نتایج جستجو برای: computer communication networks
تعداد نتایج: 1217632 فیلتر نتایج به سال:
The performance of computer communication networks is often given only cur sory treatment in undergraduate Networking or Computer Communication courses A simulation package for the investigation of many aspects of Local Area Network LAN performance is introduced Its use as a tool for allowing undergraduate Net working students to investigate the performance of a popular networking system is dis...
The boom of covert communication coincides with the appearance and growth of the Internet. The rapid spread of computer networks and shift to digitization of media has created a very favourable environment for covert communication. In this paper, some Covert communication techniques have been described. Covert or secure communication includes methods such as cryptography, steganography and wate...
Securing Authentication of TCP/IP Layer Two By Modifying Challenge-Handshake Authentication Protocol
Computer communications have been playing a vital role in the world economy. Government organizations, large companies and banks are using those networks in trading their data. This imposed a challenge due to the increasing need for protecting the sensitive data traded over those networks. This research presents a mechanism to protect computers communication over open un-trusted networks, prima...
It is not an easy task to write a book on queuing networks when a large number of books in the topic have already been published. The authors have written a very timely book on queuing networks which can be used by people working in the area of communication networks. The basics of stochastic process have been discussed in Chapter 1 with queuing networks being introduced in Chapter 2 where the ...
The two main characteristics of small-world networks are strong local clustering, and small diameter. These two characteristics are desirable properties in communication networks since typical communication patterns show large amounts of local communication and a small amount of non-local communication that must be completed quickly. In this paper, we study variants of broadcasting that resembl...
The rapid growth of peer-to-peer networks and social networking websites has demonstrated the internet’s potential as a medium for grassroots collaboration. This report describes ongoing research into the use of friend-to-friend overlay networks for censorship-resistant communication. Decentralised mechanisms for resource allocation, unforgeable acknowledgements and adaptive routing are propose...
ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School of Electrical and Computer Engineering, Georgia Institute of Technology, advised by Professor Chuanyi Ji. Chen’s research interests focus on network security, especially modeling the spread of malware on networks, the performance of distributed detection systems,...
ABOUT THE AUTHOR. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School of Electrical and Computer Engineering, Georgia Institute of Technology, advised by Professor Chuanyi Ji. Chen’s research interests focus on network security, especially modeling the spread of malware on networks, the performance of distributed detection systems, ...
threat assessment in the computer networks of organizations can reduce damage caused by attacks and unexpected events. data fusion models such as the jdl model provide efficient and adequate sensors to gather the right information at the right time from the right components. this information then is refined and normalized to provide situational awareness and assess events that may be intended a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید