Rozprawy doktorskie na temat „PROTOCOL ANALYSIS”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „PROTOCOL ANALYSIS”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Brachfeld, Lawrence J. "Mobile internet protocol analysis". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369385.
Pełny tekst źródła"September 1999". Thesis advisor(s): Bert Lundy, Wolfgang Baer. Includes bibliographical references (p. 53). Also available online.
Kovan, Gerry. "SPP Secure Payment Protocol: Protocol Analysis, Implementation and Extensions". Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1079.
Pełny tekst źródłaO'Shea, Nicholas. "Verification and validation of security protocol implementations". Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4753.
Pełny tekst źródłaDobson, Lucas E. "Security analysis of session initiation protocol". Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDobson.pdf.
Pełny tekst źródłaThesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
Araya, Cristian, i Manjinder Singh. "Web API protocol and security analysis". Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208934.
Pełny tekst źródłaDet finns ett problem i dagens samhälle gällande att varje företag har sin egen kundportal. Detta problem kan lösas genom att skapa en plattform som samlar alla kundportaler på samma plats. För en sådan plattform krävs det ett web API protokoll som är snabb, säker och har kapacitet för många användare. Därför har en undersökning om olika web API protokolls prestanda samt säkerhetstester gjorts. Arbetet gick ut på att ta reda på vilket web API protokoll som erbjuder hög säkerhet och hög prestanda i form av svarstid både vid låg och hög belastning. Det ingick också i arbetet att göra en undersökning av tidigare arbeten för att ta reda på om eventuella protokoll kunde uteslutas. Under arbetet utvecklades också plattformens backend som implementerade de olika web API protokollen för att sedan kunna utföra tester på dessa. Testerna som utfördes var svarstid både med och utan belastning, uppkopplingstid samt belastning. Resultaten analyserades och visade att protokollen hade både för- och nackdelar. Avslutningsvis valdes ett protokoll som var lämpad för plattformen eftersom den hade hög säkerhet samt snabbast uppkopplingstid. Dessutom påverkades inte servern negativt av antalet uppkopplingar. Reactive REST valdes som web API protokoll för denna plattform.
Jayaswal, Tanu. "Events-induced tourism: a protocol analysis". AUT University, 2010. http://hdl.handle.net/10292/897.
Pełny tekst źródłaJang, Beakcheol. "Wireless MAC Protocol Design and Analysis". NCSU, 2009. http://www.lib.ncsu.edu/theses/available/etd-05262009-175059/.
Pełny tekst źródłaLu, Chun, i Jian Song. "Protocol Analysis for Networked Acquirement System". International Foundation for Telemetering, 2014. http://hdl.handle.net/10150/577516.
Pełny tekst źródłaThis paper analyzed protocols may be used in each layer in networked telemetry systems, and also presents some deeper researches of the advantages of using synchronous time-division for the physical layer of a networked telemetry system.
Hsu, Yating. "Formal Analysis of Network Protocol Security". The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1317230784.
Pełny tekst źródłaChu, Peil-Ying Mark. "Towards automating protocol synthesis and analysis /". The Ohio State University, 1989. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487598303840366.
Pełny tekst źródłaPfeffer, Mary Graves. "Venture Capital Investment and Protocol Analysis". Thesis, North Texas State University, 1987. https://digital.library.unt.edu/ark:/67531/metadc331014/.
Pełny tekst źródłaMajeed, Adnan. "TARMAC timing analysis resilient MAC protocol /". Diss., Online access via UMI:, 2007.
Znajdź pełny tekst źródłaAhmed, Mahad A. (Mahad Mohamed) 1973 Carleton University Dissertation Engineering Systems and Computer. "Performance analysis and improvement of the Open Shortest Path First routing protocol". Ottawa.:, 1999.
Znajdź pełny tekst źródłaTalkington, Gregory Joshua. "Shepherding Network Security Protocols as They Transition to New Atmospheres: A New Paradigm in Network Protocol Analysis". Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1609134/.
Pełny tekst źródłaFiring, Tia Helene. "Analysis of the Transport Layer Security protocol". Thesis, Norwegian University of Science and Technology, Department of Mathematical Sciences, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10025.
Pełny tekst źródłaIn this master thesis we have presented a security analysis of the TLS protocol with particular emphasis on the recently discovered renegotiation attack. From our security proof we get that the Handshake protocol with renegotiation, including the fix from IETF, is secure, and hence not vulnerable to the renegotiation attack anymore. We have also analysed the Handshake protocol with session resumption, and the Application data protocol together with the Record protocol. Both of these protocols were deemed secure as well. All the security proofs are based on the UC (Universal Composability) security framework.
Hui, Daniel Hang-Yan. "Protocol validation via reachability analysis : an implementation". Thesis, University of British Columbia, 1985. http://hdl.handle.net/2429/24689.
Pełny tekst źródłaScience, Faculty of
Computer Science, Department of
Graduate
Hoffmeister, Chris W. "An evaluation methodology for protocol analysis systems". Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FHoffmeister.pdf.
Pełny tekst źródłaThesis Advisor(s): George W. Dinolt, Jonathan Herzog. "March 2007." Includes bibliographical references (p. 237-239). Also available in print.
Rasoamanana, Aina Toky. "Derivation and Analysis of Cryptographic Protocol Implementation". Electronic Thesis or Diss., Institut polytechnique de Paris, 2023. http://www.theses.fr/2023IPPAS005.
Pełny tekst źródłaTLS and SSH are two well-known and thoroughly studied security protocols. In this thesis, we focus on a specific class of vulnerabilities affecting both protocols implementations, state machine errors. These vulnerabilities are caused by differences in interpreting the standard and correspond to deviations from the specifications, e.g. accepting invalid messages, or accepting valid messages out of sequence.We develop a generalized and systematic methodology to infer the protocol state machines such as the major TLS and SSH stacks from stimuli and observations, and to study their evolution across revisions. We use the L* algorithm to compute state machines corresponding to different execution scenarios.We reproduce several known vulnerabilities (denial of service, authentication bypasses), and uncover new ones. We also show that state machine inference is efficient and practical enough in many cases for integration within a continuous integration pipeline, to help find new vulnerabilities or deviations introduced during development.With our systematic black-box approach, we study over 600 different versions of server and client implementations in various scenarios (protocol versions, options). Using the resulting state machines, we propose a robust algorithm to fingerprint TLS and SSH stacks. To the best of our knowledge, this is the first application of this approach on such a broad perimeter, in terms of number of TLS and SSH stacks, revisions, or execution scenarios studied
Khan, Muhammad Rashid. "Performance and route stability analysis of RPL protocol". Thesis, KTH, Reglerteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102884.
Pełny tekst źródłaBao, Wei. "Modeling, analysis and enhancement of transmission control protocol". Thesis, University of British Columbia, 2011. http://hdl.handle.net/2429/36990.
Pełny tekst źródłaÅhman, Stefan, i Marcus Wallstersson. "EVH2 protocol : Performance analysis and Wireshark dissector development". Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98689.
Pełny tekst źródłaEVH2 är ett proprietärt applikationslagerprotokoll utvecklat av Aptilo Networks som används i deras mjukvaruprodukt. För närvarande kan EVH2-trafik endast inspekteras med deras egenutvecklade applikation. Denna applikation har inte något stöd för att inspektera annan trafik än EVH2. Eftersom Aptilo kontinuerligt utvecklar detta protokollet är det viktigt att kunna se hur förändringar i protokollet påverkar dess prestanda. Detta examenarbete undersöker möjliga sätt att underlätta användningen och utvecklingen av protokollet. För att kunna inspektera EVH2-trafik tillsammans med trafik från andra protokoll behövs en annan lösning än den nuvarande. Wireshark är en applikation som har stöd för att inspektera flera protokoll samtidigt där protokollpaketen avkodas med dissectors (dissektorer översatt till svenska). I detta examensarbete beskrivs och utvärderas utvecklingen av ett Wireshark dissector plugin för inspektion av EVH2-trafik. Genom att prestandatesta EVH2 kan prestandaskillnader påvisas vid förändringar i protokollet. Detta examensarbete tar fram en plattform för prestandautvärdering genom att introducera en testsvit för prestandatestning. Den utvecklade testsviten användes för att utföra prestandtestning av EVH2.
Kaphuka, Samuel. "The SADC protocol on trade: a critical analysis". Master's thesis, University of Cape Town, 2015. http://hdl.handle.net/11427/19788.
Pełny tekst źródłaBaker, Robert E. "A study of novice systems analysts' problem solving behaviors using protocol analysis". Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23782.
Pełny tekst źródłaParel, Ilaria. "Validation and application of a shoulder ambulatory motion analysis protocol". Doctoral thesis, Università degli studi di Trieste, 2013. http://hdl.handle.net/10077/8530.
Pełny tekst źródłaLe principali attività di ricerca svolte durante il dottorato hanno riguardano la validazione e caratterizzazione dell’applicabilità di un protocollo per l’analisi della cinematica di spalla in ambito clinico (ISEO - INAIL Shoulder and Elbow Outpatient protocol). Lo scopo principale era quello di creare uno strumento che fornisse al personale sanitario informazioni sulla performance motoria dei pazienti, supportando, con informazioni di tipo quantitativo, la valutazione ambulatoriale delle patologie della spalla. E’ possibile suddividere l’attività di ricerca in tre temi principali: caratterizzazione e validazione di ISEO; applicazione di ISEO per valutazioni di tipo clinico; applicazione di ISEO per valutazione di performance motoria in ambito sportivo. Grazie ai processi di validazione e caratterizzazione svolti e alle applicazioni di ISEO, ad oggi il protocollo può essere utilizzato in studi clinici e sportivi riguardanti la cinematica di spalla (coordinazione scapolo-omerale), per i quali la sensibilità dello strumento può essere considerata adatta alle esigenze valutative.
The main research activities carried out during the PhD were related to the validation and characterization of the applicability of a protocol for the analysis of the kinematics of the shoulder in a clinical setting (ISEO - Shoulder and Elbow INAIL Outpatient protocol). The main purpose was to create a tool that provides quantitative information about the motor performance of patients, supporting clinicians for the assessment of ambulatory shoulder disorders. The research activity can be split in three main themes: characterization and validation od ISEO; application of ISEO for clinical assessments; application of ISEO for sport performance assessments. Thanks to the validation and characterization of the protocol and its application in several contests, it can be concluded that ISEO can be used to evaluate the kinematics of the shoulder (in particular the scapulohumeral coordination) in clinical and sport performance studies, for which the sensitivity of the protocol can be considered appropriate.
XXV Ciclo
1983
Giancecchi, Nicola. "Analysis and Implementation of the Messaging Layer Security Protocol". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/18467/.
Pełny tekst źródłaOruk, Tufan. "Simulation and analysis of a wireless MAC protocol : MACAW /". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA320868.
Pełny tekst źródłaThesis advisor(s): Gilbert M. Lundy. "September 1996." Includes bibliographical references (p. 73). Also available online.
Tipici, H. Alphan. "Specification and analysis of a high speed transport protocol". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA268941.
Pełny tekst źródłaKo, Kai-Chung. "Protocol test sequence generation and analysis using AI techniques". Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/29192.
Pełny tekst źródłaScience, Faculty of
Computer Science, Department of
Graduate
Muriithi, Ndiritu. "Radio local area networks : protocol design and performance analysis". Thesis, University of York, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.296384.
Pełny tekst źródłaCarter, Steven Michael. "Implementation and analysis of the IP measurement protocol (IPMP)". Master's thesis, Mississippi State : Mississippi State University, 2001. http://library.msstate.edu/etd/show.asp?etd=etd-11152001-090121.
Pełny tekst źródłaAmoah, Raphael. "Formal security analysis of the DNP3-Secure Authentication Protocol". Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/93798/1/Raphael_Amoah_Thesis.pdf.
Pełny tekst źródłaMcLean, Alexander Brown. "Using an Acceptance and Commitment Training Protocol to Decrease Drug Use". Scholar Commons, 2014. https://scholarcommons.usf.edu/etd/5375.
Pełny tekst źródłaAlmquist, Martin Scott. "Formal specification and analysis of a wireless media access protocol". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA304483.
Pełny tekst źródłaHensley, David P. "A formal specification and analysis of the resource reservation protocol". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369656.
Pełny tekst źródła"September 1999". Thesis advisor(s): Gilbert M. Lundy. Includes bibliographical references (p. 55). Also available online.
Leong, Ieng Kit. "Formal analysis of Web Services Atomic Transaction protocol using SPIN". Thesis, University of Macau, 2009. http://umaclib3.umac.mo/record=b2099650.
Pełny tekst źródłaZuniga, Rodriguez Ricardo Francisco. "A comparative analysis of internet protocol telephony in Latin America /". Thesis, McGill University, 2001. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=32819.
Pełny tekst źródłaInternet Telephony is one of the most important developments that has resulted from digitization. It raises several legal-regulatory issues at both domestic and international levels.
This thesis analyzes the existing legal-regulatory framework for Internet Telephony in Latin America, and examines its implications and potential developments in the region.
In order to provide a more solid foundation for this analysis, the first chapter provides an overview of the traditional regulatory framework, and describes the technological and economic underpinnings of Internet Telephony.
The second chapter studies the regulatory frameworks for Internet Telephony that have been adopted by Canada, the United States and the European Union. These frameworks could serve as models and provide further guidance to analyze the approaches taken to regulate Internet Telephony in Latin America.
Finally, the third chapter examines the three existing legal-regulatory approaches to Internet Telephony that have been adopted in Latin America and its potential implications.
Charbonneau, Lauren J. "A specification and analysis of the IEEE token bus protocol". Thesis, Monterey, California. Naval Postgraduate School, 1990. http://hdl.handle.net/10945/30633.
Pełny tekst źródłaIn this thesis a formal description technique, systems of communicating machines, is used to specify and analyze a token bus protocol. A simplified description of the protocol is given, and proofs of certain correctness properties presented. The analysis proves that the protocol is free from deadlocks and non executable transitions, and also that successful message transfer is guaranteed for a network with an arbitrary number of machines. A program written in an object oriented language, C++, demonstrates that the description technique, the specification, and the analysis of the protocol is complete and accurate for a network of three stations. The specification is then extended to allow the transmission of different types of messages, errors in the communication channel, acknowledgements from the receiver, and timeouts.
Khongpun, Somsook. "Composing processes of Thai high school students : a protocol analysis". Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/862270.
Pełny tekst źródłaDepartment of English
Raiche, Carl A. "A specification and analysis of the IEEE token ring protocol". Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/27279.
Pełny tekst źródłaLiang, Robert, Bruce Kwan i Cedric Florens. "ON THROUGHPUT ANALYSIS OF THE MARS IN-SITU ARQ PROTOCOL". International Foundation for Telemetering, 2000. http://hdl.handle.net/10150/607709.
Pełny tekst źródłaCombating harsh and unpredictable channel environments is a part of the design of any in-situ communication system (i.e. rover to lander, rover to orbiter, etc.). Channel characteristics can range from simple additive white Gaussian noise (AWGN) channels to more bursty fading channels found in rover to orbiter links (i.e. canyon scenarios and typical orbiter passes around mountain ranges). A combination of forward error correction and automatic repeat request (ARQ) schemes are commonly used to provide a more robust communications link. ARQ enhances the communication link particularly for bursty fading channels. Go-Back-N is a commonly used ARQ scheme and is an option in the newly developed Consultative Committee for Space Data Systems (CCSDS) Proximity-1 Link protocol [7], a data link layer protocol targeted specifically for in-situ applications. Optimization of frame sizes and retransmission persistence of the ARQ scheme require a good analytical model of how the scheme performs over various channel conditions. In this paper, an analytical framework for modeling the COP-1 protocol is presented for both AWGN channels along with bursty fading channels. A Gilbert-Elliot two-state Markov model is used to model a bursty fading channel.
Kulkarni, Upendra M. "Performance analysis of HDLC protocol operating in asynchronous balanced mode". Thesis, Virginia Tech, 1988. http://hdl.handle.net/10919/45897.
Pełny tekst źródłaThe objective of this work is to analyze the performance of HDLC Balanced Class of
Procedures under saturated, full-duplex transmission on error prone links. This thesis
extends work done by Bux et al. [8] by considering errors on both the links. Satellite
links have long propogation delays compared to terrestrial links, and hence, have
longer error recovery times. For such links, errors in acknowledgements have considerable
impact on the throughput. In this analysis, the effect of errors in acknowledgements
is taken in to consideration. An analytical approach is used to derive
performance measures. The concept of "virtual transmission time" introduced by Bux
et al is redefined to accommodate the effect of errors in acknowledgements and
used in the analysis. Resulting throughput calculations show how various parameters,
(e.g. transmission rate, propagation delay, error rate and packet size), interact
and determine the performance.
Master of Science
Li, Pan. "Capacity analysis and cross-layer protocol design in wireless networks". [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0024777.
Pełny tekst źródłaNelson, Kevin R. "Critical analysis of XYZ Secondary School's technology education safety protocol". Online version, 2003. http://www.uwstout.edu/lib/thesis/2003/2003nelsonk.pdf.
Pełny tekst źródłaChen, Yunli. "Performance analysis and enhancement of MAC protocol for IEEE 802.11WLANs". Cincinnati, Ohio : University of Cincinnati, 2004. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=ucin1098856121.
Pełny tekst źródłaMaagh, Stefan. "Performance analysis of the HARQ dynamic decode-and-forward protocol". Thesis, Edinburgh Napier University, 2015. http://researchrepository.napier.ac.uk/Output/8849.
Pełny tekst źródłaD'Silva, Anil J. "An analysis on the fairness aspects of the DQDB protocol". Thesis, Queensland University of Technology, 1993.
Znajdź pełny tekst źródłaDeng, Xianglin. "Security of VoIP : Analysis, Testing and Mitigation of SIP-based DDoS attacks on VoIP Networks". Thesis, University of Canterbury. Computer Science and Software Engineering, 2008. http://hdl.handle.net/10092/2227.
Pełny tekst źródłaBasaran, Cuneyt. "Automated network protocol reachability analysis with supertrace algorithm and TESTGEN : automated generation of test sequence for a formal protocol specification". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA280788.
Pełny tekst źródłaOndráček, David. "Databáze specifikací bezpečnostních protokolů". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235438.
Pełny tekst źródłaRobbins, Bryan Thomas. "Cognitive factors in perspective-based reading (PBR) a protocol analysis study /". Master's thesis, Mississippi State : Mississippi State University, 2009. http://library.msstate.edu/etd/show.asp?etd=etd-04032009-161814.
Pełny tekst źródła