Статті в журналах з теми "Packet trace"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Packet trace".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Yang, Ming Hour. "Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/239280.
ARYANTA, DWI, and BAYU AGUNG PRANATA. "Perancangan dan Analisis Redistribution Routing Protocol OSPF dan EIGRP." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 2, no. 2 (July 1, 2014): 85. http://dx.doi.org/10.26760/elkomika.v2i2.85.
Pang, Ruoming, Mark Allman, Vern Paxson, and Jason Lee. "The devil and packet trace anonymization." ACM SIGCOMM Computer Communication Review 36, no. 1 (January 10, 2006): 29–38. http://dx.doi.org/10.1145/1111322.1111330.
Dennis, Simone, and Helen Alexiou. "(Re)making smoking: Of packets and practice." Journal of Material Culture 23, no. 4 (September 29, 2018): 459–71. http://dx.doi.org/10.1177/1359183518799537.
ARYANTA, DWI, ARSYAD RAMADHAN DARLIS, and DIMAS PRIYAMBODHO. "Analisis Kinerja EIGRP dan OSPF pada Topologi Ring dan Mesh." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 2, no. 1 (January 1, 2014): 53. http://dx.doi.org/10.26760/elkomika.v2i1.53.
Paxson, Vern. "Automated packet trace analysis of TCP implementations." ACM SIGCOMM Computer Communication Review 27, no. 4 (October 1997): 167–79. http://dx.doi.org/10.1145/263109.263160.
Et. al., Dr B. Shadaksharappa,. "Attack Prediction By Using Greedy Algorithm For Diminishing The Drop And Delay In Wireless Sensor Networks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 11, 2021): 1072–82. http://dx.doi.org/10.17762/turcomat.v12i6.2425.
Memon, Mudasar Latif, Mukesh Kumar Maheshwari, Navrati Saxena, Abhishek Roy, and Dong Ryeol Shin. "Artificial Intelligence-Based Discontinuous Reception for Energy Saving in 5G Networks." Electronics 8, no. 7 (July 11, 2019): 778. http://dx.doi.org/10.3390/electronics8070778.
Spiekermann, Daniel, and Jörg Keller. "Requirements for Crafting Virtual Network Packet Captures." Journal of Cybersecurity and Privacy 2, no. 3 (July 6, 2022): 516–26. http://dx.doi.org/10.3390/jcp2030026.
Liu, X., J. Xu, J. Yue, and S. L. Vadas. "Numerical modeling study of the momentum deposition of small amplitude gravity waves in the thermosphere." Annales Geophysicae 31, no. 1 (January 3, 2013): 1–14. http://dx.doi.org/10.5194/angeo-31-1-2013.
Bhuvaneshwari, P., and T. R. Jaya Chandra Lekha. "Design of Advanced High Performance Bus Tracer in System on Chip Using Matrix Based Compression for Low Power Applications." Journal of Computational and Theoretical Nanoscience 17, no. 4 (April 1, 2020): 1852–56. http://dx.doi.org/10.1166/jctn.2020.8453.
Lan, Haoliang, Jie Xu, Qun Wang, and Wei Ding. "Packet Loss Measurement Based on Sampled Flow." Symmetry 13, no. 11 (November 10, 2021): 2149. http://dx.doi.org/10.3390/sym13112149.
Jiang, Xi, Shinan Liu, Aaron Gember-Jacobson, Arjun Nitin Bhagoji, Paul Schmitt, Francesco Bronzino, and Nick Feamster. "NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation." Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, no. 1 (February 16, 2024): 1–32. http://dx.doi.org/10.1145/3639037.
Jiang, Xi, Shinan Liu, Aaron Gember-Jacobson, Arjun Nitin Bhagoji, Paul Schmitt, Francesco Bronzino, and Nick Feamster. "NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation." ACM SIGMETRICS Performance Evaluation Review 52, no. 1 (June 11, 2024): 85–86. http://dx.doi.org/10.1145/3673660.3655071.
Roughan, Matt. "Public review for the devil and packet trace anonymization." ACM SIGCOMM Computer Communication Review 36, no. 1 (January 10, 2006): 27–28. http://dx.doi.org/10.1145/1111322.1111329.
Chen, Jian, Siyu Kuai, Guoliang Chen, Lihua Yu, and Qiwen Zhan. "Dynamical Modulation of Transverse Orbital Angular Momentum in Highly Confined Spatiotemporal Optical Vortex." Photonics 10, no. 2 (January 31, 2023): 148. http://dx.doi.org/10.3390/photonics10020148.
Ma, Naji, and Ming Diao. "CoFi: Coding-Assisted File Distribution over a Wireless LAN." Symmetry 11, no. 1 (January 10, 2019): 71. http://dx.doi.org/10.3390/sym11010071.
Yatskih, Alex, Yuri Yermolaev, Aleksandr Kosinov, and Nikolay Semionov. "Wave Packet Excitation and its Development in Supersonic Boundary Layer." Siberian Journal of Physics 8, no. 2 (June 1, 2013): 70–78. http://dx.doi.org/10.54362/1818-7919-2013-8-2-70-78.
Karande, Shirish S., Kiran Misra, and Hayder Radha. "Survival of the Fittest: An Active Queue Management Technique for Noisy Packet Flows." Advances in Multimedia 2007 (2007): 1–10. http://dx.doi.org/10.1155/2007/64695.
Mustapha, Oba Zubair, Muhammad Ali, Yim Fun Hu, and Raed A. Abd-Alhameed. "Service-aware LSP selection with fuzzy based packet scheduling scheme for non-real time traffics." International Journal of Informatics and Communication Technology (IJ-ICT) 10, no. 2 (August 1, 2021): 126. http://dx.doi.org/10.11591/ijict.v10i2.pp126-139.
Alyami, Mnassar, Abdulmajeed Alghamdi, Mohammed A. Alkhowaiter, Cliff Zou, and Yan Solihin. "Random Segmentation: New Traffic Obfuscation against Packet-Size-Based Side-Channel Attacks." Electronics 12, no. 18 (September 9, 2023): 3816. http://dx.doi.org/10.3390/electronics12183816.
Obeidat, Ibrahim, Ala Mughaid, and Shadi Alzoubi. "A Secure Encrypted Protocol for Clients' Handshaking in the Same Network." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 05 (May 21, 2019): 47. http://dx.doi.org/10.3991/ijim.v13i05.9845.
Ibrahim, Idris Skloul, Peter J. B. King, and Hans-Wolfgang Loidl. "NsGTFA: A GUI Tool to Easily Measure Network Performance through the Ns2 Trace File." Journal of Intelligent Systems 24, no. 4 (December 1, 2015): 467–77. http://dx.doi.org/10.1515/jisys-2014-0153.
Dong, Wei. "IPMT, an IPv6 Packet Manipulation Tool: Design Considerations and Applications." Applied Mechanics and Materials 543-547 (March 2014): 3040–43. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3040.
Miyim, Abubakar Muhammad. "Techniques for Throughput Enhancement in Wireless Networks." Journal of Communications Technology, Electronics and Computer Science 4 (February 16, 2016): 1. http://dx.doi.org/10.22385/jctecs.v4i0.11.
AlArnaout, Zakwan, Nour Mostafa, Samer Alabed, Wael Hosny Fouad Aly, and Ahmed Shdefat. "RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks." Sensors 23, no. 1 (December 22, 2022): 102. http://dx.doi.org/10.3390/s23010102.
Rusek, Krzysztof, Lucjan Janowski, and Zdzisław Papir. "Transient and stationary characteristics of a packet buffer modelled as an MAP/SM/1/b system." International Journal of Applied Mathematics and Computer Science 24, no. 2 (June 26, 2014): 429–42. http://dx.doi.org/10.2478/amcs-2014-0033.
Ohkuwa, Y., and T. Kitazoe. "Wave Packet in Quantum Cosmology and Definition of Semiclassical Time." International Journal of Modern Physics A 12, no. 05 (February 20, 1997): 859–71. http://dx.doi.org/10.1142/s0217751x97000657.
Tanveer Baig, Z., and Chandrasekar Shastry. "Smart Hybridized Routing Protocol for Animal Monitoring and Tracking Applications." Scalable Computing: Practice and Experience 23, no. 4 (December 23, 2022): 339–49. http://dx.doi.org/10.12694/scpe.v23i4.2040.
Lin, Yi-Bing. "Parallel trace-driven simulation for packet loss in finite-buffered voice multiplexers." Parallel Computing 19, no. 2 (February 1993): 219–28. http://dx.doi.org/10.1016/0167-8191(93)90051-l.
Lin, Yi-Bing. "Parallel trace-driven simulation of packet-switched multiplexer under priority scheduling policy." Information Processing Letters 47, no. 4 (September 1993): 197–201. http://dx.doi.org/10.1016/0020-0190(93)90032-5.
Peng, Han Chuan, Li Feng Sha, Qiang Gan, and Yu Wei. "Combining adaptive sigmoid packet and trace neural network for fast invariance-learning." Electronics Letters 34, no. 9 (1998): 898. http://dx.doi.org/10.1049/el:19980667.
Marciniak, Marian. "Towards broadband global optical and wireless networking." Journal of Telecommunications and Information Technology, no. 3 (September 30, 2004): 1–6. http://dx.doi.org/10.26636/jtit.2004.3.249.
RAHMIATI, PAULINE, DWI ARYANTA, and TAUFIQ AGUNG PRIYADI. "Perancangan dan Analisis Perbandingan Implementasi OSPF pada Jaringan IPv4 dan IPv6." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 2, no. 1 (January 1, 2014): 40. http://dx.doi.org/10.26760/elkomika.v2i1.40.
Galiana-Merino, J. J., S. Parolai, and J. Rosa-Herranz. "Seismic wave characterization using complex trace analysis in the stationary wavelet packet domain." Soil Dynamics and Earthquake Engineering 31, no. 11 (November 2011): 1565–78. http://dx.doi.org/10.1016/j.soildyn.2011.06.009.
SAHNI, SARTAJ, and KUN SUK KIM. "EFFICIENT DYNAMIC LOOKUP FOR BURSTY ACCESS PATTERNS." International Journal of Foundations of Computer Science 15, no. 04 (August 2004): 567–91. http://dx.doi.org/10.1142/s0129054104002625.
Mishra, Abhishek kumar, Sara Ayoubi, Giulio Grassi, and Renata Teixeira. "NemFi." ACM SIGCOMM Computer Communication Review 51, no. 3 (July 11, 2021): 2–8. http://dx.doi.org/10.1145/3477482.3477484.
S. Raj, Jennifer, and Abul Basar. "QOS OPTIMIZATION OF ENERGY EFFICIENT ROUTING IN IOT WIRELESS SENSOR NETWORKS." Journal of ISMAC 01, no. 01 (June 9, 2019): 12–23. http://dx.doi.org/10.36548/jismac.2019.1.002.
Jan, Naveed, Ali Al-Bayatti, Naseer Alalwan, and Ahmed Alzahrani. "An Enhanced Source Location Privacy based on Data Dissemination in Wireless Sensor Networks (DeLP)." Sensors 19, no. 9 (May 2, 2019): 2050. http://dx.doi.org/10.3390/s19092050.
Peng, Guang-Qian, Guangtao Xue, and Yi-Chao Chen. "Network Measurement and Performance Analysis at Server Side." Future Internet 10, no. 7 (July 16, 2018): 67. http://dx.doi.org/10.3390/fi10070067.
Zhao, Ning, Xue Li, Mei Yang, and Xin Ting Huang. "Vehicular Ad-Hoc Network and Routing Design." Applied Mechanics and Materials 641-642 (September 2014): 829–32. http://dx.doi.org/10.4028/www.scientific.net/amm.641-642.829.
Chiesa, Marco, and Fábio L. Verdi. "Network Monitoring on Multi-Pipe Switches." Proceedings of the ACM on Measurement and Analysis of Computing Systems 7, no. 1 (February 27, 2023): 1–31. http://dx.doi.org/10.1145/3579321.
Bhaumik, Mani L. "Is the Quantum State Real in the Hilbert Space Formulation?" Quanta 9, no. 1 (December 19, 2020): 37–46. http://dx.doi.org/10.12743/quanta.v9i1.142.
Ryzhov, Oleg S., and Sergey V. Timofeev. "Interaction of a potential vortex with a local roughness on a smooth surface." Journal of Fluid Mechanics 287 (March 25, 1995): 21–58. http://dx.doi.org/10.1017/s002211209500084x.
Ware, Christopher, and Joe Chicharo. "Simulating capture behaviour in 802.11 radio modems." Journal of Telecommunications and Information Technology, no. 3 (September 30, 2001): 46–54. http://dx.doi.org/10.26636/jtit.2001.3.68.
Aleroud, Ahmed, Fan Yang, Sai Chaithanya Pallaprolu, Zhiyuan Chen, and George Karabatis. "Anonymization of Network Traces Data through Condensation-based Differential Privacy." Digital Threats: Research and Practice 2, no. 4 (December 31, 2021): 1–23. http://dx.doi.org/10.1145/3425401.
Saputra, I. Wayan Adi, and I. Komang Ari Mogi. "Performance Analysis of MANET Proactive and Reactive Routing Protocols Using Network Simulator 2." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 8, no. 3 (January 25, 2020): 251. http://dx.doi.org/10.24843/jlk.2020.v08.i03.p06.
de Prost, Nicolas, Bruno Mégarbane, Frank Questel, Vanessa Bloch, Delphine Cantin Bertaux, Jean Louis Pourriat, and Antoine Rabbat. "Blood cocaine and metabolite pharmacokinetics after cardiac arrest in a body-packer case." Human & Experimental Toxicology 29, no. 1 (November 19, 2009): 49–53. http://dx.doi.org/10.1177/0960327109354940.
Shidaganti, Ganeshayya Ishwarayya, Amogh Shreedhar Inamdar, Sindhuja V. Rai, and Anagha M. Rajeev. "SCEF: A Model for Prevention of DDoS Attacks From the Cloud." International Journal of Cloud Applications and Computing 10, no. 3 (July 2020): 67–80. http://dx.doi.org/10.4018/ijcac.2020070104.
Gupta, Neha, Pradeep Kumar Juneja, Sachin Sharma, and Umang Garg. "A proposed customized architecture for 5G-IoT based smart healthcare system: 5G-IoT-SHS." Journal of Information and Optimization Sciences 44, no. 6 (2023): 1179–94. http://dx.doi.org/10.47974/jios-1456.