Results 1 to 10 of about 1,290,040 (147)
WLAN Integrated with GPRS Network Securely [PDF]
In this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server.
Mohammed A. Abdalla +2 more
doaj +3 more sources
HTTP Parameter Sorting Covert Channel Detection Method Based on Markov Model [PDF]
The network covert channel is a communication channel that establishes secret message transmission between different hosts on the network by utilizing reserved,optional or undefined fields in the network protocols.HTTP protocol,as one of the most ...
SHEN Guoliang, ZHAI Jiangtao, DAI Yuewei
doaj +1 more source
Secure neural network watermarking protocol against forging attack
In order to protect the intellectual property of neural network, an owner may select a set of trigger samples and their corresponding labels to train a network, and prove the ownership by the trigger set without revealing the inner mechanism and ...
Renjie Zhu +3 more
doaj +1 more source
A Social DTN Network Routing Algorithm Based on Data Link
Data transmission in the network rely on network protocols, while the design of network protocols also require accommodation with the communication environmental characteristics. The design of TCP/IP protocol is based on wired network or wireless network
WANG Zhihai, GAO Xueyao
doaj +1 more source
Oriented Multicast Routing Applied to Network Level Agent Search [PDF]
Many protocols need a discovery mechanism to enable a given node to locate one or several nodes involved in the same communication. However, there is no protocol ready to fulfill this service at the network-layer.
Damien Magoni, Jean-Jacques Pansiot
doaj +1 more source
New Enhanced Authentication Protocol for Internet of Things
Internet of Things (IoT) refers to a new extended network that enables to any object to be linked to the Internet in order to exchange data and to be controlled remotely.
Mourade Azrour +3 more
doaj +1 more source
Many applications of Internet of Things (IoT) have been implemented based on unreliable wireless or mobile networks like the delay tolerant network (DTN).
Yuxin Mao +3 more
doaj +1 more source
Nowadays, ZigBee communication protocol is one of the dominating standards for wireless sensor & ad-hoc networks and Internet of Things (IoT) networks. Even though the ZigBee standard was formed with security in mind and lower consumption of power, still
Jegan Govindasamy +1 more
doaj +1 more source
One of the most important topics in the field of wireless sensor networks is the development of approaches to improve network lifetime. In this paper, an energy-efficient control and routing protocol for wireless sensor networks is presented.
Ali Forghani Elah Abadi +5 more
doaj +1 more source
Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks [PDF]
Chaminda Alocious, Hannan Xiao, B. Christianson, 'Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks' paper presented at the 2016 IEEE Wireless Communications and Networking Conference (IEEE WCNC). Doha, Qatar.
Alocious, Chaminda +2 more
core +2 more sources

