-
241
Improved FSM-based method for protocol conformance testing
Published 2011-01-01Subjects: “…protocol engineering…”
Get full text
Article -
242
A chaotic digital signature algorithm based on a dynamic substitution box
Published 2025-01-01Subjects: Get full text
Article -
243
Using coverage analysis to extract Botnet command-and-control protocol
Published 2014-01-01Subjects: Get full text
Article -
244
Security analysis of security protocol Swift implementations based on computational model
Published 2018-09-01Subjects: “…security protocol…”
Get full text
Article -
245
Cooperation-based location authentication scheme for crowdsensing applications
Published 2022-09-01Subjects: “…distance-bounding protocol…”
Get full text
Article -
246
Mining and utilization of network protocol’s stealth attack behavior
Published 2017-10-01Subjects: “…protocol reverse analysis…”
Get full text
Article -
247
Autonomic grid architecture based on information pool protocol
Published 2008-01-01Subjects: Get full text
Article -
248
Universally composable secure trusted access protocol for WLAN Mesh networks
Published 2008-01-01Subjects: Get full text
Article -
249
Study of BGP secure scheme based on divide and conquer strategy
Published 2012-05-01Subjects: “…border gateway protocol security…”
Get full text
Article -
250
-
251
Cross-layer multi-channel MAC protocol combined with QoS search for cognitive wireless multi-hop networks
Published 2013-04-01Subjects: Get full text
Article -
252
Route optimization scheme for nested mobile networks based on extending neighbor discovery protocol
Published 2015-04-01Subjects: Get full text
Article -
253
-
254
Pseudo gossip routing algorithm based link stability in mobile ad hoc networks
Published 2008-01-01Subjects: Get full text
Article -
255
-
256
Delirium and Cognitive Screening in National Hip Fracture Registries: Scoping Review Protocol [version 2; peer review: 2 approved]
Published 2025-01-01Subjects: “…scoping review protocol…”
Get full text
Article -
257
Payload State Prediction Based on Real-Time IoT Network Traffic Using Hierarchical Clustering with Iterative Optimization
Published 2024-12-01Subjects: Get full text
Article -
258
The Use of Technetium-99m Radioactive Isotope in The Diagnosis and Treatment of Thyroid Diseases: A Review
Published 2025-01-01Subjects: Get full text
Article -
259
Research and implementation of reputation-based inter-domain routing selection mechanism
Published 2023-06-01Subjects: “…border gateway protocol…”
Get full text
Article -
260
Low duty cycle and low collision asynchronous MAC protocol for wireless sensor network
Published 2013-10-01Subjects: Get full text
Article