Статті в журналах з теми "Model-based protocol"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Model-based protocol".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Mordecai, Yaniv. "Model-based protocol specification." Systems Engineering 22, no. 2 (March 2019): 188–210. http://dx.doi.org/10.1002/sys.21480.
Повний текст джерелаKhan, Muhammad, Yasir Zaki, Shiva Iyer, Talal Ahamd, Thomas Poetsch, Jay Chen, Anirudh Sivaraman, and Lakshmi Subramanian. "The case for model-driven interpretability of delay-based congestion control protocols." ACM SIGCOMM Computer Communication Review 51, no. 1 (January 31, 2021): 18–25. http://dx.doi.org/10.1145/3457175.3457179.
Повний текст джерелаPan, Yan, Wei Lin, Liang Jiao, and Yuefei Zhu. "Model-Based Grey-Box Fuzzing of Network Protocols." Security and Communication Networks 2022 (May 5, 2022): 1–13. http://dx.doi.org/10.1155/2022/6880677.
Повний текст джерелаDeng, Guo Li, Tao He, Yong Wei, Hua Zhong Li, Shou Xiang Xu, and De Fen Zhang. "Model Based Protocol Conformance Test Study." Applied Mechanics and Materials 713-715 (January 2015): 466–70. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.466.
Повний текст джерелаFigueroa-Lorenzo, Añorga, and Arrizabalaga. "A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach." Sensors 19, no. 20 (October 14, 2019): 4455. http://dx.doi.org/10.3390/s19204455.
Повний текст джерелаHuang, Xinyan. "A Data-Driven WSN Security Threat Analysis Model Based on Cognitive Computing." Journal of Sensors 2022 (January 27, 2022): 1–10. http://dx.doi.org/10.1155/2022/5013905.
Повний текст джерелаFu, Yulong, and Ousmane Koné. "Model based security verification of protocol implementation." Journal of Information Security and Applications 22 (June 2015): 17–27. http://dx.doi.org/10.1016/j.jisa.2014.08.002.
Повний текст джерелаKang, Burong, Xinyu Meng, Lei Zhang, and Yinxia Sun. "Nonce-Based Key Agreement Protocol Against Bad Randomness." International Journal of Foundations of Computer Science 30, no. 04 (June 2019): 619–33. http://dx.doi.org/10.1142/s0129054119400161.
Повний текст джерелаChen, Zhi, Ya Peng, and Wenjing Yue. "Model-Checking Driven Design of QoS-Based Routing Protocol for Wireless Sensor Networks." Journal of Sensors 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/716561.
Повний текст джерелаLi, Fu Lin, Jie Yang, Hong Wei Zhou, and Ying Liu. "A New Dynamic Protocol Analysis Model." Advanced Materials Research 765-767 (September 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.
Повний текст джерелаWang, Ying Lian, and Jun Yao Ye. "Research on Applied-Information Technology in Hierarchical Network Security Protocols Designing Based on Public Key." Advanced Materials Research 951 (May 2014): 169–72. http://dx.doi.org/10.4028/www.scientific.net/amr.951.169.
Повний текст джерелаOmar, Asma. "LOCATION BASED PROTOCOL FOR WIRELESS NETWORKS." Engineering Science & Technology Journal 2, no. 1 (March 29, 2020): 26–34. http://dx.doi.org/10.51594/estj.v2i1.120.
Повний текст джерелаRonald, Nicole, Theo Arentze, and Harry Timmermans. "The Effects of Different Interaction Protocols in Agent-Based Simulation of Social Activities." International Journal of Agent Technologies and Systems 3, no. 2 (April 2011): 18–32. http://dx.doi.org/10.4018/jats.2011040102.
Повний текст джерелаFu, Yu Long, and Xiao Long Xin. "A Model Based Security Testing Method for Protocol Implementation." Scientific World Journal 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/632154.
Повний текст джерелаYu, Tianxiang, Yang Xin, Yuexin Tao, Bingqing Hou, and Hongliang Zhu. "Network Communication Protocol Reverse Engineering Based on Auto-Encoder." Security and Communication Networks 2022 (October 6, 2022): 1–14. http://dx.doi.org/10.1155/2022/2924479.
Повний текст джерелаZhai, Liang, Qiuhua Zheng, Xu Zhang, Haizhong Hu, Weihao Yin, Yingpei Zeng, and Ting Wu. "Identification of Private ICS Protocols Based on Raw Traffic." Symmetry 13, no. 9 (September 19, 2021): 1743. http://dx.doi.org/10.3390/sym13091743.
Повний текст джерелаSujatanagarjuna, Anant, Arne Bochem, and Benjamin Leiding. "Formalizing the Blockchain-Based BlockVoke Protocol for Fast Certificate Revocation Using Colored Petri Nets." Information 12, no. 7 (July 6, 2021): 277. http://dx.doi.org/10.3390/info12070277.
Повний текст джерелаNaganathan. "Traffic Flow Analysis Model based Routing Protocol For Multi-Protocol Label Switching Network." Journal of Computer Science 7, no. 11 (November 1, 2011): 1674–78. http://dx.doi.org/10.3844/jcssp.2011.1674.1678.
Повний текст джерелаLiu, Weiwei, Hua Guo, and Yangguang Tian. "A Secure Distance-Bounding Protocol with Mutual Authentication." Security and Communication Networks 2021 (June 1, 2021): 1–7. http://dx.doi.org/10.1155/2021/6644326.
Повний текст джерелаLi, Zengpeng, Can Xiang, and Chengyu Wang. "Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography." Wireless Communications and Mobile Computing 2018 (September 2, 2018): 1–11. http://dx.doi.org/10.1155/2018/5973285.
Повний текст джерелаStack, Nora, David Barker, Mary Carskadon, and Cecilia Diniz Behn. "A Model-Based Approach to Optimizing Ultradian Forced Desynchrony Protocols for Human Circadian Research." Journal of Biological Rhythms 32, no. 5 (September 27, 2017): 485–98. http://dx.doi.org/10.1177/0748730417730488.
Повний текст джерелаJärvinen, Hannu, Dario Garcia-Gasulla, and Ulises Cortés. "A Push-Based Agent Communication Model Empowering Assistive Technologies." International Journal on Artificial Intelligence Tools 23, no. 01 (February 2014): 1440003. http://dx.doi.org/10.1142/s021821301440003x.
Повний текст джерелаNekhorosheva, Emma A., and Alexander P. Shkaraputa. "Building a Model of Electronic Voting Protocol With the Possibility of Verification of the Result by Voters." Вестник Пермского университета. Математика. Механика. Информатика, no. 4(59) (2022): 61–67. http://dx.doi.org/10.17072/1993-0550-2022-4-61-67.
Повний текст джерелаWang, Wei, and Qing Feng Cheng. "Analysis of Two ID-Based Key Exchange Protocols." Applied Mechanics and Materials 135-136 (October 2011): 289–93. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.289.
Повний текст джерелаSimon, Judy. "An Energy Efficient Routing Protocol based on Reinforcement Learning for WSN." IRO Journal on Sustainable Wireless Systems 4, no. 2 (July 2, 2022): 79–89. http://dx.doi.org/10.36548/jsws.2022.2.002.
Повний текст джерелаSalah, Saeed, Raid Zaghal, and Mada Abdeljawad. "A Mathematical-Based Model for Estimating the Path Duration of the DSDV Routing Protocol in MANETs." Journal of Sensor and Actuator Networks 11, no. 2 (May 12, 2022): 23. http://dx.doi.org/10.3390/jsan11020023.
Повний текст джерелаWang, Hao, Yu Li, and Li-Ping Wang. "Post-Quantum Secure Password-Authenticated Key Exchange Based on Ouroboros." Security and Communication Networks 2022 (July 14, 2022): 1–11. http://dx.doi.org/10.1155/2022/9257443.
Повний текст джерелаVaiapury, Karthikeyan, Malmurugan Nagarajan, and SunilKumar Jain. "Ambience-Based Voice Over Internet Protocol Quality Testing Model." IETE Journal of Research 55, no. 5 (2009): 212. http://dx.doi.org/10.4103/0377-2063.57598.
Повний текст джерелаQi, Xiaoguang, Guang Yue, Liang Zhang, and Mingfeng He. "A complex network model based on the Gnutella protocol." Physica A: Statistical Mechanics and its Applications 388, no. 18 (September 2009): 3955–60. http://dx.doi.org/10.1016/j.physa.2009.06.007.
Повний текст джерелаLi, Lian-xing, Xin-cun Tang, Yi Qu, and Hong-tao Liu. "CC-CV charge protocol based on spherical diffusion model." Journal of Central South University 18, no. 2 (April 2011): 319–22. http://dx.doi.org/10.1007/s11771-011-0698-2.
Повний текст джерелаAmin, Ruhul, SK Hafizul Islam, Muhammad Khurram Khan, Arijit Karati, Debasis Giri, and Saru Kumari. "A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/5989151.
Повний текст джерелаFang, Lei, Xue Rao, Ling Li, and Huan Li. "A RFID-Based Security Authentication System Model for Electric Vehicle Charging Station." Applied Mechanics and Materials 741 (March 2015): 623–28. http://dx.doi.org/10.4028/www.scientific.net/amm.741.623.
Повний текст джерелаChen, Xiaojuan, and Huiwen Deng. "Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic." Applied Sciences 10, no. 18 (September 21, 2020): 6577. http://dx.doi.org/10.3390/app10186577.
Повний текст джерелаYang, Fan, Guowu Yang, Yujie Hao, Qingbin Luo, and Yuqi Wang. "Security analysis of multi-party quantum private comparison protocol by model checking." Modern Physics Letters B 29, no. 18 (July 10, 2015): 1550089. http://dx.doi.org/10.1142/s021798491550089x.
Повний текст джерелаUr Rehman, Shafiq, and Aamer Nadeem. "An Approach to Model Based Testing of Multiagent Systems." Scientific World Journal 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/925206.
Повний текст джерелаLi, Jiguo, Shengzhou Hu, and Yichen Zhang. "Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key." Security and Communication Networks 2018 (October 21, 2018): 1–10. http://dx.doi.org/10.1155/2018/8738960.
Повний текст джерелаOniga, Bogdan, Leon Denis, Vasile Dadarlat, and Adrian Munteanu. "Message-Based Communication for Heterogeneous Internet of Things Systems." Sensors 20, no. 3 (February 6, 2020): 861. http://dx.doi.org/10.3390/s20030861.
Повний текст джерелаTu, Zhe, Huachun Zhou, Kun Li, Haoxiang Song, and Yuzheng Yang. "A Blockchain-Enabled Trusted Protocol Based on Whole-Process User Behavior in 6G Network." Security and Communication Networks 2022 (October 11, 2022): 1–12. http://dx.doi.org/10.1155/2022/8188977.
Повний текст джерелаLuo, Yun, Yuling Chen, Tao Li, Yilei Wang, Yixian Yang, and Xiaomei Yu. "An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model." Journal of Organizational and End User Computing 34, no. 10 (June 24, 2022): 1–17. http://dx.doi.org/10.4018/joeuc.306752.
Повний текст джерелаDang, Lanjun, Jie Xu, Xuefei Cao, Hui Li, Jie Chen, Yueyu Zhang, and Xiaotong Fu. "Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks." International Journal of Distributed Sensor Networks 14, no. 4 (April 2018): 155014771877254. http://dx.doi.org/10.1177/1550147718772545.
Повний текст джерелаSaleh Insani, Rachmat Wahid, and Reza Pulungan. "Pemodelan dan Verifikasi Formal Protokol EE-OLSR dengan UPPAAL CORA." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 10, no. 1 (January 31, 2016): 93. http://dx.doi.org/10.22146/ijccs.11192.
Повний текст джерелаONATSKIY, A. V. "CRYPTOGRAPHIC AUTHENTICATION PROTOCOL ZERO-KNOWLEDGE SECRET ON ELLIPTIC CURVES USING PUBLIC KEYS AND RANDOM MESSAGES." Digital Technologies 26 (2019): 22–28. http://dx.doi.org/10.33243/2313-7010-26-22-28.
Повний текст джерелаCastañeda, María, Mercedes G. Merayo, Juan Boubeta-Puig, and Iván Calvo. "MODELFY: A Model-driven Solution for Decision Making based on Fuzzy Information." JUCS - Journal of Universal Computer Science 28, no. 5 (May 28, 2022): 445–74. http://dx.doi.org/10.3897/jucs.76030.
Повний текст джерелаAribi, Noureddine, and Yahia Lebbah. "A SAT-Based Planning Approach for Finding Logical Attacks on Cryptographic Protocols." International Journal of Information Security and Privacy 14, no. 4 (October 2020): 1–21. http://dx.doi.org/10.4018/ijisp.2020100101.
Повний текст джерелаVan Anh Duong, Dat, and Seokhoon Yoon. "A Human Location Prediction-Based Routing Protocol in Mobile Crowdsensing-Based Urban Sensor Networks." Applied Sciences 12, no. 8 (April 12, 2022): 3898. http://dx.doi.org/10.3390/app12083898.
Повний текст джерелаLi, Quanrun, Ching-Fang Hsu, Kim-Kwang Raymond Choo, and Debiao He. "A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks." Security and Communication Networks 2019 (December 4, 2019): 1–13. http://dx.doi.org/10.1155/2019/7871067.
Повний текст джерелаAdams, Richard H., and Todd A. Castoe. "Supergene validation: A model-based protocol for assessing the accuracy of non-model-based supergene methods." MethodsX 6 (2019): 2181–88. http://dx.doi.org/10.1016/j.mex.2019.09.025.
Повний текст джерелаHuo, Lin, Yi Lin Jiang, and Liang Qing Hu. "Research on Hash-Based Low-Cost RFID Security Authentication Protocol." Advanced Materials Research 846-847 (November 2013): 1524–30. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1524.
Повний текст джерелаSabor, Nabil, Shigenobu Sasaki, Mohammed Abo-Zahhad, and Sabah M. Ahmed. "A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions." Wireless Communications and Mobile Computing 2017 (2017): 1–23. http://dx.doi.org/10.1155/2017/2818542.
Повний текст джерелаOh, JiHyeon, SungJin Yu, JoonYoung Lee, SeungHwan Son, MyeongHyun Kim, and YoungHo Park. "A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes." Sensors 21, no. 4 (February 21, 2021): 1488. http://dx.doi.org/10.3390/s21041488.
Повний текст джерела