Journal articles on the topic 'Routers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Routers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Saravanan, K., and R. Asokan. "An New Efficient Cluster Based Detection Mechanisms for Distributed Denial of Services (DDoS) Attacks." International Journal of Mathematics and Computers in Simulation 15 (November 27, 2021): 147–52. http://dx.doi.org/10.46300/9102.2021.15.27.
Full textBessos, Mai Ben Adar, and Amir Herzberg. "Intercepting a Stealthy Network." ACM Transactions on Sensor Networks 17, no. 2 (June 2021): 1–39. http://dx.doi.org/10.1145/3431223.
Full textZhang, Yi Peng, Zheng Tao Jiang, and Chen Yang. "Attack and Analysis on the Vulnerability of Tenda Wireless Routers." Applied Mechanics and Materials 556-562 (May 2014): 5316–20. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5316.
Full textFan, Jin Dou, Hao Wu, Jian Yuan Lu, and Bin Liu. "Reducing Read Overhead in CCN Routers via Aggregating Interest Packets." Applied Mechanics and Materials 380-384 (August 2013): 1973–76. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.1973.
Full textPranaya, Valen Brata, and Theophilus Wellem. "Implementasi BGP dan Resource Public Key Infrastructure menggunakan BIRD untuk Keamanan Routing." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 6 (December 30, 2021): 1161–70. http://dx.doi.org/10.29207/resti.v5i6.3631.
Full textLiu, Xinming. "The Standard of Wireless Network Technology and Its Application in Router." Highlights in Science, Engineering and Technology 27 (December 27, 2022): 465–69. http://dx.doi.org/10.54097/hset.v27i.3802.
Full textTang, Xian Tuo, Guang Fu Zeng, Feng Wang, Zuo Cheng Xing, and Chao Chao Feng. "Locality-Route Pre-Configuration Mechanism for Latency Optimization in NoCs." Applied Mechanics and Materials 571-572 (June 2014): 381–88. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.381.
Full textOda, Tetsuya. "A Delaunay Edges and Simulated Annealing-Based Integrated Approach for Mesh Router Placement Optimization in Wireless Mesh Networks." Sensors 23, no. 3 (January 17, 2023): 1050. http://dx.doi.org/10.3390/s23031050.
Full textLi, Teng, Jianfeng Ma, Yulong Shen, and Qingqi Pei. "Anomalies Detection and Proactive Defence of Routers Based on Multiple Information Learning." Entropy 21, no. 8 (July 26, 2019): 734. http://dx.doi.org/10.3390/e21080734.
Full textPakhomova, V. M., and A. O. Opriatnyi. "Software Model for Determining the Optimal Routes in a Computer Network Based on the Two-Colonial Ant Algorithm." Science and Transport Progress. Bulletin of Dnipropetrovsk National University of Railway Transport, no. 3(93) (June 15, 2021): 38–49. http://dx.doi.org/10.15802/stp2021/242046.
Full textHu, Hangyu, Weiyi Liu, Gaolei Fei, Song Yang, and Guangmin Hu. "A Novel Method for Router-to-AS Mapping Based on Graph Community Discovery." Information 10, no. 3 (February 27, 2019): 87. http://dx.doi.org/10.3390/info10030087.
Full textLim, Merlyna. "Roots, Routes, and Routers: Communications and Media of Contemporary Social Movements." Journalism & Communication Monographs 20, no. 2 (May 24, 2018): 92–136. http://dx.doi.org/10.1177/1522637918770419.
Full textAoyama, Kazuhiro, and Andrew A. Chien. "The Cost of Adaptivity and Virtual Lanes in a Wormhole Router." VLSI Design 2, no. 4 (January 1, 1995): 315–33. http://dx.doi.org/10.1155/1995/49382.
Full textDu, Yi-Hong, and Shi-Hua Liu. "Epidemic Model of Algorithm-Enhanced Dedicated Virus through Networks." Security and Communication Networks 2018 (June 7, 2018): 1–7. http://dx.doi.org/10.1155/2018/4691203.
Full textSulaiman, Oris Krianto. "Analisis EIGRP Metric Dalam Penentuan Jalur Terbaik Pada Jaringan." JURIKOM (Jurnal Riset Komputer) 8, no. 6 (December 30, 2021): 475. http://dx.doi.org/10.30865/jurikom.v8i6.3781.
Full textChen, Yang, Luqing Zhang, Aikang Chen, Yanchi Zhang, and Da Xie. "Multi-energy Network Model of Virtual Energy Router." E3S Web of Conferences 118 (2019): 02052. http://dx.doi.org/10.1051/e3sconf/201911802052.
Full textAminah, Nina Siti, Muhamamad Reza Ramadhani Raharjo, and Maman Budiman. "Low-cost wireless mesh communications based on openWRT and voice over internet protocol." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (December 1, 2021): 5119. http://dx.doi.org/10.11591/ijece.v11i6.pp5119-5126.
Full textNasir, M. H. M., N. A. M. Radzi, W. S. H. M. W. Ahmad, F. Abdullah, and M. Z. Jamaludin. "Comparison of router testbeds: embedded system-based, software-based, and multiprotocol label switching (MPLS)." Indonesian Journal of Electrical Engineering and Computer Science 15, no. 3 (September 1, 2019): 1250. http://dx.doi.org/10.11591/ijeecs.v15.i3.pp1250-1256.
Full textBaumgartner, Florian, Torsten Braun, Eveline Kurt, and Attila Weyland. "Virtual routers." ACM SIGCOMM Computer Communication Review 33, no. 3 (July 2003): 127–35. http://dx.doi.org/10.1145/956993.957008.
Full textZhang, Chun Yang, Jun Fu Li, and Qian Xu. "BU-Router: Researching on Techniques of Global Router." Applied Mechanics and Materials 513-517 (February 2014): 539–44. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.539.
Full textSandeep, Darshanala, M. Vinodhini, and N. S. Murty. "Route-on-Fly Network-on-Chip Router Design with Soft-Error Tolerance." Journal of Computational and Theoretical Nanoscience 17, no. 1 (January 1, 2020): 329–33. http://dx.doi.org/10.1166/jctn.2020.8670.
Full textBocovich, Cecylia, and Ian Goldberg. "Secure asymmetry and deployability for decoy routing systems." Proceedings on Privacy Enhancing Technologies 2018, no. 3 (June 1, 2018): 43–62. http://dx.doi.org/10.1515/popets-2018-0020.
Full textYin, Jie, Ke Lou, and Guanhua Gong. "Overview of energy routers control strategies." Journal of Physics: Conference Series 2310, no. 1 (October 1, 2022): 012030. http://dx.doi.org/10.1088/1742-6596/2310/1/012030.
Full textSyahputra, Ramdhani, Rahmadi Kurnia, and Rian Ferdian. "Analysis of FHRP Design and Implementation in RIPv2 and OSPF Routing Protocols." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 1 (February 8, 2020): 102–8. http://dx.doi.org/10.29207/resti.v4i1.1490.
Full textDong, Shaohua, Qing Zhang, Guangtao Cao, Jincheng Ni, Ting Shi, Shiqing Li, Jingwen Duan, et al. "On-chip trans-dimensional plasmonic router." Nanophotonics 9, no. 10 (April 23, 2020): 3357–65. http://dx.doi.org/10.1515/nanoph-2020-0078.
Full textStojanovic, Igor, and Goran Djordjevic. "In-channel misrouting suppression technique for deflection-routed networks on chip." Facta universitatis - series: Electronics and Energetics 29, no. 2 (2016): 309–23. http://dx.doi.org/10.2298/fuee1602309s.
Full textSupriyono, Abdul Rohman, and Yudi Prayudi. "LIVE FORENSICS ACQUISITION FILE SHARING SAMBA PADA MIKROTIK ROUTER OS." Cyber Security dan Forensik Digital 1, no. 1 (May 24, 2018): 7–13. http://dx.doi.org/10.14421/csecurity.2018.1.1.1210.
Full textFethellah, Nour El Houda, Hafida Bouziane, and Abdallah Chouarfia. "New Efficient Caching Strategy based on Clustering in Named Data Networking." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 12 (December 18, 2019): 104. http://dx.doi.org/10.3991/ijim.v13i12.11403.
Full textAdhiwibowo, Whisnumurti, and Baik Catur Ardiansyah. "Rancang Bangun Wireless Router Menggunakan Raspberry PI." Jurnal Pengembangan Rekayasa dan Teknologi 14, no. 2 (January 21, 2019): 50. http://dx.doi.org/10.26623/jprt.v14i2.1227.
Full textBi, Xia-an, Xiaohui Wang, and Hong Liu. "Evolutionary Game-Theoretic Solution for Virtual Routers with Padding Misbehavior in Cloud Computing." Mathematical Problems in Engineering 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/901461.
Full textAmin, Sadia, Saira Ahthasham, Aftab Ahmed Shaikh, Ahthasham Sajid, and Mirza Aamir Mehmood. "Improvement of BGP Session Maintenance." International Journal of Engineering & Technology 1, no. 2 (May 24, 2012): 94. http://dx.doi.org/10.14419/ijet.v1i2.77.
Full textMuttair, Karrar Shakir, Ali Z. Ghazi Zahid, Oras A. Shareef Al-Ani, Ahmed Mohammed Q. AL-Asadi, and Mahmood F. Mosleh. "Implementation Mixed Wireless Network with Lower Number of Wi-Fi Routers for Optimal Coverage." International Journal of Online and Biomedical Engineering (iJOE) 17, no. 13 (December 6, 2021): 59–80. http://dx.doi.org/10.3991/ijoe.v17i13.24149.
Full textDecasper, D., Z. Dittia, G. Parulkar, and B. Plattner. "Router plugins: a software architecture for next-generation routers." IEEE/ACM Transactions on Networking 8, no. 1 (2000): 2–15. http://dx.doi.org/10.1109/90.836474.
Full textDecasper, Dan, Zubin Dittia, Guru Parulkar, and Bernhard Plattner. "Router plugins: a software architecture for next generation routers." ACM SIGCOMM Computer Communication Review 28, no. 4 (October 1998): 229–40. http://dx.doi.org/10.1145/285243.285285.
Full textLi, Cunlu, Dezun Dong, Shazhou Yang, Xiangke Liao, Guangyu Sun, and Yongheng Liu. "CIB-HIER." ACM Transactions on Architecture and Code Optimization 18, no. 4 (December 31, 2021): 1–21. http://dx.doi.org/10.1145/3468062.
Full textFadhel, Meaad, Lei Huang, and Huaxi Gu. "Universal Method for Constructing Fault-Tolerant Optical Routers Using RRW." Wireless Communications and Mobile Computing 2021 (August 17, 2021): 1–15. http://dx.doi.org/10.1155/2021/5371330.
Full textKillian, Cédric, Camel Tanougast, Fabrice Monteiro, and Abbas Dandache. "A New Efficient and Reliable Dynamically ReconfigurableNetwork-on-Chip." Journal of Electrical and Computer Engineering 2012 (2012): 1–16. http://dx.doi.org/10.1155/2012/843239.
Full textChao, H. J. "Next generation routers." Proceedings of the IEEE 90, no. 9 (September 2002): 1518–58. http://dx.doi.org/10.1109/jproc.2002.802001.
Full textHancock, Bill. "Attacking network routers." Network Security 1999, no. 1 (January 1999): 8–9. http://dx.doi.org/10.1016/s1353-4858(99)80001-4.
Full textSeifert, W. M. "Bridges and routers." IEEE Network 2, no. 1 (January 1988): 57–64. http://dx.doi.org/10.1109/65.3239.
Full textHancock, Bill. "Attacking network routers." Network Security 1995, no. 9 (September 1995): 11–12. http://dx.doi.org/10.1016/1353-4858(96)89749-2.
Full textBharadwaj, Prashant. "Routers in internetworks." Resonance 9, no. 1 (January 2004): 12–25. http://dx.doi.org/10.1007/bf02902525.
Full textKorotkyy, YE V., and O. M. Lysenka. "Behavioral model of an integrated router." Electronics and Communications 16, no. 3 (March 28, 2011): 221–25. http://dx.doi.org/10.20535/2312-1807.2011.16.3.266789.
Full textSiddiqi, Umair F., Sadiq M. Sait, and Yoichi Shiraishi. "A Game Theory-Based Heuristic for the Two-Dimensional VLSI Global Routing Problem." Journal of Circuits, Systems and Computers 24, no. 06 (May 26, 2015): 1550082. http://dx.doi.org/10.1142/s0218126615500826.
Full textDeng, Xiaoping, Lujuan Ma, and Xiaoping Liu. "CCAIB: Congestion Control Based on Adaptive Integral Backstepping for Wireless Multi-Router Network." Sensors 22, no. 5 (February 25, 2022): 1818. http://dx.doi.org/10.3390/s22051818.
Full textShah, Zawar, and Ashutosh Kolhe. "Throughput Analysis of IEEE 802.11ac and IEEE 802.11n in a Residential Home Environment." International Journal of Interdisciplinary Telecommunications and Networking 9, no. 1 (January 2017): 1–13. http://dx.doi.org/10.4018/ijitn.2017010101.
Full textWang, Longjuan, Chunjie Cao, Jun Ye, and Wenjie Zhong. "RW-Fuzzer: A Fuzzing Method for Vulnerability Mining on Router Web Interface." Wireless Communications and Mobile Computing 2022 (April 25, 2022): 1–9. http://dx.doi.org/10.1155/2022/5311295.
Full textWang, Longjuan, Chunjie Cao, Jun Ye, and Wenjie Zhong. "RW-Fuzzer: A Fuzzing Method for Vulnerability Mining on Router Web Interface." Wireless Communications and Mobile Computing 2022 (April 25, 2022): 1–9. http://dx.doi.org/10.1155/2022/5311295.
Full textSchwarz, Franziska, Klaus Schwarz, Daniel Fuchs, Reiner Creutzburg, and David Akopian. "Firmware Vulnerability Analysis of Widely Used Low-Budget TP-Link Routers." Electronic Imaging 2021, no. 3 (June 18, 2021): 135–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-135.
Full textHariyadi, I. Putu. "Sentralisasi Manajemen Hotspot Menggunakan Transparent Bridge Tunnel EoIP over SSTP." Jurnal Matrik 16, no. 2 (July 26, 2017): 86. http://dx.doi.org/10.30812/matrik.v16i2.8.
Full text