Showing 801 - 809 results of 809 for search '"Internet Protocol"', query time: 0.16s Refine Results
  1. 801

    An Edge-Fog Secure Self-Authenticable Data Transfer Protocol by Algimantas Venčkauskas, Nerijus Morkevicius, Vaidas Jukavičius, Robertas Damaševičius, Jevgenijus Toldinas, Šarūnas Grigaliūnas

    Published 2019-08-01
    “…The traditional Internet protocols are not very well suited for constrained devices comprising localized network nodes with tens of devices primarily communicating with each other (e.g., various sensors in Body Area Network communicating with each other). …”
    Get full text
    Article
  2. 802

    Practical autoencoder based anomaly detection by using vector reconstruction error by Hasan Torabi, Seyedeh Leili Mirtaheri, Sergio Greco

    Published 2023-01-01
    “…Cloud computing services are available through common internet protocols and network standards. In addition to the unique benefits of cloud computing, insecure communication and attacks on cloud networks cannot be ignored. …”
    Get full text
    Article
  3. 803

    An Empirical Study of Deep Learning-Based SS7 Attack Detection by Yuejun Guo, Orhan Ermis, Qiang Tang, Hoang Trang, Alexandre De Oliveira

    Published 2023-09-01
    “…Signalling System No. 7 (SS7), Diameter, and GPRS Tunneling Protocol (GTP) are the main protocols used in 2G to 4G, while 5G uses standard Internet protocols for its signalling. Despite their distinct features, and especially their security guarantees, they are most vulnerable to attacks in roaming scenarios: the attacks that target the location update function call for subscribers who are located in a visiting network. …”
    Get full text
    Article
  4. 804

    Personal Protective Equipment and Donning and Doffing Techniques in the Cardiac Catheterization Laboratory During the COVID-19 Pandemic: Insights From an Internet Search for Protoc... by Justin Haloot, Omar Sheikh, Fatima Dollar, Heta Javeri, Hendre Jeannetta Fichardt, Gail Fernandes, Marlene Garcia, Anand Prasad

    Published 2021-05-01
    “…This study aims to provide an overview of current PPE donning and doffing protocols specific to the catheterization laboratory.Methods: A series of internet searches regarding donning and doffing of PPE in the CCL including published articles and internet protocols were compiled and compared using Pubmed.gov, Google.com, www.twitter.com, and www.youtube.com.Results: Most institutions used N95 masks, shoe covers, at least one head covering, face shield or goggles, two pairs of gloves, and inner and outer gowns. …”
    Get full text
    Article
  5. 805
  6. 806

    تأثير البروتوكولات الاستباقية والتفاعلية والهجينة على أداء الشبكات اللاسلكية MANET by محمد حجازية, معين يونس, بشار عباس

    Published 2017-07-01
    “…Routing protocols of mobile ad-hoc networks differ from the existing internet protocols which are designed for the fixed structure based wireless networks. …”
    Get full text
    Article
  7. 807

    Pengembangan Sistem Evaluasi Kegiatan Belajar Mengajar Berbasis Web Studi Kasus : di SMA Negeri 1 Surakarta by Emi Budi Susilowati, Ahmad Ashari

    Published 2013-07-01
    “…Web services are built on the core Internet protocols are TCP / IP and HTTP. In the teaching and learning activities that are known to an evaluation of student learning outcomes as a measurement of achievement, that mastery of the subject matter in accordance with established competencies. …”
    Get full text
    Article
  8. 808

    Network Coding Meets TCP: Theory and Implementation by Sundararajan, Jay Kumar, Shah, Devavrat, Medard, Muriel, Jakubczak, Szymon Kazimierz, Mitzenmacher, Michael, Barros, Joao

    Published 2012
    “…To realize these benefits in practice, we need to understand how coding across packets interacts with the acknowledgment (ACK)-based flow control mechanism that forms a central part of today's Internet protocols such as transmission control protocol (TCP). …”
    Get full text
    Get full text
    Get full text
    Article
  9. 809

    An effective architecture for discovery and composition of semantic web services by Hassan Tabatabaei, Sayed Gholam, Wan Kadir, Wan Mohd. Nasir, Ibrahim, Suhaimi

    Published 2008
    “…These systems may then interact with the Web service in a manner prescribed by its definition, using XML based messages conveyed by Internet protocols "(Austin, Barbir, Ferris, and Garg, 2004). …”
    Book Section