Found: 2042
Select item for more details and to access through your institution.
Implementation of Lattice Theory into the TLS to Ensure Secure Traffic Transmission in IP Networks Based on IP PBX Asterisk.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 10, p. 749
- By:
- Publication type:
- Article
Decentralized Web3 Reshaping Internet Governance: Towards the Emergence of New Forms of Nation-Statehood?
- Published in:
- Future Internet, 2024, v. 16, n. 10, p. 361, doi. 10.3390/fi16100361
- By:
- Publication type:
- Article
Mobility–Multihoming Duality.
- Published in:
- Future Internet, 2024, v. 16, n. 10, p. 358, doi. 10.3390/fi16100358
- By:
- Publication type:
- Article
Online reprint request: Search, access, read, and update.
- Published in:
- Indian Journal of Dermatology, Venereology & Leprology, 2008, v. 74, n. 5, p. 537, doi. 10.4103/0378-6323.44335
- By:
- Publication type:
- Article
Perceptive driving assistant system for opencast mines during foggy weather.
- Published in:
- Mining Engineering, 2023, v. 75, n. 4, p. 44, doi. 10.1007/s42461-022-00678-x
- By:
- Publication type:
- Article
Semper Optiones: 21st Century Intelligence.
- Published in:
- Air & Space Power Journal, 2018, v. 32, n. 1, p. 21
- By:
- Publication type:
- Article
The Rise of IPv6.
- Published in:
- Air & Space Power Journal, 2015, v. 29, n. 2, p. 103
- By:
- Publication type:
- Article
TECHNOLOGY INTELLIGENCE: BASIS FOR SMART BUSINESS STRATEGIES.
- Published in:
- Futures Research Quarterly, 2005, v. 21, n. 3, p. 5
- By:
- Publication type:
- Article
Getting to grips with jitter.
- Published in:
- Electronics Systems & Software, 2007, v. 5, n. 2, p. 40, doi. 10.1049/ess:20070208
- By:
- Publication type:
- Article
All together now.
- Published in:
- Electronics Systems & Software, 2005, v. 3, n. 4, p. 34, doi. 10.1049/ess:20050406
- By:
- Publication type:
- Article
Obfuscation of Embedded Codes in Additive Manufactured Components for Product Authentication.
- Published in:
- Advanced Engineering Materials, 2019, v. 21, n. 8, p. N.PAG, doi. 10.1002/adem.201900146
- By:
- Publication type:
- Article
On the trajectory of video quality transition in HTTP adaptive video streaming.
- Published in:
- Multimedia Systems, 2018, v. 24, n. 3, p. 327, doi. 10.1007/s00530-017-0554-9
- By:
- Publication type:
- Article
Optimal tree packing for discretized live rate-adaptive streaming in CDN.
- Published in:
- Multimedia Systems, 2016, v. 22, n. 5, p. 559, doi. 10.1007/s00530-015-0471-8
- By:
- Publication type:
- Article
Simultaneous Ring Voice-over-Internet Phone System Enables Rapid Physician Elicitation of Explicit Informed Consent in Prehospital Stroke Treatment Trials.
- Published in:
- Cerebrovascular Diseases, 2009, v. 28, n. 6, p. 539, doi. 10.1159/000247596
- By:
- Publication type:
- Article
Forward error correction in real-time Internet of things CoAP-based wireless sensor networks.
- Published in:
- IET Wireless Sensor Systems (Wiley-Blackwell), 2019, v. 9, n. 1, p. 42, doi. 10.1049/iet-wss.2018.5077
- By:
- Publication type:
- Article
Propose A New Optimization Technique For Mobile IPv4.
- Published in:
- Journal of Education & Science, 2013, v. 26, n. 71, p. 140
- By:
- Publication type:
- Article
基于主成分分析和蚁群优化方法对犐IP犘流 进行网络异常检测.
- Published in:
- Computer Measurement & Control, 2018, v. 26, n. 5, p. 188, doi. 10.16526/j.cnki.11-4762/tp.2018.05.047
- By:
- Publication type:
- Article
Cloud Based Intrusion Prevention System with Machine Learning Approach.
- Published in:
- International Journal of Pharmaceutical Research (09752366), 2020, v. 12, n. 2, p. 860, doi. 10.31838/ijpr/2020.12.02.0133
- By:
- Publication type:
- Article
Traffic investigation of priority services in IP networks.
- Published in:
- Electrotechnica & Electronica (E+E), 2017, v. 52, n. 5/6, p. 18
- By:
- Publication type:
- Article
Research and Development of Real-time High-precision GNSS Receivers: A Feasible Application for Surveying and Mapping in Vietnam.
- Published in:
- Inzynieria Mineralna, 2021, v. 48, n. 2, p. 391, doi. 10.29227/IM-2021-02-36
- By:
- Publication type:
- Article
Are Internet Protocols the New Human Rights Protocols? Understanding 'RFC 8280 – Research into Human Rights Protocol Considerations'.
- Published in:
- Business & Human Rights Journal, 2019, v. 4, n. 1, p. 163, doi. 10.1017/bhj.2018.30
- By:
- Publication type:
- Article
인터넷을 통한 카메라 디바이스의 영상신호 전달 프로토콜 구현.
- Published in:
- Journal of the Korea Institute of Information & Communication Engineering, 2021, v. 25, n. 5, p. 691, doi. 10.6109/jkiice.2021.25.5.691
- By:
- Publication type:
- Article
Falls and the rise of the GP contract: An EMIS web protocol and template to help identify frail patients.
- Published in:
- British Journal of Community Nursing, 2017, v. 22, n. 11, p. 554, doi. 10.12968/bjcn.2017.22.11.554
- By:
- Publication type:
- Article
RETRIAL NETWORKS WITH FINITE BUFFERS AND THEIR APPLICATION TO INTERNET DATA TRAFFIC.
- Published in:
- Probability in the Engineering & Informational Sciences, 2008, v. 22, n. 4, p. 519, doi. 10.1017/S0269964808000314
- Publication type:
- Article
CARTOGRAPHIC SUPPORT OF CORRELATION EXTREME NAVIGATION SYSTEMS.
- Published in:
- Proceedings of National Aviation University, 2020, v. 85, n. 4, p. 30, doi. 10.18372/2306-1472.85.15135
- By:
- Publication type:
- Article
УДОСКОНАЛЕННЯ ТЕХНОЛОГІЇ ДОСТУПУ ДО РЕСУРСІВ ТРАНСПАРЕНТНИХ СИСТЕМ ІНТЕРНЕТ-ГОЛОСУВАННЯ
- Published in:
- Science-Based Technologies, 2018, v. 40, n. 4, p. 415, doi. 10.18372/2310-5461.40.13266
- By:
- Publication type:
- Article
Detecting events in the dynamics of ego-centred measurements of the Internet topology‡.
- Published in:
- Journal of Complex Networks, 2014, v. 2, n. 1, p. 38, doi. 10.1093/comnet/cnt014
- By:
- Publication type:
- Article
DEFENDING AGAINST DENIAL OF SLEEP ATTACK IN B-MAC PROTOCOL IN WIRELESS SENSOR NETWORK.
- Published in:
- International Journal on Information Sciences & Computing, 2013, v. 7, n. 2, p. 10, doi. 10.18000/ijisac.50138
- By:
- Publication type:
- Article
TRANSITIONAL SURVEY ON IPv4-IPv6.
- Published in:
- International Journal on Information Sciences & Computing, 2013, v. 7, n. 1, p. 53, doi. 10.18000/ijisac.50134
- By:
- Publication type:
- Article
Synthesizing Huber's Problem Solving and Kolb's Learning Cycle: A Balanced Approach to Technical Problem Solving.
- Published in:
- Journal of Information Systems Education, 2009, v. 20, n. 1, p. 99
- By:
- Publication type:
- Article
A Concurrent Testing Facility Approach to Validate Small Satellite Combined Operations.
- Published in:
- Aerospace (MDPI Publishing), 2021, v. 8, n. 12, p. 361, doi. 10.3390/aerospace8120361
- By:
- Publication type:
- Article
An inter-PAN mobility support scheme for IP-based wireless sensor networks and its applications.
- Published in:
- Information Technology & Management, 2013, v. 14, n. 3, p. 183, doi. 10.1007/s10799-013-0155-z
- By:
- Publication type:
- Article
UVM based Verification of Watchdog Timer with APB.
- Published in:
- Journal of Algebraic Statistics, 2022, v. 13, n. 3, p. 5343
- By:
- Publication type:
- Article
An Investigation of AODV and DSR Based Routing Protocol for Mobile ADHOC Network.
- Published in:
- Journal of Algebraic Statistics, 2022, v. 13, n. 3, p. 282
- By:
- Publication type:
- Article
"The Study of Mobile Multicast Router Protocols Ad-Hoc Networks".
- Published in:
- Journal of Algebraic Statistics, 2022, v. 13, n. 2, p. 3123
- By:
- Publication type:
- Article
Healthcare Technology Evolution And Adoption Of Fog Computing In Healthcare: Review, Issue And Challenges.
- Published in:
- Journal of Pharmaceutical Negative Results, 2023, v. 14, p. 1419, doi. 10.47750/pnr.2023.14.S02.172
- By:
- Publication type:
- Article
Bottleneck Bandwidth And Round-Trip Propagation Time Algorithm Using TFRC Protocol By Artificial Intelligence Algorithm.
- Published in:
- Journal of Pharmaceutical Negative Results, 2022, v. 13, p. 841, doi. 10.47750/pnr.2022.13.S05.133
- By:
- Publication type:
- Article
GULv3-A Novel Tool for Network Managers to Audit Networks.
- Published in:
- International Journal for Computers & Their Applications, 2012, v. 19, n. 1, p. 26
- By:
- Publication type:
- Article
A novel Ethernet based processing system for remote source harmonic detection.
- Published in:
- Telkomnika, 2023, v. 21, n. 2, p. 400, doi. 10.12928/TELKOMNIKA.v21i2.24091
- By:
- Publication type:
- Article
Medium access in cloud-based for the internet of things based on mobile vehicular infrastructure.
- Published in:
- Telkomnika, 2023, v. 21, n. 2, p. 280, doi. 10.12928/TELKOMNIKA.v21i2.24745
- By:
- Publication type:
- Article
Comparative analysis of LTE backbone transport techniques for efficient broadband penetration in a heterogeneous network morphology.
- Published in:
- Telkomnika, 2019, v. 17, n. 5, p. 2226, doi. 10.12928/TELKOMNIKA.v17i5.10987
- By:
- Publication type:
- Article
Performance analysis of tunnel broker through open virtual private network.
- Published in:
- Telkomnika, 2019, v. 17, n. 3, p. 1185, doi. 10.12928/TELKOMNIKA.v17i3.12231
- By:
- Publication type:
- Article
Performance comparison of transmitting jumbo frame on Windows and Linux System.
- Published in:
- Telkomnika, 2019, v. 17, n. 1, p. 68, doi. 10.12928/TELKOMNIKA.v17i1.11627
- By:
- Publication type:
- Article
Performance of MPLS-based Virtual Private Networks and Classic Virtual Private Networks Using Advanced Metrics.
- Published in:
- Telkomnika, 2018, v. 16, n. 5, p. 2073, doi. 10.12928/TELKOMNIKA.v16i5.7326
- By:
- Publication type:
- Article
Design of Cloud-based and IPTV Digital Signage System.
- Published in:
- Telkomnika, 2018, v. 16, n. 1, p. 385, doi. 10.12928/telkomnika.v16i2.6655
- By:
- Publication type:
- Article
Internet Protocol Based Satellite On-Board System.
- Published in:
- Telkomnika, 2016, v. 14, n. 3, p. 846, doi. 10.12928/TELKOMNIKA.v14i3.3512
- By:
- Publication type:
- Article
SLRV: An RFID Mutual Authentication Protocol Conforming to EPC Generation-2 Standard.
- Published in:
- Telkomnika, 2015, v. 13, n. 3, p. 1054, doi. 10.12928/TELKOMNIKA.v13i3.1440
- By:
- Publication type:
- Article
High Available VoIP Server Failover Mechanism in Wide Area Network.
- Published in:
- Telkomnika, 2015, v. 13, n. 2, p. 739, doi. 10.12928/TELKOMNIKA.v13i2.1741
- By:
- Publication type:
- Article
Trusted Node-Based Algorithm to Secure Home Agent NATed IPv4 Network from IPv6 Routing Header Attacks.
- Published in:
- Telkomnika, 2014, v. 12, n. 4, p. 969, doi. 10.12928/TELKOMNIKA.v12i4.540
- By:
- Publication type:
- Article
A FUZZY LOGIC CLASSIFICATION OF INCOMING PACKET FOR VOIP.
- Published in:
- Telkomnika, 2010, v. 8, n. 2, p. 165
- By:
- Publication type:
- Article