Search

Showing total 63 results

Search Constraints

Start Over You searched for: Topic computer network protocols Remove constraint Topic: computer network protocols Publication Year Range This year Remove constraint Publication Year Range: This year Database Complementary Index Remove constraint Database: Complementary Index
63 results

Search Results

1. Digital Twin Technology-Based Networking Solution in Low Earth Orbit Satellite Constellations.

2. Performance Impact of Nested Congestion Control on Transport-Layer Multipath Tunneling.

3. Committee-Based Blockchains as Games between Opportunistic Players and Adversaries.

4. A comprehensive survey of localization schemes and routing protocols with fault tolerant mechanism in UWSN- Recent progress and future prospects.

5. 6G-RUPA: A Flexible, Scalable, and Energy-Efficient User Plane Architecture for Next-Generation Mobile Networks.

6. A Traffic-Aware and Cluster-Based Energy Efficient Routing Protocol for IoT-Assisted WSNs.

7. Q-RPL: Q-Learning-Based Routing Protocol for Advanced Metering Infrastructure in Smart Grids.

8. Protecting Instant Messaging Notifications against Physical Attacks: A Novel Instant Messaging Notification Protocol Based on Signal Protocol.

9. Constrained Flooding Based on Time Series Prediction and Lightweight GBN in BLE Mesh.

10. An empirical study of reflection attacks using NetFlow data.

11. Cooperative Communication Based Protocols for Underwater Wireless Sensors Networks: A Review.

12. MSFuzz: Augmenting Protocol Fuzzing with Message Syntax Comprehension via Large Language Models.

13. A Secure Protocol Authentication Method Based on the Strand Space Model for Blockchain-Based Industrial Internet of Things.

14. Detecting Brute Force Attacks on SSH and FTP Protocol Using Machine Learning: A Survey.

15. A Secure Opportunistic Network with Efficient Routing for Enhanced Efficiency and Sustainability.

16. Enhancement of Data Center Transmission Control Protocol Performance in Network Cloud Environments.

17. Analysis and Performance Comparison of IoT Message Transfer Protocols Applying in Real Photovoltaic System.

18. SEKad: a scalable protocol for blockchain networks with enhanced broadcast efficiency.

19. Design of a distributed offloading and real-time data unified access platform for IoT within command and control communication networks.

20. MuChat against active attacks, passive attacks, and traffic analysis methods: a free convert chat application for instant communication on mobile.

21. A Method for Solving Problems in Acquiring Communication Logs on End Hosts.

22. Distributed convex optimization of higher order nonlinear uncertain multi-agent systems with switched parameters and topologies.

23. Robust H ∞ Static Output Feedback Control for TCP/AQM Routers Based on LMI Optimization.

24. HSM4SSL: Leveraging HSMs for Enhanced Intra-Domain Security †.

25. A Novel Protocol Using Captive Portals for FIDO2 Network Authentication †.

26. A multi-objective optimized OLSR routing protocol.

27. Enhancing Wireless Sensor Network in Structural Health Monitoring through TCP/IP Socket Programming-Based Mimic Broadcasting: Experimental Validation.

28. Real-Time Defect Detection in Electronic Components during Assembly through Deep Learning.

29. Key distribution scheme for preventing key reinstallation attack in wireless networks.

30. Network performance analysis in wireless sensor network using modified LEACH protocols using network simulator 2.

31. Editorial: Long-range dependent processes: theory and applications, volume II.

32. Enhancing Security and Trust in Internet of Things through Meshtastic Protocol Utilising Low-Range Technology.

33. On the Performance Evaluation of Protocol State Machine Reverse Engineering Methods.

34. uw -WiFi: Small-Scale Data Collection Network-Based Underwater Internet of Things.

35. Forensics Analysis of Cloud-Computing Traffics.

36. Examination of Traditional Botnet Detection on IoT-Based Bots.

37. Modbus Extension Server Implementation for BIoT-Enabled Smart Switch Embedded System Device.

38. Application-Layer Anomaly Detection Leveraging Time-Series Physical Semantics in CAN-FD Vehicle Networks.

39. An Energy-Saving and Environment-Friendly Networked Intelligent Door Lock System for Offices.

40. Seguridad en Redes Ad Hoc: Implementación de Protocolos de Comunicación Usando Criptografía de Clave Pública.

41. Taylor political optimizer‐based cluster head selection in IOT‐assisted WSN networks.

42. Impact of noise on data routing in flying Ad hoc networks.

43. Verification server for the assembly model of a block 3D-constractions on prolog.

44. RayNet: A Simulation Platform for Developing Reinforcement Learning-Driven Network Protocols.

45. K-LionER: meta-heuristic approach for energy efficient cluster based routing for WSN-assisted IoT networks.

46. On the security of a novel privacy‐preserving authentication scheme for V2G networks.

47. Sdn based emergency message dissemination protocol for IoV-Fog networks.

48. Effect of non-invasive neuromodulation techniques on vascular cognitive impairment: A Bayesian network meta-analysis protocol.

49. RAP-MAC: A Robust and Adaptive Pipeline MAC Protocol for Underwater Acoustic String Networks.

50. Characterizing edge-based doubly resolving sets within circulant networks Cn(1, 2).