We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 10,000 results
  1. Development and performance evaluation of EQUIC protocol

    In this paper, we have proposed a modification in existing QUIC protocol named Enhanced QUIC (EQUIC) to control the congestion in the network when...

    Sujeet Singh Bhadouria, Shashikant Gupta in International Journal of Information Technology
    Article 14 June 2022
  2. A Study on MQTT Protocol Architecture and Security Aspects Within IoT Paradigm

    In the Internet of Things (IoT) paradigm, boundless solutions have been designed and implemented to do effective and secure communication among it’s...
    M. Nimavat Dhaval, G. Raiyani Ashwin in Intelligent Computing and Networking
    Conference paper 2023
  3. Protocol Security in 6th Generation (6G) Networks

    6th generation networks are expected to be there most probably in year 2030. It is believed that their existence will enable the technology of...
    Tanya Garg, Gur**der Kaur, Prashant Singh Rana in Computational Intelligence and Network Systems
    Conference paper 2024
  4. An Improved Light Weight Countermeasure Scheme to Efficiently Mitigate TCP Attacks in SDN

    The design of Software Defined Networking (SDN) will enable the flexible control of network traffic and handle the large amount of data traffic on...
    Yung-Fa Huang, Shu-Wai Chang, ... Ching-Mu Chen in New Trends in Computer Technologies and Applications
    Conference paper 2022
  5. Exploiting Vulnerabilities in the SCADA Modbus Protocol: An ICT-Reliant Perspective

    Industrial plants like power, gas, water, and transport are controlled remotely and managed by a protocol like Modbus-TCP which has a significant...
    Ayush Sinha, Saurabh Singh Patel, ... O. P. Vyas in Advanced Network Technologies and Intelligent Computing
    Conference paper 2022
  6. Angriffe auf TCP/IP-Netzwerkprotokolle

    Dieses Kapitel befasst sich mit Angriffen auf die Netzwerkprotokolle der verschiedenen Schichten des TCP/IP-Modells. Beginnend mit der...
    Chapter 2021
  7. Movie Synchronization System Using Web Socket Based Protocol

    On a global scale, the Web is a platform that allows universal reach via a variety of communication channels. Whenever there is a newly developed...
    Amar Shukla, Thipendra Pal Singh, ... Tanupriya Choudhury in Intelligent Systems and Machine Learning
    Conference paper 2023
  8. Teaching of TCP Fundamental Operations Using a Digital Tool

    Today, digital tools play an important role in education. These tools are a support to strengthen the knowledge of students while for teachers it can...
    Ilse Alicia López-Pedroza, Francisco de Asís López-Fuentes in Computer Science and Health Engineering in Health Services
    Conference paper 2021
  9. 4D-MAP: Multipath Adaptive Packet Scheduling for Live Streaming over QUIC

    In recent years, live streaming has become a popular application, which uses TCP as its primary transport protocol. Quick UDP Internet Connections...

    Cong-** Song, Biao Han, **-Shu Su in Journal of Computer Science and Technology
    Article 30 January 2024
  10. CPSOCKS: Cross-Platform Privacy Overlay Adapter Based on SOCKSv5 Protocol

    In figures, the cybersecurity landscape is one of the most across-the-border impactable trends in the last years, especially after the begging of the...
    Gabriel-Cosmin Apostol, Alexandra-Elena Mocanu, ... Florin Pop in Green, Pervasive, and Cloud Computing
    Conference paper 2023
  11. Evaluation of the Angara Interconnect Prototype TCP/IP Software Stack: Implementation, Basic Tests and BeeGFS Benchmarks

    In the paper, we present a prototype implementation of the TCP/IP software stack over the Angara high performance interconnect. Our approach is to...
    Yuri Goncharuk, Yuri Grishichkin, ... Vasiliy Umrihin in Supercomputing
    Conference paper 2022
  12. Gria: an efficient deterministic concurrency control protocol

    Deterministic databases are able to reduce coordination costs in a replication. This property has fostered a significant interest in the design of...

    **nyuan Wang, Yun Peng, Hejiao Huang in Frontiers of Computer Science
    Article 16 December 2023
  13. A secure architecture for TCP/UDP-based cloud communications

    Cloud communication is an intrinsic aspect of cloud architecture. It is an internet-based communication that enables access to millions of cloud...

    Abu Faisal, Mohammad Zulkernine in International Journal of Information Security
    Article 07 July 2020
  14. An intelligent long-lived TCP based on real-time traffic regulation

    Transmission control protocol (TCP) transaction is one of the chief protocols of Internet protocols. It is divided into two categories of data flow....

    Mohammad Al Shinwan, Laith Abualigah, ... Ahmad M. Khasawneh in Multimedia Tools and Applications
    Article 24 April 2020
  15. A novel scheduling algorithm development and analysis for heterogeneous IoT protocol control system to achieve SCADA optimization: a next generation post covid solution

    In this paper, a new intelligent message scheduling algorithm is designed for complex Internet of Things (IoT) systems where machine to machine (M2M)...

    Sujit N. Deshpande, Rashmi M. Jogdand in International Journal of Information Technology
    Article 25 April 2023
  16. A new DEVS-based network simulator for online routing protocol education

    Simulation continues to be highly attractive and indispensable for studying networked systems. There remains the need for simulators that can support...

    Ahmet Zengin, Cevat Altunkaya, ... Hessam Sarjoughian in Multimedia Tools and Applications
    Article 02 January 2024
  17. Netzwerkkommunikation

    Für die Kommunikation in Rechnernetzen auf der Basis des Protokolls TCP/IP (Transmission Control Protocol/Internet Protocol) stellt das Paket...
    Dietmar Abts in Grundkurs JAVA
    Chapter 2024
  18. An application layer technique to overcome TCP incast in data center network using delayed server response

    Applications running in data center networks exhibits barrier-synchronized many-to-one communication pattern. Under this pattern, multiple workers...

    Mahendra Suryavanshi, Ajay Kumar, Jyoti Yadav in International Journal of Information Technology
    Article 02 January 2021
  19. An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations

    Owing to the emergence and rapid advances of new-generation information and digitalization technologies, the concept of model-driven digital twin has...

    Jiaxing Guo, Dongliang Zhao, ... Mengcheng Ju in Journal of Cloud Computing
    Article Open access 30 January 2024
  20. Design and Analysis of Energy Efficient Service Discovery Routing Protocol in MANETs

    Wireless sensor network (WSN) enables physical environment tracking and creation of timely action based on sensor data. The primary goal of this type...

    Bhawana Sharma, Deepika Saxena in SN Computer Science
    Article 28 June 2023
Did you find what you were looking for? Share feedback.