Search

Showing total 93 results

Search Constraints

Start Over You searched for: Topic computer network protocols Remove constraint Topic: computer network protocols Publication Year Range This year Remove constraint Publication Year Range: This year
93 results

Search Results

1. Digital Twin Technology-Based Networking Solution in Low Earth Orbit Satellite Constellations.

2. Detecting Brute Force Attacks on SSH and FTP Protocol Using Machine Learning: A Survey.

3. Editorial: Long-range dependent processes: theory and applications, volume II.

4. Performance Impact of Nested Congestion Control on Transport-Layer Multipath Tunneling.

5. A Secure Opportunistic Network with Efficient Routing for Enhanced Efficiency and Sustainability.

6. A Traffic-Aware and Cluster-Based Energy Efficient Routing Protocol for IoT-Assisted WSNs.

7. Q-RPL: Q-Learning-Based Routing Protocol for Advanced Metering Infrastructure in Smart Grids.

8. Protecting Instant Messaging Notifications against Physical Attacks: A Novel Instant Messaging Notification Protocol Based on Signal Protocol.

9. Constrained Flooding Based on Time Series Prediction and Lightweight GBN in BLE Mesh.

10. A Secure Protocol Authentication Method Based on the Strand Space Model for Blockchain-Based Industrial Internet of Things.

11. MSFuzz: Augmenting Protocol Fuzzing with Message Syntax Comprehension via Large Language Models.

12. Cooperative Communication Based Protocols for Underwater Wireless Sensors Networks: A Review.

13. An empirical study of reflection attacks using NetFlow data.

14. Enhancement of Data Center Transmission Control Protocol Performance in Network Cloud Environments.

15. A Method for Solving Problems in Acquiring Communication Logs on End Hosts.

16. Analysis and Performance Comparison of IoT Message Transfer Protocols Applying in Real Photovoltaic System.

17. SEKad: a scalable protocol for blockchain networks with enhanced broadcast efficiency.

18. Design of a distributed offloading and real-time data unified access platform for IoT within command and control communication networks.

19. MuChat against active attacks, passive attacks, and traffic analysis methods: a free convert chat application for instant communication on mobile.

20. Robust H ∞ Static Output Feedback Control for TCP/AQM Routers Based on LMI Optimization.

21. Distributed convex optimization of higher order nonlinear uncertain multi-agent systems with switched parameters and topologies.

22. Additively Composite Model Objective Function for Routing Protocol for Low-Power and Lossy Network Protocol.

23. A Novel Protocol Using Captive Portals for FIDO2 Network Authentication †.

24. HSM4SSL: Leveraging HSMs for Enhanced Intra-Domain Security †.

25. A multi-objective optimized OLSR routing protocol.

26. Enhancing Wireless Sensor Network in Structural Health Monitoring through TCP/IP Socket Programming-Based Mimic Broadcasting: Experimental Validation.

27. Real-Time Defect Detection in Electronic Components during Assembly through Deep Learning.

28. Committee-Based Blockchains as Games between Opportunistic Players and Adversaries.

29. Enhancing Security and Trust in Internet of Things through Meshtastic Protocol Utilising Low-Range Technology.

30. On the Performance Evaluation of Protocol State Machine Reverse Engineering Methods.

31. uw -WiFi: Small-Scale Data Collection Network-Based Underwater Internet of Things.

32. Forensics Analysis of Cloud-Computing Traffics.

33. Examination of Traditional Botnet Detection on IoT-Based Bots.

34. Application-Layer Anomaly Detection Leveraging Time-Series Physical Semantics in CAN-FD Vehicle Networks.

35. Modbus Extension Server Implementation for BIoT-Enabled Smart Switch Embedded System Device.

36. An Energy-Saving and Environment-Friendly Networked Intelligent Door Lock System for Offices.

37. Seguridad en Redes Ad Hoc: Implementación de Protocolos de Comunicación Usando Criptografía de Clave Pública.

38. Successive observation oriented scheduling and task planning of heterogeneous constellation.

39. Network Time Protocol based Black Box Timing Accuracy Analysis for Internet of Things Devices.

40. Mobility‐compatible cache controlled cluster networking protocol.

41. Key distribution scheme for preventing key reinstallation attack in wireless networks.

42. Network performance analysis in wireless sensor network using modified LEACH protocols using network simulator 2.

43. Taylor political optimizer‐based cluster head selection in IOT‐assisted WSN networks.

44. Impact of noise on data routing in flying Ad hoc networks.

45. Protocols for Wireless Sensor Networks: A Survey.

46. Verification server for the assembly model of a block 3D-constractions on prolog.

47. On the security of a novel privacy‐preserving authentication scheme for V2G networks.

48. Sdn based emergency message dissemination protocol for IoV-Fog networks.

49. Effect of non-invasive neuromodulation techniques on vascular cognitive impairment: A Bayesian network meta-analysis protocol.

50. TortoiseBFT: An asynchronous consensus algorithm for IoT system.