Results 1 to 10 of about 1,289,066 (290)
On the (in)efficiency of fuzzing network protocols. [PDF]
Abstract Fuzzing is a widely used and effective technique to test software. Unfortunately, certain systems, including network protocols, are more challenging to fuzz than others. An important complication with fuzzing network protocols is that this tends to be a slow process, which is problematic as fuzzing involves many test inputs.
Andarzian SB, Daniele C, Poll E.
europepmc +5 more sources
IoT Short-range Network protocols: Analytical study and operating models [PDF]
Internet of Things (IoT) is a constantly evolving concept. Nonetheless, we can consider that the Internet of Things broadly refers to the trend towards generalized interconnection of all the objects that surround our daily lives, places and physical ...
Sakina Elhadi +2 more
doaj +1 more source
An Improved Agent-Based AODV Routing Protocol for MANET [PDF]
The mobile ad-hoc network (MANET) is a special mobile network that has self-configuration and self-establish abilities to communicate conveniently. MANET is forming mobile devices such as mobile phones, personal digital assistants (PDAs), laptops, etc.
Van-Hau Nguyen, Vi Nam, Dao Linh, Vu Quy
doaj +1 more source
A Survey on the Role of Industrial IoT in Manufacturing for Implementation of Smart Industry
The Internet of Things (IoT) is an innovative technology that presents effective and attractive solutions to revolutionize various domains. Numerous solutions based on the IoT have been designed to automate industries, manufacturing units, and production
Muhammad Shoaib Farooq +8 more
doaj +1 more source
Industrial and Critical Infrastructure Security: Technical Analysis of Real-Life Security Incidents
Critical infrastructures and industrial organizations aggressively move towards integrating elements of modern Information Technology (IT) into their monolithic Operational Technology (OT) architectures.
Georgios Michail Makrakis +4 more
doaj +1 more source
PACKET RESERVATIONS IN REAL-TIME MULTIPATH TRANSMISSIONS I.I. Noskov [PDF]
Subject of Research. The paper presents research of mechanisms of multipath redundant transmissions in computer networks. Method. The developed application level protocol gives the possibility to increase the probability of timely and faultless data ...
Ilya I. Noskov
doaj +1 more source
Designing a quantum network protocol [PDF]
The second quantum revolution brings with it the promise of a quantum internet. As the first quantum network hardware prototypes near completion new challenges emerge. A functional network is more than just the physical hardware, yet work on scalable quantum network systems is in its infancy. In this paper we present a quantum network protocol designed
Kozlowski, Wojciech +2 more
openaire +3 more sources
Information Hiding Techniques Using Network Protocols [PDF]
The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module.
Manar Kashmola, Ameera Sallo
doaj +1 more source
Network Extractor Protocols [PDF]
We design efficient protocols for processors to extract private randomness over a network with Byzantine faults, when each processor has access to an independent weakly-random n-bit source of sufficient min-entropy.We give several such network extractor protocols in both the information theoretic and computational settings.For a computationally ...
Yael Tauman Kalai +3 more
openaire +1 more source
A Protocol for Packet Network Intercommunication [PDF]
A protocol that supports the sharing of resources that exist in different packet switching networks is presented. The protocol provides for variation in individual network packet sizes, transmission failures, sequencing, flow control, end-to-end error checking, and the creation and destruction of logical process-to-process connections.
Vinton G. Cerf, Robert E. Kahn
openaire +1 more source

