نتایج جستجو برای: protocol analysis

تعداد نتایج: 3017806  

Kamran Shirvani

During the last three decades, especially 1980's, language learning specialists have been busy  discovering the nature of language learning strategies, describing them, and formulating their relationships with other language learning factors. In line with these studies, the field of translation studies has undergone a complete revolution in terms of its perspective toward its research prioritie...

2005
Sean Whalen Matt Bishop Sophie Engle

Network protocols continue to suffer from well documented vulnerabilities. Despite this, a practical methodology for classifying these vulnerabilities does not exist. In this paper, we present such a methodology. We have developed a grammar for expressing network protocol exploits in terms of vulnerabilities and symptoms. Vulnerabilities are defined by characteristics, conditions which must hol...

2004
Sean Whalen Matt Bishop Sophie Engle

Network protocols continue to suffer from well documented vulnerabilities. Despite this, a practical methodology for classifying these vulnerabilities does not exist. In this paper, we present such a methodology. We have developed a grammar for expressing network protocol exploits in terms of vulnerabilities and symptoms. Vulnerabilities are defined by characteristics, conditions which must hol...

Journal: :RFC 1991
John Moy

[Moy] [Page 1] OSPF protocol analysis Status of this Memo This memo provides information for the Internet community. It does not specify any Internet standard. Distribution of this memo is unlimited. Abstract This is the first of two reports on the OSPF protocol. These reports are required by the IAB/IESG in order for an Internet routing protocol to advance to Draft Standard Status. OSPF is a T...

2008
Gilbert Wondracek Paolo Milani Comparetti Christopher Krügel Engin Kirda

Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-related contexts. For example, they are needed by intrusion detection systems to perform deep packet inspection, and they allow the implementation of black-box fuzzing tools. Unfortunately, manual reverse engineering is a ...

2005
Graham Steel

This note describes previously completed and ongoing research in the MRG in the area of security protocol analysis.

1991

This memo provides information for the Internet community. It does not specify an Internet standard. Distribution of this memo is unlimited. 2. Introduction. The purpose of this report is to document how the requirements for advancing a routing protocol to Draft Standard have been satisfied by the Border Gateway Protocol (BGP). This report summarizes the key feature of BGP, and analyzes the pro...

2015
Phillip H. Griffin

Not all of the protocol security flaws described at the SSR2014 conference were discovered using these new automated techniques. Several significant findings were the result of more traditional methods. These findings included flaws in standardized and deployed protocols, as well as important innovations to improve and extend the capabilities of long-used cryptographic techniques. Based on thes...

ژورنال: طب مکمل 2021

Introduction: Uterus is an important female organ with duty of purifying blood and carrying fetus. Recognition of uterine temperament is necessary for prevention, diagnosis and treatment of this organ diseases in Persian Medicine (PM). Many gynecologic disorders including infertility, oligomenorrhea, amenorrhea, hypermenorrhea, vaginitis, cervicitis, urinary incontinency and pelvic pains are re...

Journal: :International Journal for Infonomics 2010

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید