Journal articles on the topic 'Model-based protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Model-based protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mordecai, Yaniv. "Model-based protocol specification." Systems Engineering 22, no. 2 (March 2019): 188–210. http://dx.doi.org/10.1002/sys.21480.
Full textKhan, Muhammad, Yasir Zaki, Shiva Iyer, Talal Ahamd, Thomas Poetsch, Jay Chen, Anirudh Sivaraman, and Lakshmi Subramanian. "The case for model-driven interpretability of delay-based congestion control protocols." ACM SIGCOMM Computer Communication Review 51, no. 1 (January 31, 2021): 18–25. http://dx.doi.org/10.1145/3457175.3457179.
Full textPan, Yan, Wei Lin, Liang Jiao, and Yuefei Zhu. "Model-Based Grey-Box Fuzzing of Network Protocols." Security and Communication Networks 2022 (May 5, 2022): 1–13. http://dx.doi.org/10.1155/2022/6880677.
Full textDeng, Guo Li, Tao He, Yong Wei, Hua Zhong Li, Shou Xiang Xu, and De Fen Zhang. "Model Based Protocol Conformance Test Study." Applied Mechanics and Materials 713-715 (January 2015): 466–70. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.466.
Full textFigueroa-Lorenzo, Añorga, and Arrizabalaga. "A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach." Sensors 19, no. 20 (October 14, 2019): 4455. http://dx.doi.org/10.3390/s19204455.
Full textHuang, Xinyan. "A Data-Driven WSN Security Threat Analysis Model Based on Cognitive Computing." Journal of Sensors 2022 (January 27, 2022): 1–10. http://dx.doi.org/10.1155/2022/5013905.
Full textFu, Yulong, and Ousmane Koné. "Model based security verification of protocol implementation." Journal of Information Security and Applications 22 (June 2015): 17–27. http://dx.doi.org/10.1016/j.jisa.2014.08.002.
Full textKang, Burong, Xinyu Meng, Lei Zhang, and Yinxia Sun. "Nonce-Based Key Agreement Protocol Against Bad Randomness." International Journal of Foundations of Computer Science 30, no. 04 (June 2019): 619–33. http://dx.doi.org/10.1142/s0129054119400161.
Full textChen, Zhi, Ya Peng, and Wenjing Yue. "Model-Checking Driven Design of QoS-Based Routing Protocol for Wireless Sensor Networks." Journal of Sensors 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/716561.
Full textLi, Fu Lin, Jie Yang, Hong Wei Zhou, and Ying Liu. "A New Dynamic Protocol Analysis Model." Advanced Materials Research 765-767 (September 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.
Full textWang, Ying Lian, and Jun Yao Ye. "Research on Applied-Information Technology in Hierarchical Network Security Protocols Designing Based on Public Key." Advanced Materials Research 951 (May 2014): 169–72. http://dx.doi.org/10.4028/www.scientific.net/amr.951.169.
Full textOmar, Asma. "LOCATION BASED PROTOCOL FOR WIRELESS NETWORKS." Engineering Science & Technology Journal 2, no. 1 (March 29, 2020): 26–34. http://dx.doi.org/10.51594/estj.v2i1.120.
Full textRonald, Nicole, Theo Arentze, and Harry Timmermans. "The Effects of Different Interaction Protocols in Agent-Based Simulation of Social Activities." International Journal of Agent Technologies and Systems 3, no. 2 (April 2011): 18–32. http://dx.doi.org/10.4018/jats.2011040102.
Full textFu, Yu Long, and Xiao Long Xin. "A Model Based Security Testing Method for Protocol Implementation." Scientific World Journal 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/632154.
Full textYu, Tianxiang, Yang Xin, Yuexin Tao, Bingqing Hou, and Hongliang Zhu. "Network Communication Protocol Reverse Engineering Based on Auto-Encoder." Security and Communication Networks 2022 (October 6, 2022): 1–14. http://dx.doi.org/10.1155/2022/2924479.
Full textZhai, Liang, Qiuhua Zheng, Xu Zhang, Haizhong Hu, Weihao Yin, Yingpei Zeng, and Ting Wu. "Identification of Private ICS Protocols Based on Raw Traffic." Symmetry 13, no. 9 (September 19, 2021): 1743. http://dx.doi.org/10.3390/sym13091743.
Full textSujatanagarjuna, Anant, Arne Bochem, and Benjamin Leiding. "Formalizing the Blockchain-Based BlockVoke Protocol for Fast Certificate Revocation Using Colored Petri Nets." Information 12, no. 7 (July 6, 2021): 277. http://dx.doi.org/10.3390/info12070277.
Full textNaganathan. "Traffic Flow Analysis Model based Routing Protocol For Multi-Protocol Label Switching Network." Journal of Computer Science 7, no. 11 (November 1, 2011): 1674–78. http://dx.doi.org/10.3844/jcssp.2011.1674.1678.
Full textLiu, Weiwei, Hua Guo, and Yangguang Tian. "A Secure Distance-Bounding Protocol with Mutual Authentication." Security and Communication Networks 2021 (June 1, 2021): 1–7. http://dx.doi.org/10.1155/2021/6644326.
Full textLi, Zengpeng, Can Xiang, and Chengyu Wang. "Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography." Wireless Communications and Mobile Computing 2018 (September 2, 2018): 1–11. http://dx.doi.org/10.1155/2018/5973285.
Full textStack, Nora, David Barker, Mary Carskadon, and Cecilia Diniz Behn. "A Model-Based Approach to Optimizing Ultradian Forced Desynchrony Protocols for Human Circadian Research." Journal of Biological Rhythms 32, no. 5 (September 27, 2017): 485–98. http://dx.doi.org/10.1177/0748730417730488.
Full textJärvinen, Hannu, Dario Garcia-Gasulla, and Ulises Cortés. "A Push-Based Agent Communication Model Empowering Assistive Technologies." International Journal on Artificial Intelligence Tools 23, no. 01 (February 2014): 1440003. http://dx.doi.org/10.1142/s021821301440003x.
Full textNekhorosheva, Emma A., and Alexander P. Shkaraputa. "Building a Model of Electronic Voting Protocol With the Possibility of Verification of the Result by Voters." Вестник Пермского университета. Математика. Механика. Информатика, no. 4(59) (2022): 61–67. http://dx.doi.org/10.17072/1993-0550-2022-4-61-67.
Full textWang, Wei, and Qing Feng Cheng. "Analysis of Two ID-Based Key Exchange Protocols." Applied Mechanics and Materials 135-136 (October 2011): 289–93. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.289.
Full textSimon, Judy. "An Energy Efficient Routing Protocol based on Reinforcement Learning for WSN." IRO Journal on Sustainable Wireless Systems 4, no. 2 (July 2, 2022): 79–89. http://dx.doi.org/10.36548/jsws.2022.2.002.
Full textSalah, Saeed, Raid Zaghal, and Mada Abdeljawad. "A Mathematical-Based Model for Estimating the Path Duration of the DSDV Routing Protocol in MANETs." Journal of Sensor and Actuator Networks 11, no. 2 (May 12, 2022): 23. http://dx.doi.org/10.3390/jsan11020023.
Full textWang, Hao, Yu Li, and Li-Ping Wang. "Post-Quantum Secure Password-Authenticated Key Exchange Based on Ouroboros." Security and Communication Networks 2022 (July 14, 2022): 1–11. http://dx.doi.org/10.1155/2022/9257443.
Full textVaiapury, Karthikeyan, Malmurugan Nagarajan, and SunilKumar Jain. "Ambience-Based Voice Over Internet Protocol Quality Testing Model." IETE Journal of Research 55, no. 5 (2009): 212. http://dx.doi.org/10.4103/0377-2063.57598.
Full textQi, Xiaoguang, Guang Yue, Liang Zhang, and Mingfeng He. "A complex network model based on the Gnutella protocol." Physica A: Statistical Mechanics and its Applications 388, no. 18 (September 2009): 3955–60. http://dx.doi.org/10.1016/j.physa.2009.06.007.
Full textLi, Lian-xing, Xin-cun Tang, Yi Qu, and Hong-tao Liu. "CC-CV charge protocol based on spherical diffusion model." Journal of Central South University 18, no. 2 (April 2011): 319–22. http://dx.doi.org/10.1007/s11771-011-0698-2.
Full textAmin, Ruhul, SK Hafizul Islam, Muhammad Khurram Khan, Arijit Karati, Debasis Giri, and Saru Kumari. "A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/5989151.
Full textFang, Lei, Xue Rao, Ling Li, and Huan Li. "A RFID-Based Security Authentication System Model for Electric Vehicle Charging Station." Applied Mechanics and Materials 741 (March 2015): 623–28. http://dx.doi.org/10.4028/www.scientific.net/amm.741.623.
Full textChen, Xiaojuan, and Huiwen Deng. "Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic." Applied Sciences 10, no. 18 (September 21, 2020): 6577. http://dx.doi.org/10.3390/app10186577.
Full textYang, Fan, Guowu Yang, Yujie Hao, Qingbin Luo, and Yuqi Wang. "Security analysis of multi-party quantum private comparison protocol by model checking." Modern Physics Letters B 29, no. 18 (July 10, 2015): 1550089. http://dx.doi.org/10.1142/s021798491550089x.
Full textUr Rehman, Shafiq, and Aamer Nadeem. "An Approach to Model Based Testing of Multiagent Systems." Scientific World Journal 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/925206.
Full textLi, Jiguo, Shengzhou Hu, and Yichen Zhang. "Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key." Security and Communication Networks 2018 (October 21, 2018): 1–10. http://dx.doi.org/10.1155/2018/8738960.
Full textOniga, Bogdan, Leon Denis, Vasile Dadarlat, and Adrian Munteanu. "Message-Based Communication for Heterogeneous Internet of Things Systems." Sensors 20, no. 3 (February 6, 2020): 861. http://dx.doi.org/10.3390/s20030861.
Full textTu, Zhe, Huachun Zhou, Kun Li, Haoxiang Song, and Yuzheng Yang. "A Blockchain-Enabled Trusted Protocol Based on Whole-Process User Behavior in 6G Network." Security and Communication Networks 2022 (October 11, 2022): 1–12. http://dx.doi.org/10.1155/2022/8188977.
Full textLuo, Yun, Yuling Chen, Tao Li, Yilei Wang, Yixian Yang, and Xiaomei Yu. "An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model." Journal of Organizational and End User Computing 34, no. 10 (June 24, 2022): 1–17. http://dx.doi.org/10.4018/joeuc.306752.
Full textDang, Lanjun, Jie Xu, Xuefei Cao, Hui Li, Jie Chen, Yueyu Zhang, and Xiaotong Fu. "Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks." International Journal of Distributed Sensor Networks 14, no. 4 (April 2018): 155014771877254. http://dx.doi.org/10.1177/1550147718772545.
Full textSaleh Insani, Rachmat Wahid, and Reza Pulungan. "Pemodelan dan Verifikasi Formal Protokol EE-OLSR dengan UPPAAL CORA." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 10, no. 1 (January 31, 2016): 93. http://dx.doi.org/10.22146/ijccs.11192.
Full textONATSKIY, A. V. "CRYPTOGRAPHIC AUTHENTICATION PROTOCOL ZERO-KNOWLEDGE SECRET ON ELLIPTIC CURVES USING PUBLIC KEYS AND RANDOM MESSAGES." Digital Technologies 26 (2019): 22–28. http://dx.doi.org/10.33243/2313-7010-26-22-28.
Full textCastañeda, María, Mercedes G. Merayo, Juan Boubeta-Puig, and Iván Calvo. "MODELFY: A Model-driven Solution for Decision Making based on Fuzzy Information." JUCS - Journal of Universal Computer Science 28, no. 5 (May 28, 2022): 445–74. http://dx.doi.org/10.3897/jucs.76030.
Full textAribi, Noureddine, and Yahia Lebbah. "A SAT-Based Planning Approach for Finding Logical Attacks on Cryptographic Protocols." International Journal of Information Security and Privacy 14, no. 4 (October 2020): 1–21. http://dx.doi.org/10.4018/ijisp.2020100101.
Full textVan Anh Duong, Dat, and Seokhoon Yoon. "A Human Location Prediction-Based Routing Protocol in Mobile Crowdsensing-Based Urban Sensor Networks." Applied Sciences 12, no. 8 (April 12, 2022): 3898. http://dx.doi.org/10.3390/app12083898.
Full textLi, Quanrun, Ching-Fang Hsu, Kim-Kwang Raymond Choo, and Debiao He. "A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks." Security and Communication Networks 2019 (December 4, 2019): 1–13. http://dx.doi.org/10.1155/2019/7871067.
Full textAdams, Richard H., and Todd A. Castoe. "Supergene validation: A model-based protocol for assessing the accuracy of non-model-based supergene methods." MethodsX 6 (2019): 2181–88. http://dx.doi.org/10.1016/j.mex.2019.09.025.
Full textHuo, Lin, Yi Lin Jiang, and Liang Qing Hu. "Research on Hash-Based Low-Cost RFID Security Authentication Protocol." Advanced Materials Research 846-847 (November 2013): 1524–30. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1524.
Full textSabor, Nabil, Shigenobu Sasaki, Mohammed Abo-Zahhad, and Sabah M. Ahmed. "A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions." Wireless Communications and Mobile Computing 2017 (2017): 1–23. http://dx.doi.org/10.1155/2017/2818542.
Full textOh, JiHyeon, SungJin Yu, JoonYoung Lee, SeungHwan Son, MyeongHyun Kim, and YoungHo Park. "A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes." Sensors 21, no. 4 (February 21, 2021): 1488. http://dx.doi.org/10.3390/s21041488.
Full text