments." Journal of Theoretical and Applied Electronic Commerce Research 1, no. 2 (August 1, 2006): 79–89. http://dx.doi.org/10.3390/jtaer1020015.
Full textLI, Wei-Ming, Ai-Fang ZHANG, Jian-Cai LIU, and Zhi-Tang LI. "An Automatic Network Protocol Fuzz Testing and Vulnerability Discovering Method." Chinese Journal of Computers 34, no. 2 (May 19, 2011): 242–55. http://dx.doi.org/10.3724/sp.j.1016.2011.00242.
Full textLee, D., Dongluo Chen, Ruibing Hao, R. E. Miller, Jianping Wu, and Xia Yin. "Network protocol system monitoring-a formal approach with passive testing." IEEE/ACM Transactions on Networking 14, no. 2 (April 2006): 424–37. http://dx.doi.org/10.1109/tnet.2006.872572.
Full textGiridharan, Guruprasad A., Michael A. Sobieski, Mickey Ising, Mark S. Slaughter, and Steven C. Koenig. "Blood Trauma Testing For Mechanical Circulatory Support Devices." Biomedical Instrumentation & Technology 45, no. 4 (July 1, 2011): 334–39. http://dx.doi.org/10.2345/0899-8205-45.4.334.
Full textÜmit Uyar, M., Mariusz A. Fecko, Ali Y. Duale, Paul D. Amer, and Adarshpal S. Sethi. "Experience in developing and testing network protocol software using FDTs." Information and Software Technology 45, no. 12 (September 2003): 815–35. http://dx.doi.org/10.1016/s0950-5849(03)00062-4.
Full textWei-Wei, Lin, Zeng Hong-Wei, and Jung Yoon Kim. "A Combining Method for Wireless Protocol Conformance Testing: A Empirical Case." Wireless Communications and Mobile Computing 2021 (July 15, 2021): 1–14. http://dx.doi.org/10.1155/2021/6378139.
Full textDarmawan, Darmawan, and Pharmayeni Pharmayeni. "Development of Client-Server Application by Using UDP Socket Programming for Remotely Monitoring CNC Machine Environment in Fixture Process." Jurnal Rekayasa Elektrika 12, no. 2 (August 30, 2016): 48. http://dx.doi.org/10.17529/jre.v12i2.2925.
Full textRamalingom, T., K. Thulasiraman, and A. Das. "Context independent unique state identification sequences for testing communication protocols modelled as extended finite state machines." Computer Communications 26, no. 14 (September 2003): 1622–33. http://dx.doi.org/10.1016/s0140-3664(03)00116-6.
Full textGuo, Jiaxing, Chunxiang Gu, Xi Chen, Siqi Lu, and Fushan Wei. "Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations." Information Technology and Control 50, no. 3 (September 24, 2021): 570–87. http://dx.doi.org/10.5755/j01.itc.50.3.27844.
Full textAhmed, Ahmed Abdelmoamen, and Gbenga Agunsoye. "A Real-Time Network Traffic Classifier for Online Applications Using Machine Learning." Algorithms 14, no. 8 (August 21, 2021): 250. http://dx.doi.org/10.3390/a14080250.
Full textMouttappa, Pramila, Stephane Maag, and Ana Cavalli. "Using passive testing based on symbolic execution and slicing techniques: Application to the validation of communication protocols." Computer Networks 57, no. 15 (October 2013): 2992–3008. http://dx.doi.org/10.1016/j.comnet.2013.06.019.
Full textFanani, Galih, and Imam Riadi. "Analysis of Digital Evidence on Denial of Service (DoS) Attack Log Based." Buletin Ilmiah Sarjana Teknik Elektro 2, no. 2 (July 21, 2020): 70. http://dx.doi.org/10.12928/biste.v2i2.1065.
Full textNinkovic, Nemanja, Slavko Gajin, and Irini Reljin. "Packet dispersion strategy evaluation from the perspective of packet loss pattern and VoIP quality." Computer Science and Information Systems 13, no. 1 (2016): 71–92. http://dx.doi.org/10.2298/csis150120043n.
Full textWildman, Wesley J., Saikou Y. Diallo, George Hodulik, Andrew Page, Andreas Tolk, and Neha Gondal. "The Artificial University: Decision Support for Universities in the COVID-19 Era." Complexity 2020 (December 24, 2020): 1–10. http://dx.doi.org/10.1155/2020/5910209.
Full textEL-GENDY, HAZEM, and NABIL EL-KADHI. "FORMAL METHOD FOR AUTOMATED TRANSFORMATION OF LOTOS SPECIFICATIONS TO ESTELLE SPECIFICATIONS." International Journal of Software Engineering and Knowledge Engineering 15, no. 05 (October 2005): 873–91. http://dx.doi.org/10.1142/s0218194005002567.
Full textKOJIMA, Hideharu, Juichi TAKAHASHI, Tomoyuki OHTA, and Yoshiaki KAKUDA. "An Equivalent Division Method for Reducing Test Cases in State Transition Testing of MANET Protocols." IEICE Transactions on Communications E92-B, no. 3 (2009): 794–806. http://dx.doi.org/10.1587/transcom.e92.b.794.
Full textAzhar, Raesul. "Analisa Perbandingan Penerapan PBR Dan Non PBR Pada Protocol OSPF Untuk Koneksi Internet." Jurnal Matrik 15, no. 1 (July 26, 2017): 29. http://dx.doi.org/10.30812/matrik.v15i1.26.
Full textHolbech, Henrik, Peter Matthiessen, Martin Hansen, Gerrit Schüürmann, Dries Knapen, Marieke Reuver, Frédéric Flamant, et al. "ERGO: Breaking Down the Wall between Human Health and Environmental Testing of Endocrine Disrupters." International Journal of Molecular Sciences 21, no. 8 (April 22, 2020): 2954. http://dx.doi.org/10.3390/ijms21082954.
Full textWang, Zhiqiang, Yuheng Lin, Zihan Zhuo, Jieming Gu, and Tao Yang. "GNFCVulFinder: NDEF Vulnerability Discovering for NFC-Enabled Smart Mobile Devices Based on Fuzzing." Security and Communication Networks 2021 (June 28, 2021): 1–14. http://dx.doi.org/10.1155/2021/9946022.
Full textMichel, Hervé, Thomas Kroc, Brian J. McEvoy, Deepak Patil, Pierre Reppert, and Mark A. Smith. "Potential Induced Radioactivity in Materials Processed with X-ray Energy Above 5 MeV." Biomedical Instrumentation & Technology 55, s3 (March 1, 2021): 17–26. http://dx.doi.org/10.2345/0899-8205-55.s3.17.
Full textARYANTA, DWI, and BAYU AGUNG PRANATA. "Perancangan dan Analisis Redistribution Routing Protocol OSPF dan EIGRP." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 2, no. 2 (July 1, 2014): 85. http://dx.doi.org/10.26760/elkomika.v2i2.85.
Full textWang, G., and X. Luo. "Design and debugging of communication between controller and Kingview based on CAN bus." World Journal of Engineering 10, no. 4 (August 21, 2013): 395–400. http://dx.doi.org/10.1260/1708-5284.10.4.395.
Full textZendehdel, Ghazale Amel, Ratinder Kaur, Inderpreet Chopra, Natalia Stakhanova, and Erik Scheme. "Automated Security Assessment Framework for Wearable BLE-enabled Health Monitoring Devices." ACM Transactions on Internet Technology 22, no. 1 (February 28, 2022): 1–31. http://dx.doi.org/10.1145/3448649.
Full textSánchez-Sutil, Francisco, and Antonio Cano-Ortega. "Design and Testing of a Power Analyzer Monitor and Programming Device in Industries with a LoRA LPWAN Network." Electronics 10, no. 4 (February 11, 2021): 453. http://dx.doi.org/10.3390/electronics10040453.
Full textMonteiro, Diogo Souza, and Sven Anders. "Third-party certification, food standards and quality assurance in supply chains." Journal on Chain and Network Science 9, no. 2 (January 1, 2009): 83–88. http://dx.doi.org/10.3920/jcns2009.x164.
Full textYulianto, Budi. "Analisis Korelasi Faktor Perilaku Konsumen terhadap Keputusan Penggunaan Teknologi Komunikasi Voip." ComTech: Computer, Mathematics and Engineering Applications 5, no. 1 (June 30, 2014): 236. http://dx.doi.org/10.21512/comtech.v5i1.2619.
Full textQian, Zhi Qin, Li Zong Lin, Zhuan Huang, Wei Guo Ju, and Qun Cao. "A Design of Comprehensive Remote Sensor Experiment System." Applied Mechanics and Materials 437 (October 2013): 643–49. http://dx.doi.org/10.4028/www.scientific.net/amm.437.643.
Full textLópez-Valcárcel, Luis A., and Manuel García Sánchez. "A Wideband Radio Channel Sounder for Non-Stationary Channels: Design, Implementation and Testing." Electronics 10, no. 15 (July 30, 2021): 1838. http://dx.doi.org/10.3390/electronics10151838.
Full textIavich, Maksim, Tamari Kuchukhidze, Sergiy Gnatyuk, and Andriy Fesenko. "Novel Certification Method for Quantum Random Number Generators." International Journal of Computer Network and Information Security 13, no. 3 (June 8, 2021): 28–38. http://dx.doi.org/10.5815/ijcnis.2021.03.03.
Full text