Academic literature on the topic 'PROTOCOL ANALYSIS'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'PROTOCOL ANALYSIS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "PROTOCOL ANALYSIS"

1

HU, YANJING, QINGQI PEI, and LIAOJUN PANG. "Instruction Clustering Analysis for Unknown Network Protocol's Abnormal Behavior." Journal of Interconnection Networks 15, no. 03n04 (September 2015): 1540002. http://dx.doi.org/10.1142/s0219265915400022.

Full text
Abstract:
Protocol's abnormal behavior analysis is an important task in protocol reverse analysis. Traditional protocol reverse analysis focus on the protocol message format, but protocol behavior especially the abnormal behavior is rare studied. In this paper, protocol behavior is represented by the labeled behavior instruction sequences. Similar behavior instruction sequences mean the similar protocol behavior. Using our developed virtual analysis platform HiddenDisc, we can capture a variety of known or unknown protocols' behavior instruction sequences. All kinds of executed or unexecuted instruction sequences can automatic clustering by our designed instruction clustering algorithm. Thereby we can distinguish and mine the unknown protocols' potential abnormal behavior. The mined potential abnormal behavior instruction sequences are executed, monitored and analyzed on HiddenDisc to determine whether it is an abnormal behavior and what is the behavior's nature. Using the instruction clustering algorithm, we have analyzed 1297 protocol samples, mined 193 potential abnormal instruction sequences, and determined 187 malicious abnormal behaviors by regression testing. Experimental results show that our proposed instruction clustering algorithm has high efficiency and accuracy, can mine unknown protocols' abnormal behaviors effectively, and enhance the initiative defense capability of network security.
APA, Harvard, Vancouver, ISO, and other styles
2

Owen, Stephen, Pearl Brereton, and David Budgen. "Protocol analysis." Communications of the ACM 49, no. 2 (February 2006): 117–22. http://dx.doi.org/10.1145/1113034.1113039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Fu Lin, Jie Yang, Hong Wei Zhou, and Ying Liu. "A New Dynamic Protocol Analysis Model." Advanced Materials Research 765-767 (September 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.

Full text
Abstract:
Traditional static analysis methods such as formal validation and theorem proving were used to analyze protocols security previously. These methods can not measure and evaluate actual security of protocols accurately for the setting and suppose are far from the actual conditions. This paper proposes a new dynamic protocol analysis model. The system based on the model can be used to active test in actual running conditions, analyze known protocols security, integrity, robustness, and analyze unknown protocols online, provide support for protocol designer. The systems structure, working flow and implementation of key modules are described. The experimental results validate the validity of the models design.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhao, Wen Hong. "Protocols Analysis by Base-Function." Applied Mechanics and Materials 530-531 (February 2014): 682–85. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.682.

Full text
Abstract:
A new description method of protocol structure is presented by base-function firstly. Then, a protocol analysis method base on it is proposed. To analyses the private protocols, a new self-learning algorithm is discussed. Finally, the flow of protocol analysis based on base-function is given. Experiment results show the efficiency of presented method.
APA, Harvard, Vancouver, ISO, and other styles
5

KOVACIK, Cyril Filip, and Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK." Acta Electrotechnica et Informatica 1335-8243, no. 1338-3957 (June 9, 2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.

Full text
Abstract:
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end devices, determination of the operational properties of this implementation, and their comparison in different conditions. VoIP traffic is compared at different bandwidths and implemented by different configurations of IP protocols. By investigated implementations of IP protocols are meant IPv4, IPv6, and IPv4 protocol with applied NAT. As part of the application of various IP protocols is also compared VoIP communication with a video stream on a local basis. The conclusion of the paper is devoted to the graphical evaluation of these observations and to draw conclusions based on them.
APA, Harvard, Vancouver, ISO, and other styles
6

Yongming Yao, Yongming Yao, Yulin Wang Yongming Yao, Weiyi Jiang Yulin Wang, Ziyuan Wang Weiyi Jiang, and Song Huang Ziyuan Wang. "PPAdroid: An Approach to Android Privacy Protocol Analysis." 網際網路技術學刊 23, no. 3 (May 2022): 561–71. http://dx.doi.org/10.53106/160792642022052303014.

Full text
Abstract:
<p>With the continuous growth of the number of mobile applications, users may provide personal information to applications consciously or unconsciously. Privacy protocol could help users understand the privacy behavior of applications. However, users usually ignore the content of the privacy protocol due to the length of their context. To solve such a problem, we conduct an empirical study on privacy protocols of Android applications and propose a method to detect sentences related to personal information operations in privacy protocol documents. In our proposed method, a verb list, a negation list, and a noun list related to user information operations are created and utilized to detect sentences related to user personal information by the Stanford CoreNLP technique. The experimental results show that our proposed method is better than state-of-art keyword-based methods. Furthermore, our proposed method can help users understand the contents of privacy protocol documents in a limited way.</p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
7

Anggriani, Sufy, Rizki Savira Firdaus, and Windy Amanda Siwi Suherlan. "Analisis Penyimpanan Protokol Notaris Secara Elektronik." Notaire 6, no. 3 (December 4, 2023): 437–48. http://dx.doi.org/10.20473/ntr.v6i3.50802.

Full text
Abstract:
AbstractThe collapse of the efficiency of notary protocol storage that is carried out physically has resulted in the idea of developing a way for a notary to store the notary protocol, by transferring the storage media into electronic form. Thus, access in submitting notary protocols to the notary receiving the protocol is seen as more efficient because it involves technological advances. This research aims to analyze the importance of notary protocols being stored electronically and to analyze the criteria for notaries receiving electronic notary protocols. In this research, normative research methods were used. The analysis in this research was carried out using a deductive method, namely drawing on general propositions to create specific propositions. The results of this research are (1) by storing notary protocols electronically, the notary’s duties in carrying out his obligations and authority will become more efficient and economical. (2) by storing the protocol electronically, the notary appointed to hold the notarial protocol who has retired, only needs to hand over the access rights in the electronic storage used by the previous notary.Keywords: Storage; Notary Protocol; Electronic. AbstrakRuntuhnya efisiensi penyimpanan protokol notaris yang dilakukan secara fisik, mengakibatkan timbulnya buah pikiran untuk mengembangkan cara notaris menyimpan protokol notaris tersebut, dengan melakukan pengalihan media penyimpanan kedalam bentuk elektronik. Sehingga, akses dalam melakukan penyerahan protokol notaris kepada notaris penerima protokol dipandang lebih efisien karena melibatkan kemajuan teknologi. Penelitian ini bertujuan untuk menganalisa pentingnya protokol notaris agar disimpan secara elektronik serta menganalisa kriteria notaris penerima protokol notaris secara elektronik. Dalam penelitian ini digunakan metode penelitian normatif. Analisis dalam penelitian ini dilakukan dengan menggunakan metode deduktif yaitu yaitu menarik proposisi yang umum untuk membuat proposisi yang bersifat khusus. Hasil penelitian ini adalah (1) dilakukannya penyimpanan protokol notaris secara elektronik, maka tugas notaris dalam menjalankan kewajiban serta wewenangnya akan menjadi lebih efisien dan ekonomis. (2) dengan dilakukannya penyimpanan protokol secara elektronik, maka notaris yang ditunjuk untuk memegang protokol notaris yang telah purna tugas, hanya perlu melakukan serah terima yang berupa hak akses dalam penyimpanan elektronik yang digunakan oleh notaris sebelumnya. Kata Kunci: Penyimpanan; Protokol Notaris; Elektronik.
APA, Harvard, Vancouver, ISO, and other styles
8

Muhammad Farhan, Muhammad Asif, Maaz Bin Ahmad, and Khalid Maqsood. "A Comparative Analysis of Unicast Routing Protocols for MPLS-VPN." Lahore Garrison University Research Journal of Computer Science and Information Technology 3, no. 1 (March 29, 2019): 43–49. http://dx.doi.org/10.54692/lgurjcsit.2019.030167.

Full text
Abstract:
MPLS-VPN technology is introduced to provide secure transmission with minimum propagation delay. This paper presents a comparative analysis of unicast routing protocols for MPLSVPN enabled networks. The motive behind this analysis is to observe the consequence of unicast routing protocols on the performance of MPLS-VPN enabled networks and to choose most suitable routing protocol for such type of networks. To conduct the analysis, a test bed is established in GNS3 simulator. Three main unicast routing protocols i.e. Enhanced Interior Gateway Routing Protocol (EIGRP), Open Shortest Path First (OSPF) and Routing Information Protocol (RIP) has been considered in this work. Round-Trip-Time, Jitter and Administrative-distance are used as performance measure metrics. The experimental analysis indicates that EIGRP is the most suitable protocol among the aforementioned protocols for MPLS-VPN.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhao, Wen Hong. "Protocols Analysis Based on the Combination Mode of Walsh Function." Applied Mechanics and Materials 543-547 (March 2014): 3482–85. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3482.

Full text
Abstract:
To analyses networks, technologies of network protocol analysis are usually used. A new approach of protocols analysis is presented based on the combination mode of walsh function. It consists of three parts, such as the protocol structure characterization method, the hierarchical protocol analysis and the self-learning combination modes. After discussing the analysis process, an experiment shows the efficiency of presented approach.
APA, Harvard, Vancouver, ISO, and other styles
10

Lu, Siqi, Qingdi Han, Xuyang Miao, and Yubo Liu. "Research on Security Protocol Analysis Tool SmartVerif." Journal of Physics: Conference Series 2132, no. 1 (December 1, 2021): 012022. http://dx.doi.org/10.1088/1742-6596/2132/1/012022.

Full text
Abstract:
Abstract Security protocols have been designed to protect the security of the network. However, many security protocols cannot guarantee absolute security in real applications. Therefore, security tests of the network protocol become particularly important. In this paper, firstly, we introduce SmartVerif, which is the first formal analysis tool to automatically verify the security of protocols through dynamic strategies. And then, we use SmartVerif to verify the pseudo-randomness of the encapsulated key of the Two-Pass AKE protocol, which was proposed by Liu’s in ASIACRYPT in 2020. Finally, we summary our work and show some limitations of SmartVerif. At the same time, we also point out the direction for future improvement of SmartVerif.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "PROTOCOL ANALYSIS"

1

Brachfeld, Lawrence J. "Mobile internet protocol analysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369385.

Full text
Abstract:
Thesis (M.S. Computer Science) Naval Postgraduate School, September 1999.
"September 1999". Thesis advisor(s): Bert Lundy, Wolfgang Baer. Includes bibliographical references (p. 53). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
2

Kovan, Gerry. "SPP Secure Payment Protocol: Protocol Analysis, Implementation and Extensions." Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1079.

Full text
Abstract:
Internet commerce continues to grow rapidly. Over 60% of US households use the internet to shop online. A secure payment protocol is required to support this rapid growth. A new payment protocol was recently invented at IBM. We refer to the protocol as SPP or Secure Payment Protocol. This thesis presents a protocol analysis of SPP. It is essential that a thorough security analysis be done on any new payment protocol so that we can better understand its security properties. We first develop a method for analyzing payment protocols. This method includes a list of desirable security features and a list of proofs that should be satisfied. We then present the results of the analysis. These results validate that the protocol does contain many security features and properties. They also help understand the security properties and identify areas where the protocol can be further secured. This led us to extend the design of the protocol to enhance its security. This thesis also presents a prototype implementation of SPP. Three software components were implemented. They are the Electronic Wallet component, the merchant software component and the Trusted Third Party component. The architecture and technologies that are required for implementation are discussed. The prototype is then used in performance measurement experiments. Results on system performance as a function of key size are presented. Finally, this thesis presents an extension of SPP to support a two buyer scenario. In this scenario one buyer makes an order while another buyer makes the payment. This scenario enables additional commerce services.
APA, Harvard, Vancouver, ISO, and other styles
3

O'Shea, Nicholas. "Verification and validation of security protocol implementations." Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4753.

Full text
Abstract:
Security protocols are important and widely used because they enable secure communication to take place over insecure networks. Over the years numerous formal methods have been developed to assist protocol designers by analysing models of these protocols to determine their security properties. Beyond the design stage however, developers rarely employ formal methods when implementing security protocols. This may result in implementation flaws often leading to security breaches. This dissertation contributes to the study of security protocol analysis by advancing the emerging field of implementation analysis. Two tools are presented which together translate between Java and the LySa process calculus. Elyjah translates Java implementations into formal models in LySa. In contrast, Hajyle generates Java implementations from LySa models. These tools and the accompanying LySa verification tool perform rapid static analysis and have been integrated into the Eclipse Development Environment. The speed of the static analysis allows these tools to be used at compile-time without disrupting a developer’s workflow. This allows us to position this work in the domain of practical software tools supporting working developers. As many of these developers may be unfamiliar with modelling security protocols a suite of tools for the LySa process calculus is also provided. These tools are designed to make LySa models easier to understand and manipulate. Additional tools are provided for performance modelling of security protocols. These allow both the designer and the implementor to predict and analyse the overall time taken for a protocol run to complete. Elyjah was among the very first tools to provide a method of translating between implementation and formal model, and the first to use either Java for the implementation language or LySa for the modelling language. To the best of our knowledge, the combination of Elyjah and Hajyle represents the first and so far only system which provides translation from both code to model and back again.
APA, Harvard, Vancouver, ISO, and other styles
4

Dobson, Lucas E. "Security analysis of session initiation protocol." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDobson.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2010.
Thesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
5

Araya, Cristian, and Manjinder Singh. "Web API protocol and security analysis." Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208934.

Full text
Abstract:
There is problem that every company has its own customer portal. This problem can be solved by creating a platform that gathers all customers’ portals in one place. For such platform, it is required a web API protocol that is fast, secure and has capacity for many users. Consequently, a survey of various web API protocols has been made by testing their performance and security. The task was to find out which web API protocol offered high security as well as high performance in terms of response time both at low and high load. This included an investigation of previous work to find out if certain protocols could be ruled out. During the work, the platform’s backend was also developed, which needed to implement chosen web API protocols that would later be tested. The performed tests measured the APIs’ connection time and their response time with and without load. The results were analyzed and showed that the protocols had both pros and cons. Finally, a protocol was chosen that was suitable for the platform because it offered high security and fast connection. In addition, the server was not affected negatively by the number of connections. Reactive REST was the web API protocol chosen for this platform.
Det finns ett problem i dagens samhälle gällande att varje företag har sin egen kundportal. Detta problem kan lösas genom att skapa en plattform som samlar alla kundportaler på samma plats. För en sådan plattform krävs det ett web API protokoll som är snabb, säker och har kapacitet för många användare. Därför har en undersökning om olika web API protokolls prestanda samt säkerhetstester gjorts. Arbetet gick ut på att ta reda på vilket web API protokoll som erbjuder hög säkerhet och hög prestanda i form av svarstid både vid låg och hög belastning. Det ingick också i arbetet att göra en undersökning av tidigare arbeten för att ta reda på om eventuella protokoll kunde uteslutas. Under arbetet utvecklades också plattformens backend som implementerade de olika web API protokollen för att sedan kunna utföra tester på dessa. Testerna som utfördes var svarstid både med och utan belastning, uppkopplingstid samt belastning. Resultaten analyserades och visade att protokollen hade både för- och nackdelar. Avslutningsvis valdes ett protokoll som var lämpad för plattformen eftersom den hade hög säkerhet samt snabbast uppkopplingstid. Dessutom påverkades inte servern negativt av antalet uppkopplingar. Reactive REST valdes som web API protokoll för denna plattform.
APA, Harvard, Vancouver, ISO, and other styles
6

Jayaswal, Tanu. "Events-induced tourism: a protocol analysis." AUT University, 2010. http://hdl.handle.net/10292/897.

Full text
Abstract:
Many destinations throughout the world have developed events portfolios as a strategic initiative to attract tourists and their associated economic benefits. The ability of events to attract people to a destination for the purpose of attending the event is well documented. However the ability of an event to add value to attract tourists before or after the event is not so clear. In other words, can an events portfolio positively influence the decision to visit a destination at a time when none of the promoted events are scheduled? As a first step towards answering this important question, this study explores the contribution of an events portfolio to a consumer’s perceptions of a destination and how this influences their decision to attend a destination under these circumstances. The proposed study conducts a protocol analysis based on consumer’s decision-making thoughts. Each participant was given a choice between two destinations in India. Participants were asked to ‘think out loud’ as they made the decision to visit one of two possible destinations, one with an events portfolio and the other without. However, their visit does not coincide with the events’ dates. The results suggest four lines of reasoning utilised by prospective tourists in the destination choice process: 1) destination image; 2) the timing of the event with respect the time of visit; 3) tourists’ level of interest in the event; and, 4) events not listed in the events portfolio might be scheduled during the time of the proposed visit. In course of finding lines of reasoning for cross-cultural issues it was found that culture, architecture, English language usage, and food are the major aspects that tourists consider while travelling to Indian destinations. In terms of the events portfolio, there is evidence of a preference for a ‘fit’ between the event and Indian culture.
APA, Harvard, Vancouver, ISO, and other styles
7

Jang, Beakcheol. "Wireless MAC Protocol Design and Analysis." NCSU, 2009. http://www.lib.ncsu.edu/theses/available/etd-05262009-175059/.

Full text
Abstract:
Wireless networks are becoming very common due to their advantages such as rapid deployment and support for mobility. In this dissertation, we design and analyze the Medium Access Control (MAC) protocol for two popular wireless networks: Wireless Sensor Networks (WSNs) and Wireless Local Area Networks (WLANs). For WSNs, we design and analyze an energy efficient MAC protocols. Energy efficiency is a key design factor of a MAC protocol for WSNs. Existing preamble-sampling based MAC protocols have large overheads due to their preambles and are inefficient at large wakeup intervals. Synchronous scheduling MAC protocols minimize the preamble by combining preamble sampling and scheduling techniques; however, they do not prevent energy loss due to overhearing. In this dissertation, we present an energy efficient MAC protocol for WSNs, called AS-MAC, that avoids overhearing and reduces contention and delay by asynchronously scheduling the wakeup time of neighboring nodes. We also provide a multi-hop energy consumption model for AS-MAC. To validate our design and analysis, we implement the proposed scheme on the MICAz and TELOSB platforms. Experimental results show that AS-MAC considerably reduces energy consumption, packet loss and delay when compared with other energy efficient MAC protocols. For WLANs, we present a saturation throughput model for IEEE 802.11, the standard of WLAN, for a simple infrastructure scenario with hidden stations. Despite the importance of the hidden terminal problem, there have been a relatively small number of studies that consider the effect of hidden terminals on IEEE 802.11 throughput. Moreover, existing models are not accurate for scenarios with the short-term unfairness. In this dissertation, we present a new analytical saturation throughput model for IEEE 802.11 for a simple but typical infrastructure scenario with small number of hidden stations. Simulation results are used to validate the model and show that our model is extremely accurate. Lastly, we provide a saturation throughput model for IEEE 802.11 for the general infrastructure scenario with hidden stations. Simulation results show that this generalized model is reasonably accurate.
APA, Harvard, Vancouver, ISO, and other styles
8

Lu, Chun, and Jian Song. "Protocol Analysis for Networked Acquirement System." International Foundation for Telemetering, 2014. http://hdl.handle.net/10150/577516.

Full text
Abstract:
ITC/USA 2014 Conference Proceedings / The Fiftieth Annual International Telemetering Conference and Technical Exhibition / October 20-23, 2014 / Town and Country Resort & Convention Center, San Diego, CA
This paper analyzed protocols may be used in each layer in networked telemetry systems, and also presents some deeper researches of the advantages of using synchronous time-division for the physical layer of a networked telemetry system.
APA, Harvard, Vancouver, ISO, and other styles
9

Hsu, Yating. "Formal Analysis of Network Protocol Security." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1317230784.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chu, Peil-Ying Mark. "Towards automating protocol synthesis and analysis /." The Ohio State University, 1989. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487598303840366.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "PROTOCOL ANALYSIS"

1

New Zealand. Ministry for the Environment., ed. Solid waste analysis protocol. Wellington, N.Z: Ministry for the Environment, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Burns, Kevin. TCP/IP analysis and troubleshooting toolkit. Indianapolis: Wiley Pub., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hodgson. Novell Netware protocol and network analysis. Manchester: University of Manchester, Department of Computer Science, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1916-, Simon Herbert Alexander, ed. Protocol analysis: Verbal reports as data. Cambridge, Mass: MIT Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

1916-, Simon Herbert A., ed. Protocol analysis: Verbal reports as data. Cambridge, Mass: MIT Press, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Boyle, Robert J. Engineering analysis using a web-based protocol. Cleveland, Ohio: National Aeronautics and Space Administration, Glenn Research Center, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

K, Luke Nancy, and Intelligent Buildings Institute Foundation, eds. Global protocol review & end-user needs analysis. Washington, DC: The Foundation, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Song, Wei, Peijian Ju, and A.-Long Jin. Protocol Design and Analysis for Cooperative Wireless Networks. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-47726-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ontario. Ministry of the Environment. Laboratory Services Branch., ed. Protocol of accepted drinking water testing methods. Toronto: Ministry of the Environment, Laboratory Services Branch, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Baker, Robert E. A study of novice systems analysts' problem solving behaviors using protocol analysis. Monterey, Calif: Naval Postgraduate School, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "PROTOCOL ANALYSIS"

1

Ericsson, K. Anders. "Protocol Analysis." In A Companion to Cognitive Science, 425–32. Oxford, UK: Blackwell Publishing Ltd, 2017. http://dx.doi.org/10.1002/9781405164535.ch33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nahler, Gerhard. "per-protocol analysis." In Dictionary of Pharmaceutical Medicine, 134. Vienna: Springer Vienna, 2009. http://dx.doi.org/10.1007/978-3-211-89836-9_1033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dong, Ling, and Kefei Chen. "Formalism of Protocol Security Analysis." In Cryptographic Protocol, 249–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-24073-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dong, Ling, and Kefei Chen. "Informal Analysis Schemes of Cryptographic Protocols." In Cryptographic Protocol, 83–152. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-24073-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dong, Ling, and Kefei Chen. "Security Analysis of Real World Protocols." In Cryptographic Protocol, 153–213. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-24073-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rzempoluck, Edward J. "A Data Analysis Protocol." In Neural Network Data Analysis Using Simulnet™, 203–11. New York, NY: Springer New York, 1998. http://dx.doi.org/10.1007/978-1-4612-1746-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Aparicio-Sánchez, Damián, Santiago Escobar, Catherine Meadows, José Meseguer, and Julia Sapiña. "Protocol Analysis with Time." In Progress in Cryptology – INDOCRYPT 2020, 128–50. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65277-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Raymond Choo, Kim-Kwang. "Complementing Computational Protocol Analysis." In Advances in Information Security, 1–28. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-87969-7_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Szymoniak, Sabina. "KaoChow Protocol Timed Analysis." In Advances in Soft and Hard Computing, 346–57. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03314-9_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Agapito, Giuseppe, and Mariamena Arbitrio. "Microarray Data Analysis Protocol." In Methods in Molecular Biology, 263–71. New York, NY: Springer US, 2021. http://dx.doi.org/10.1007/978-1-0716-1839-4_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "PROTOCOL ANALYSIS"

1

Tan, Yang, and Bo Lv. "Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections." In 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121209.

Full text
Abstract:
In 2012, De Cristofaro et al. proposed a protocol to calculate the Private Set Intersection and Union cardinality (PSI-CA and PSU-CA). This protocol's security is based on the famous DDH assumption. Since its publication, it has gained lots of popularity because of its efficiency (linear complexity in computation and communication) and concision. So far, it's still considered one of the most efficient PSI-CA protocols and the most cited (more than 170 citations) PSI-CA paper based on the Google Scholar search. However, when we tried to implement this protocol, we couldn't get the correct result of the test data. Since the original paper lacks of experimental results to verify the protocol's correctness, we looked deeper into the protocol and found out it made a fundamental mistake. Needless to say, its correctness analysis and security proof are also wrong. In this paper, we will point out this PSI-CA protocol's mistakes, and provide the correct version of this protocol as well as the PSI protocol developed from this protocol. We also present a new security proof and some experimental results of the corrected protocol.
APA, Harvard, Vancouver, ISO, and other styles
2

Tiflea, Denisa-Ionela. "Vulnerabilities of LRSAS Protocol." In 12th International Conference on Electronics, Communications and Computing. Technical University of Moldova, 2022. http://dx.doi.org/10.52326/ic-ecco.2022/sec.07.

Full text
Abstract:
The construction of secure and private RFID protocols is necessary with the increasing application of RFID technology in increasingly diverse fields. While security refers to unilateral or mutual authentication depending on the protocol, privacy is a more elaborate concept to which many studies and research have been dedicated. Unfortunately, many RFID protocols are still being developed without consistent security and privacy analysis in well-defined models, such as the Vaudenay model. In this paper, we aim to prove that a recently proposed authentication protocol, LRSAS, does not achieve any form of privacy in Vaudenays model.
APA, Harvard, Vancouver, ISO, and other styles
3

QasMarrogy, Ghassan. "Practical Analysis of IEEE 802.11ax Wireless Protocol in Wi-Fi Boosters Environments." In 3rd International Conference of Mathematics and its Applications. Salahaddin University-Erbil, 2020. http://dx.doi.org/10.31972/ticma22.04.

Full text
Abstract:
All the world now is depending on networks to share information between the users, where different data types are transferred wirelessly from network to network. Using wireless LANs are important to connect the users and share the data, these Wireless LANs have different types of obstacles that affect the data sharing or the wireless signal, such as, compatibility wireless protocol types, range coverage, walls penetration, moving devices, different routing protocols, data transferred types, weak signal, and many more. In this paper a practical analysis will be made to the latest IEEE 802.11ax wireless protocol to be compared with two types of Wi-Fi booster’s networks, Mesh and Extender Wi-Fi, while transferring 4k video size data rate, inside a room and on different rooms for wall penetration analysis, while measuring the throughput, delay, and signal strength metrics. The main importance of this paper is to give a more practical understanding and avoid the main problems of using the wireless protocol 802.11ax in different network types.
APA, Harvard, Vancouver, ISO, and other styles
4

Dorst, Kees, and Nigel Cross. "Protocol Analysis As a Research Technique for Analysing Design Activity." In ASME 1995 Design Engineering Technical Conferences collocated with the ASME 1995 15th International Computers in Engineering Conference and the ASME 1995 9th Annual Engineering Database Symposium. American Society of Mechanical Engineers, 1995. http://dx.doi.org/10.1115/detc1995-0190.

Full text
Abstract:
Abstract This paper offers a review of protocol analysis as a research technique for the investigation of design activity. It draws particularly on the results of a special international research workshop on protocol analysis of design activity, held in Delft, The Netherlands, in September 1994. The paper identifies major themes and issues in the use of protocol analysis arising from the workshop.
APA, Harvard, Vancouver, ISO, and other styles
5

Plummer, Richard W. "SDLC protocol throughput analysis." In the 17th conference. New York, New York, USA: ACM Press, 1985. http://dx.doi.org/10.1145/21850.253380.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jacobson, D. W. "Network protocol analysis (abstract)." In the 1986 ACM fourteenth annual conference. New York, New York, USA: ACM Press, 1986. http://dx.doi.org/10.1145/324634.325067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Performance Analysis of Basic Automatic Repeat Request Protocols and Hybrid Automatic Repeat Request Protocol." In 4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022). Cihan University, 2022. http://dx.doi.org/10.24086/cocos2022/paper.567.

Full text
Abstract:
The size of network and internet traffic is rising spontaneously by the day, with data usage at zettabyte to petabyte scale at an exponential high rate and therefore considered to generate huge traffic along the way which causes the chance of error in transmission to be high as well. Automatic Repeat Request (ARQ) protocol is an error control function for data transmission that uses acknowledgements. These protocols exist in Data link or Transport layers. ARQ is categorize into three major types such as Stop and wait, Go Bank N and Selective Repeat. Hybrid automatic repeat (HARQ) request which is an advancement to earlier mentioned protocols to detect error via cycle redundancy check was later developed. This paper evaluates the performance of these basic ARQs and HARQ protocols in consideration of the current state of high signal interference and collision during competitive accesses, more especially in highly densely networks.
APA, Harvard, Vancouver, ISO, and other styles
8

Doostmohammadian, Mohammad Reza, and Hassan Sayyaadi. "Finite-Time Consensus in Undirected/Directed Network Topologies." In ASME 2010 10th Biennial Conference on Engineering Systems Design and Analysis. ASMEDC, 2010. http://dx.doi.org/10.1115/esda2010-24012.

Full text
Abstract:
The main contribution of this paper is to introduce a novel non-Lipschitz protocol that guarantees consensus in finite-time domain. Its convergence in networks with both unidirectional and bidirectional links is investigated via Lyapunov Theorem approach. It is also proved that final agreement value is equal to average of agents’ states for the bidirectional communication case. In addition effects of communication time-delay on stability are assessed and two other continuous Lipschitz protocols are also analyzed.
APA, Harvard, Vancouver, ISO, and other styles
9

Hess, Tim, and Joshua D. Summers. "Protocol Analysis: Studying Physical Manipulatives During Conceptual Design." In ASME 2014 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/detc2014-34183.

Full text
Abstract:
This paper presents a protocol study that explores how individual designers interact with physical elements during mechanical concept ideation and exploration. This protocol study follows three participants individually in a controlled environment as they develop solutions to a presented problem. The goals of this work were 1) to develop a protocol for documenting human interactions with artifacts and 2) to use this protocol to investigate the use of prototypes during conceptual design. The protocol was used to document the actions of study participants in a manner that allowed searching for patterns of behavior. The most common patterns indicated that participants were learning or finding inspiration from the physical artifact interactions that were then applied to their design solutions. In addition, several opportunities for protocol and experimental methods improvements are presented.
APA, Harvard, Vancouver, ISO, and other styles
10

Berhea, Mohammed, Chunhong Chen, and Q. M. Jonathan Wu. "Protocol-level performance analysis for anti-collision protocols in RFID systems." In 2008 IEEE International Symposium on Circuits and Systems - ISCAS 2008. IEEE, 2008. http://dx.doi.org/10.1109/iscas.2008.4541591.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "PROTOCOL ANALYSIS"

1

Tubesing, Philip. Protocols for Uranium Carbon Analysis - Testing Protocol Summary. Office of Scientific and Technical Information (OSTI), May 2021. http://dx.doi.org/10.2172/1783513.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Moy, J. OSPF Protocol Analysis. RFC Editor, July 1991. http://dx.doi.org/10.17487/rfc1245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rekhter, Y. BGP Protocol Analysis. RFC Editor, October 1991. http://dx.doi.org/10.17487/rfc1265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Traina, P., ed. BGP-4 Protocol Analysis. RFC Editor, March 1995. http://dx.doi.org/10.17487/rfc1774.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Meyer, D., and K. Patel. BGP-4 Protocol Analysis. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4274.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Malkin, G. RIP Version 2 Protocol Analysis. RFC Editor, January 1993. http://dx.doi.org/10.17487/rfc1387.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Malkin, G. RIP Version 2 Protocol Analysis. RFC Editor, November 1994. http://dx.doi.org/10.17487/rfc1721.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sherry, S., and G. Meyer. Protocol Analysis for Triggered RIP. RFC Editor, January 1997. http://dx.doi.org/10.17487/rfc2092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bromberger, S. Technical Analysis of SSP-21 Protocol. Office of Scientific and Technical Information (OSTI), June 2017. http://dx.doi.org/10.2172/1366901.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Danley, M., D. Mulligan, J. Morris, and J. Peterson. Threat Analysis of the Geopriv Protocol. RFC Editor, February 2004. http://dx.doi.org/10.17487/rfc3694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography