نتایج جستجو برای: protocol analysis
تعداد نتایج: 3017806 فیلتر نتایج به سال:
During the last three decades, especially 1980's, language learning specialists have been busy discovering the nature of language learning strategies, describing them, and formulating their relationships with other language learning factors. In line with these studies, the field of translation studies has undergone a complete revolution in terms of its perspective toward its research prioritie...
Network protocols continue to suffer from well documented vulnerabilities. Despite this, a practical methodology for classifying these vulnerabilities does not exist. In this paper, we present such a methodology. We have developed a grammar for expressing network protocol exploits in terms of vulnerabilities and symptoms. Vulnerabilities are defined by characteristics, conditions which must hol...
Network protocols continue to suffer from well documented vulnerabilities. Despite this, a practical methodology for classifying these vulnerabilities does not exist. In this paper, we present such a methodology. We have developed a grammar for expressing network protocol exploits in terms of vulnerabilities and symptoms. Vulnerabilities are defined by characteristics, conditions which must hol...
[Moy] [Page 1] OSPF protocol analysis Status of this Memo This memo provides information for the Internet community. It does not specify any Internet standard. Distribution of this memo is unlimited. Abstract This is the first of two reports on the OSPF protocol. These reports are required by the IAB/IESG in order for an Internet routing protocol to advance to Draft Standard Status. OSPF is a T...
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-related contexts. For example, they are needed by intrusion detection systems to perform deep packet inspection, and they allow the implementation of black-box fuzzing tools. Unfortunately, manual reverse engineering is a ...
This note describes previously completed and ongoing research in the MRG in the area of security protocol analysis.
This memo provides information for the Internet community. It does not specify an Internet standard. Distribution of this memo is unlimited. 2. Introduction. The purpose of this report is to document how the requirements for advancing a routing protocol to Draft Standard have been satisfied by the Border Gateway Protocol (BGP). This report summarizes the key feature of BGP, and analyzes the pro...
Not all of the protocol security flaws described at the SSR2014 conference were discovered using these new automated techniques. Several significant findings were the result of more traditional methods. These findings included flaws in standardized and deployed protocols, as well as important innovations to improve and extend the capabilities of long-used cryptographic techniques. Based on thes...
Introduction: Uterus is an important female organ with duty of purifying blood and carrying fetus. Recognition of uterine temperament is necessary for prevention, diagnosis and treatment of this organ diseases in Persian Medicine (PM). Many gynecologic disorders including infertility, oligomenorrhea, amenorrhea, hypermenorrhea, vaginitis, cervicitis, urinary incontinency and pelvic pains are re...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید