Literatura académica sobre el tema "Analysis protocol"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Analysis protocol".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Analysis protocol"
HU, YANJING, QINGQI PEI y LIAOJUN PANG. "Instruction Clustering Analysis for Unknown Network Protocol's Abnormal Behavior". Journal of Interconnection Networks 15, n.º 03n04 (septiembre de 2015): 1540002. http://dx.doi.org/10.1142/s0219265915400022.
Texto completoOwen, Stephen, Pearl Brereton y David Budgen. "Protocol analysis". Communications of the ACM 49, n.º 2 (febrero de 2006): 117–22. http://dx.doi.org/10.1145/1113034.1113039.
Texto completoLi, Fu Lin, Jie Yang, Hong Wei Zhou y Ying Liu. "A New Dynamic Protocol Analysis Model". Advanced Materials Research 765-767 (septiembre de 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.
Texto completoZhao, Wen Hong. "Protocols Analysis by Base-Function". Applied Mechanics and Materials 530-531 (febrero de 2014): 682–85. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.682.
Texto completoKOVACIK, Cyril Filip y Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK". Acta Electrotechnica et Informatica 1335-8243, n.º 1338-3957 (9 de junio de 2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.
Texto completoYongming Yao, Yongming Yao, Yulin Wang Yongming Yao, Weiyi Jiang Yulin Wang, Ziyuan Wang Weiyi Jiang y Song Huang Ziyuan Wang. "PPAdroid: An Approach to Android Privacy Protocol Analysis". 網際網路技術學刊 23, n.º 3 (mayo de 2022): 561–71. http://dx.doi.org/10.53106/160792642022052303014.
Texto completoAnggriani, Sufy, Rizki Savira Firdaus y Windy Amanda Siwi Suherlan. "Analisis Penyimpanan Protokol Notaris Secara Elektronik". Notaire 6, n.º 3 (4 de diciembre de 2023): 437–48. http://dx.doi.org/10.20473/ntr.v6i3.50802.
Texto completoMuhammad Farhan, Muhammad Asif, Maaz Bin Ahmad y Khalid Maqsood. "A Comparative Analysis of Unicast Routing Protocols for MPLS-VPN". Lahore Garrison University Research Journal of Computer Science and Information Technology 3, n.º 1 (29 de marzo de 2019): 43–49. http://dx.doi.org/10.54692/lgurjcsit.2019.030167.
Texto completoZhao, Wen Hong. "Protocols Analysis Based on the Combination Mode of Walsh Function". Applied Mechanics and Materials 543-547 (marzo de 2014): 3482–85. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3482.
Texto completoLu, Siqi, Qingdi Han, Xuyang Miao y Yubo Liu. "Research on Security Protocol Analysis Tool SmartVerif". Journal of Physics: Conference Series 2132, n.º 1 (1 de diciembre de 2021): 012022. http://dx.doi.org/10.1088/1742-6596/2132/1/012022.
Texto completoTesis sobre el tema "Analysis protocol"
Brachfeld, Lawrence J. "Mobile internet protocol analysis". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369385.
Texto completo"September 1999". Thesis advisor(s): Bert Lundy, Wolfgang Baer. Includes bibliographical references (p. 53). Also available online.
Kovan, Gerry. "SPP Secure Payment Protocol: Protocol Analysis, Implementation and Extensions". Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1079.
Texto completoO'Shea, Nicholas. "Verification and validation of security protocol implementations". Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4753.
Texto completoDobson, Lucas E. "Security analysis of session initiation protocol". Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDobson.pdf.
Texto completoThesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
Araya, Cristian y Manjinder Singh. "Web API protocol and security analysis". Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208934.
Texto completoDet finns ett problem i dagens samhälle gällande att varje företag har sin egen kundportal. Detta problem kan lösas genom att skapa en plattform som samlar alla kundportaler på samma plats. För en sådan plattform krävs det ett web API protokoll som är snabb, säker och har kapacitet för många användare. Därför har en undersökning om olika web API protokolls prestanda samt säkerhetstester gjorts. Arbetet gick ut på att ta reda på vilket web API protokoll som erbjuder hög säkerhet och hög prestanda i form av svarstid både vid låg och hög belastning. Det ingick också i arbetet att göra en undersökning av tidigare arbeten för att ta reda på om eventuella protokoll kunde uteslutas. Under arbetet utvecklades också plattformens backend som implementerade de olika web API protokollen för att sedan kunna utföra tester på dessa. Testerna som utfördes var svarstid både med och utan belastning, uppkopplingstid samt belastning. Resultaten analyserades och visade att protokollen hade både för- och nackdelar. Avslutningsvis valdes ett protokoll som var lämpad för plattformen eftersom den hade hög säkerhet samt snabbast uppkopplingstid. Dessutom påverkades inte servern negativt av antalet uppkopplingar. Reactive REST valdes som web API protokoll för denna plattform.
Jayaswal, Tanu. "Events-induced tourism: a protocol analysis". AUT University, 2010. http://hdl.handle.net/10292/897.
Texto completoJang, Beakcheol. "Wireless MAC Protocol Design and Analysis". NCSU, 2009. http://www.lib.ncsu.edu/theses/available/etd-05262009-175059/.
Texto completoLu, Chun y Jian Song. "Protocol Analysis for Networked Acquirement System". International Foundation for Telemetering, 2014. http://hdl.handle.net/10150/577516.
Texto completoThis paper analyzed protocols may be used in each layer in networked telemetry systems, and also presents some deeper researches of the advantages of using synchronous time-division for the physical layer of a networked telemetry system.
Hsu, Yating. "Formal Analysis of Network Protocol Security". The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1317230784.
Texto completoChu, Peil-Ying Mark. "Towards automating protocol synthesis and analysis /". The Ohio State University, 1989. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487598303840366.
Texto completoLibros sobre el tema "Analysis protocol"
New Zealand. Ministry for the Environment., ed. Solid waste analysis protocol. Wellington, N.Z: Ministry for the Environment, 2002.
Buscar texto completoBurns, Kevin. TCP/IP analysis and troubleshooting toolkit. Indianapolis: Wiley Pub., 2003.
Buscar texto completoHodgson. Novell Netware protocol and network analysis. Manchester: University of Manchester, Department of Computer Science, 1996.
Buscar texto completo1916-, Simon Herbert Alexander, ed. Protocol analysis: Verbal reports as data. Cambridge, Mass: MIT Press, 1992.
Buscar texto completo1916-, Simon Herbert A., ed. Protocol analysis: Verbal reports as data. Cambridge, Mass: MIT Press, 1985.
Buscar texto completoBoyle, Robert J. Engineering analysis using a web-based protocol. Cleveland, Ohio: National Aeronautics and Space Administration, Glenn Research Center, 2002.
Buscar texto completoK, Luke Nancy y Intelligent Buildings Institute Foundation, eds. Global protocol review & end-user needs analysis. Washington, DC: The Foundation, 1993.
Buscar texto completoSong, Wei, Peijian Ju y A.-Long Jin. Protocol Design and Analysis for Cooperative Wireless Networks. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-47726-8.
Texto completoOntario. Ministry of the Environment. Laboratory Services Branch., ed. Protocol of accepted drinking water testing methods. Toronto: Ministry of the Environment, Laboratory Services Branch, 2003.
Buscar texto completoBaker, Robert E. A study of novice systems analysts' problem solving behaviors using protocol analysis. Monterey, Calif: Naval Postgraduate School, 1992.
Buscar texto completoCapítulos de libros sobre el tema "Analysis protocol"
Ericsson, K. Anders. "Protocol Analysis". En A Companion to Cognitive Science, 425–32. Oxford, UK: Blackwell Publishing Ltd, 2017. http://dx.doi.org/10.1002/9781405164535.ch33.
Texto completoNahler, Gerhard. "per-protocol analysis". En Dictionary of Pharmaceutical Medicine, 134. Vienna: Springer Vienna, 2009. http://dx.doi.org/10.1007/978-3-211-89836-9_1033.
Texto completoDong, Ling y Kefei Chen. "Formalism of Protocol Security Analysis". En Cryptographic Protocol, 249–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-24073-7_7.
Texto completoDong, Ling y Kefei Chen. "Informal Analysis Schemes of Cryptographic Protocols". En Cryptographic Protocol, 83–152. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-24073-7_4.
Texto completoDong, Ling y Kefei Chen. "Security Analysis of Real World Protocols". En Cryptographic Protocol, 153–213. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-24073-7_5.
Texto completoRzempoluck, Edward J. "A Data Analysis Protocol". En Neural Network Data Analysis Using Simulnet™, 203–11. New York, NY: Springer New York, 1998. http://dx.doi.org/10.1007/978-1-4612-1746-6_5.
Texto completoAparicio-Sánchez, Damián, Santiago Escobar, Catherine Meadows, José Meseguer y Julia Sapiña. "Protocol Analysis with Time". En Progress in Cryptology – INDOCRYPT 2020, 128–50. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65277-7_7.
Texto completoRaymond Choo, Kim-Kwang. "Complementing Computational Protocol Analysis". En Advances in Information Security, 1–28. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-87969-7_10.
Texto completoSzymoniak, Sabina. "KaoChow Protocol Timed Analysis". En Advances in Soft and Hard Computing, 346–57. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03314-9_30.
Texto completoAgapito, Giuseppe y Mariamena Arbitrio. "Microarray Data Analysis Protocol". En Methods in Molecular Biology, 263–71. New York, NY: Springer US, 2021. http://dx.doi.org/10.1007/978-1-0716-1839-4_17.
Texto completoActas de conferencias sobre el tema "Analysis protocol"
Tan, Yang y Bo Lv. "Mistakes of a Popular Protocol Calculating Private Set Intersection and Union Cardinality and its Corrections". En 3rd International Conference on Artificial Intelligence and Machine Learning (CAIML 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121209.
Texto completoTiflea, Denisa-Ionela. "Vulnerabilities of LRSAS Protocol". En 12th International Conference on Electronics, Communications and Computing. Technical University of Moldova, 2022. http://dx.doi.org/10.52326/ic-ecco.2022/sec.07.
Texto completoQasMarrogy, Ghassan. "Practical Analysis of IEEE 802.11ax Wireless Protocol in Wi-Fi Boosters Environments". En 3rd International Conference of Mathematics and its Applications. Salahaddin University-Erbil, 2020. http://dx.doi.org/10.31972/ticma22.04.
Texto completoDorst, Kees y Nigel Cross. "Protocol Analysis As a Research Technique for Analysing Design Activity". En ASME 1995 Design Engineering Technical Conferences collocated with the ASME 1995 15th International Computers in Engineering Conference and the ASME 1995 9th Annual Engineering Database Symposium. American Society of Mechanical Engineers, 1995. http://dx.doi.org/10.1115/detc1995-0190.
Texto completoPlummer, Richard W. "SDLC protocol throughput analysis". En the 17th conference. New York, New York, USA: ACM Press, 1985. http://dx.doi.org/10.1145/21850.253380.
Texto completoJacobson, D. W. "Network protocol analysis (abstract)". En the 1986 ACM fourteenth annual conference. New York, New York, USA: ACM Press, 1986. http://dx.doi.org/10.1145/324634.325067.
Texto completo"Performance Analysis of Basic Automatic Repeat Request Protocols and Hybrid Automatic Repeat Request Protocol". En 4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022). Cihan University, 2022. http://dx.doi.org/10.24086/cocos2022/paper.567.
Texto completoDoostmohammadian, Mohammad Reza y Hassan Sayyaadi. "Finite-Time Consensus in Undirected/Directed Network Topologies". En ASME 2010 10th Biennial Conference on Engineering Systems Design and Analysis. ASMEDC, 2010. http://dx.doi.org/10.1115/esda2010-24012.
Texto completoHess, Tim y Joshua D. Summers. "Protocol Analysis: Studying Physical Manipulatives During Conceptual Design". En ASME 2014 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/detc2014-34183.
Texto completoBerhea, Mohammed, Chunhong Chen y Q. M. Jonathan Wu. "Protocol-level performance analysis for anti-collision protocols in RFID systems". En 2008 IEEE International Symposium on Circuits and Systems - ISCAS 2008. IEEE, 2008. http://dx.doi.org/10.1109/iscas.2008.4541591.
Texto completoInformes sobre el tema "Analysis protocol"
Tubesing, Philip. Protocols for Uranium Carbon Analysis - Testing Protocol Summary. Office of Scientific and Technical Information (OSTI), mayo de 2021. http://dx.doi.org/10.2172/1783513.
Texto completoMoy, J. OSPF Protocol Analysis. RFC Editor, julio de 1991. http://dx.doi.org/10.17487/rfc1245.
Texto completoRekhter, Y. BGP Protocol Analysis. RFC Editor, octubre de 1991. http://dx.doi.org/10.17487/rfc1265.
Texto completoTraina, P., ed. BGP-4 Protocol Analysis. RFC Editor, marzo de 1995. http://dx.doi.org/10.17487/rfc1774.
Texto completoMeyer, D. y K. Patel. BGP-4 Protocol Analysis. RFC Editor, enero de 2006. http://dx.doi.org/10.17487/rfc4274.
Texto completoMalkin, G. RIP Version 2 Protocol Analysis. RFC Editor, enero de 1993. http://dx.doi.org/10.17487/rfc1387.
Texto completoMalkin, G. RIP Version 2 Protocol Analysis. RFC Editor, noviembre de 1994. http://dx.doi.org/10.17487/rfc1721.
Texto completoSherry, S. y G. Meyer. Protocol Analysis for Triggered RIP. RFC Editor, enero de 1997. http://dx.doi.org/10.17487/rfc2092.
Texto completoBromberger, S. Technical Analysis of SSP-21 Protocol. Office of Scientific and Technical Information (OSTI), junio de 2017. http://dx.doi.org/10.2172/1366901.
Texto completoDanley, M., D. Mulligan, J. Morris y J. Peterson. Threat Analysis of the Geopriv Protocol. RFC Editor, febrero de 2004. http://dx.doi.org/10.17487/rfc3694.
Texto completo