咨询与建议

限定检索结果

文献类型

  • 6 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 10 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 6 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 5 篇 信息与通信工程
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
    • 1 篇 软件工程
  • 1 篇 理学
    • 1 篇 物理学

主题

  • 10 篇 tcp/ip protocols
  • 3 篇 security
  • 2 篇 authentication
  • 1 篇 internet of thin...
  • 1 篇 intrusion detect...
  • 1 篇 mobility managem...
  • 1 篇 polarization
  • 1 篇 space communicat...
  • 1 篇 deep space commu...
  • 1 篇 reliability
  • 1 篇 internet of thin...
  • 1 篇 labview
  • 1 篇 unix network pro...
  • 1 篇 tcpip
  • 1 篇 satellite commun...
  • 1 篇 artificial immun...
  • 1 篇 detectors genera...
  • 1 篇 automation
  • 1 篇 intra-vehicular ...
  • 1 篇 anomaly detectio...

机构

  • 1 篇 univ malaysia pa...
  • 1 篇 aachen tech univ...
  • 1 篇 univ wolverhampt...
  • 1 篇 univ oklahoma sc...
  • 1 篇 russian acad sci...
  • 1 篇 univ roma tor ve...
  • 1 篇 polish japanese ...
  • 1 篇 univ calif santa...
  • 1 篇 st petersburg na...
  • 1 篇 northern border ...
  • 1 篇 consejo nacl cie...
  • 1 篇 polish acad sci ...
  • 1 篇 fairleigh dickin...
  • 1 篇 new jersey inst ...
  • 1 篇 ctr invest opt c...
  • 1 篇 unc-chapel hill ...
  • 1 篇 univ guanajuato ...
  • 1 篇 univ autonoma ta...
  • 1 篇 sri sairam inst ...
  • 1 篇 galgotias univ g...

作者

  • 1 篇 pillai prashant
  • 1 篇 rojas-laguna r.
  • 1 篇 atiquzzaman moha...
  • 1 篇 rahman md. arafa...
  • 1 篇 roseti cesare
  • 1 篇 zhao hong
  • 1 篇 hernandez-garcia...
  • 1 篇 anand m. vivek
  • 1 篇 karim mahima
  • 1 篇 tan sze wei
  • 1 篇 barron-zambrano ...
  • 1 篇 martinez-angulo ...
  • 1 篇 alenezi ali h.
  • 1 篇 john mchugh
  • 1 篇 branitskiy alexa...
  • 1 篇 jauregui vazquez...
  • 1 篇 pottiez o.
  • 1 篇 lauterio-cruz j....
  • 1 篇 h. m. abdel-waha...
  • 1 篇 santarrosa-rodri...

语言

  • 10 篇 英文
检索条件"主题词=TCP/IP Protocols"
10 条 记 录,以下是1-10 订阅
排序:
Intra-Vehicular Communication Protocol for IoT Enabled Vehicle Health Monitoring System: Challenges, Issues, and Solutions
收藏 引用
IEEE ACCESS 2024年 12卷 95309-95337页
作者: Karim, Mahima Rahman, Md. Arafatur Tan, Sze Wei Atiquzzaman, Mohammed Pillai, Prashant Alenezi, Ali H. Univ Malaysia Pahang Fac Comp Pekan 26600 Pahang Malaysia Univ Wolverhampton Sch Engn Comp & Math Sci Wolverhampton WV1 1LY England Univ Oklahoma Sch Comp Sci Norman OK 73019 USA Univ Wolverhampton Sch Math & Comp Sci Wolverhampton WV1 1LY England Northern Border Univ Dept Elect Engn Remote Sensing Unit Ar Ar 73222 Saudi Arabia
IoT is a groundbreaking technology that enables wireless interoperability between devices without human intervention. It has become an integral part of human life and has made significant advancements in the automotiv... 详细信息
来源: 评论
Automated data acquisition system for the study of the characteristics of temporal-spectral evolution in a F8L  22
Automated data acquisition system for the study of the chara...
收藏 引用
22nd Annual Conference on Novel Optical Systems, Methods, and Applications XXII
作者: Martinez-Angulo, J. R. Hernandez-Garcia, J. C. Barron-Zambrano, J. H. Filoteo-Razo, J. D. Jauregui Vazquez, D. Estudillo-Ayala, J. M. Lauterio-Cruz, J. P. Pottiez, O. Santarrosa-Rodriguez, S. Rojas-Laguna, R. Univ Guanajuato DICIS Dept Elect Carr Salamanca Valle Santiago Km 3-5-1-8 Salamanca 36885 Gto Mexico Consejo Nacl Ciencia & Technol Ave Insurgentes 1582 Mexico City 03940 DF Mexico Univ Autonoma Tamaulipas UAT Calle Matamoros SN Victoria 87000 Tamaulipas Mexico Ctr Invest Opt CIO Loma Bosque 115 Leon 37150 Gto Mexico
For remote data acquisition, the integration of optical and electronic instrumentation systems (OSA, oscilloscope, polarimeter) is proposed, reaching automation through control protocols (tcp/ip). A graphical interfac... 详细信息
来源: 评论
Software Tool for Testing the Packet Analyzer of Network Attack Detection Systems  18
Software Tool for Testing the Packet Analyzer of Network Att...
收藏 引用
11th International Conference on Security of Information and Networks (SIN)
作者: Branitskiy, Alexander Kotenko, Igor Russian Acad Sci St Petersburg Inst Informat & Automat 14-th Liniya39 St Petersburg 199178 Russia St Petersburg Natl Res Univ Informat Technol Mech 49 Kronverkskiy Prospekt St Petersburg Russia
The paper is devoted to a model, technique and software tool for testing network attack detection systems (ADSs) from the point of view of the correct functioning of their internal packet analyzer. A client-server arc... 详细信息
来源: 评论
IDS Based Network Security Architecture with tcp/ip Parameters using Machine Learning
IDS Based Network Security Architecture with TCP/IP Paramete...
收藏 引用
International Conference on Computing, Power and Communication Technologies (GUCON)
作者: Ponmaniraj, S. Rashmi, R. Anand, M. Vivek Galgotias Univ Greater Noida Uttar Pradesh India Sri Sairam Inst Technol Chennai Tamil Nadu India
This computer era leads human to interact with computers and networks but there is no such solution to get rid of security problems. Securities threats misleads internet, we are sometimes losing our hope and reliabili... 详细信息
来源: 评论
Detecting Covert Channels in Computer Networks Based on Chaos Theory
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2013年 第2期8卷 273-282页
作者: Zhao, Hong Shi, Yun-Qing Fairleigh Dickinson Univ Teaneck NJ 07670 USA New Jersey Inst Technol Newark NJ 07102 USA
Covert channels via the widely used tcp/ip protocols have become a new challenging issue for network security. In this paper, we analyze the information hiding in tcp/ip protocols and propose a new effective method to... 详细信息
来源: 评论
A DTN-oriented protocol design for satellite based architectures
A DTN-oriented protocol design for satellite based architect...
收藏 引用
5th Advanced Satellite Multimedia Systems Conference / 11th Signal Processing for Space Communications Workshop (ASMS/SPSC)
作者: Luglio, Michele Roseti, Cesare De Cola, Tomaso Univ Roma Tor Vergata Dept Elect Engn Via Politecn 1 I-00133 Rome Italy DLR Inst Commun & Nav D-82230 Wessling Germany
Several communication environments, supporting important operational scenarios such as deep space communications, Earth observation and mobile terrestrial communications, are extremely challenging for traditional tcp/... 详细信息
来源: 评论
Anomaly detection in tcp/ip networks using immune systems paradigm
收藏 引用
COMPUTER COMMUNICATIONS 2007年 第4期30卷 740-749页
作者: Seredynski, Franciszek Bouvry, Pascal Polish Japanese Inst Informat Technol PL-02008 Warsaw Poland Polish Acad Sci Inst Comp Sci PL-01237 Warsaw Poland Luxembourg Univ Fac Sci Technol & Commun L-1359 Luxembourg Kirchberg Luxembourg
The paper presents an architecture of an anomaly detection system based on the paradigm of artificial immune systems (AISs). Incoming network traffic data are considered by the system as signatures of potential attack... 详细信息
来源: 评论
A topological characterization of tcp/ip security
收藏 引用
12th International Symposium of Formal Methods Europe
作者: Vigna, G Univ Calif Santa Barbara Dept Comp Sci Reliable Software Grp Santa Barbara CA 93106 USA
The tcp/ip protocol suite has been designed to provide a simple, open communication infrastructure in an academic, collaborative environment. Therefore, the tcp/ip protocols are not able to provide the authentication,... 详细信息
来源: 评论
A transport protocol for native mode ATM networks design and implementation
收藏 引用
COMPUTER COMMUNICATIONS 1998年 第12期21卷 1080-1089页
作者: Karabek, R Scholz, M Aachen Tech Univ Aachen Germany
Despite the increased bandwidth and the Quality of Service (QoS) capabilities of ATM networks, measurements show that only a fraction of the available bandwidth can be used by applications with current approaches for ... 详细信息
来源: 评论
Heuristic authentication protocol for tcp/ip network applications under UNIX  30
Heuristic authentication protocol for TCP/IP network applica...
收藏 引用
Proceedings of the 30th annual Southeast regional conference
作者: A. H. Wadaa H. M. Abdel-Wahab John McHugh Old Dominion University Norfolk Virginia UNC-Chapel Hill Chapel Hill N.C.
Networking has brought about the potential of distributed applications to the user. Typically in such applications there are several different interacting processes that run in multiple hosts and communicate across th... 详细信息
来源: 评论