Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Protocol analysis 59 found (68 total)

alternate case: protocol analysis

Cryptographic protocol (1,015 words) [view diff] no match in snippet view article find links to article

A cryptographic protocol is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences
Analysis of clinical trials (1,121 words) [view diff] exact match in snippet view article find links to article
This analysis is known as an "on-treatment" or "per protocol" analysis. A per-protocol analysis represents a "best-case scenario" to reveal the effect
Gavin Lowe (computer scientist) (577 words) [view diff] exact match in snippet view article
include computer security, for which he developed the cryptographic protocol analysis tool Casper, and concurrency. Lowe studied mathematics as an undergraduate
RMON (627 words) [view diff] exact match in snippet view article find links to article
Monitoring (RMON) MIB was developed by the IETF to support monitoring and protocol analysis of local area networks (LANs). The original version (sometimes referred
OmniPeek (879 words) [view diff] exact match in snippet view article find links to article
from Savvius, a LiveAction company, for network troubleshooting and protocol analysis. It supports an application programming interface (API) for plugins
CFosSpeed (355 words) [view diff] exact match in snippet view article find links to article
Windows network stack where it performs packet inspection and layer-7 protocol analysis. It has been noted as causing some issues with network connections
Ettercap (software) (564 words) [view diff] exact match in snippet view article
man-in-the-middle attacks on a LAN. It can be used for computer network protocol analysis and security auditing. It runs on various Unix-like operating systems
ProVerif (1,382 words) [view diff] exact match in snippet view article find links to article
as privacy, traceability and verifiability can also be considered. Protocol analysis is considered with respect to an unbounded number of sessions and
Bus analyzer (794 words) [view diff] exact match in snippet view article find links to article
A bus analyzer is a type of a protocol analysis tool, used for capturing and analyzing communication data across a specific interface bus, usually embedded
List of Six Sigma software packages (231 words) [view diff] no match in snippet view article find links to article
classes of software used to support the Six Sigma process improvement protocol: Analysis tools, which are used to perform statistical or process analysis;
Jitterlyzer (558 words) [view diff] exact match in snippet view article find links to article
analyzer or protocol analyzer, it can correlate these measurements with protocol analysis. Physical-layer tests can be performed while the system under test
3-D Secure (2,945 words) [view diff] no match in snippet view article find links to article
requirements and resolving some of the short-comings of the original protocol. Analysis of the first version of the protocol by academia has shown it to have
Intention-to-treat analysis (1,245 words) [view diff] exact match in snippet view article find links to article
participants who adhere to it. [citation needed] In comparison, in a per-protocol analysis, only patients who complete the entire clinical trial according to
Laura Chappell (244 words) [view diff] case mismatch in snippet view article find links to article
course developer. In October 1993, she founded her first company, the Protocol Analysis Institute, where has served as a Senior Protocol and Security Analyst
Snort (software) (437 words) [view diff] exact match in snippet view article
packet logging on Internet Protocol (IP) networks. Snort performs protocol analysis, content searching and matching. The program can also be used to detect
Typestate analysis (1,836 words) [view diff] exact match in snippet view article find links to article
Typestate analysis, sometimes called protocol analysis, is a form of program analysis employed in programming languages. It is most commonly applied to
LeCroy Corporation (293 words) [view diff] exact match in snippet view article find links to article
had acquired Frontline Test Equipment, Inc., a provider of wireless protocol analysis test tools. On April 13, 2016, Teledyne LeCroy announced it had entered
Rubber duck debugging (529 words) [view diff] case mismatch in snippet view article find links to article
Sirota, Miroslav (2023). "Tell Us What You Really Think: A Think Aloud Protocol Analysis of the Verbal Cognitive Reflection Test". Journal of Intelligence
Intrusion detection system (5,513 words) [view diff] exact match in snippet view article find links to article
methods: signature-based, statistical anomaly-based, and stateful protocol analysis.: 301  Signature-based detection: Signature-based IDS monitors packets
Unification (computer science) (7,390 words) [view diff] exact match in snippet view article
used in SMT solvers, term rewriting algorithms, and cryptographic protocol analysis. A unification problem is a finite set E={ l1 ≐ r1, ..., ln ≐ rn }
CoVLP (1,643 words) [view diff] exact match in snippet view article find links to article
the Delta variant, and 88.6% against the Gamma variant in the per-protocol analysis, with "similar" results in the intention-to-treat analysis. "Product
Herbert A. Simon (5,984 words) [view diff] exact match in snippet view article find links to article
Anders Ericsson, Simon developed the experimental technique of verbal protocol analysis. Simon was interested in the role of knowledge in expertise. He said
Zoom (software) (8,699 words) [view diff] exact match in snippet view article
accused Zoom's security team of failing to credit his open-source protocol analysis research software, Verifpal, with being instrumental during the design
MPEG transport stream (1,723 words) [view diff] case mismatch in snippet view article find links to article
book}}: |website= ignored (help) A Guide to MPEG Fundamentals and Protocol Analysis (PDF), Tektronix, p. 37, retrieved 23 April 2020 BD ROM – Audio Visual
Wireshark (1,674 words) [view diff] exact match in snippet view article find links to article
Internet service provider, Network Integration Services. The commercial protocol analysis products at the time were priced around $1500 and did not run on the
OAuth (2,821 words) [view diff] exact match in snippet view article find links to article
Redirect" by Wang Jing. OAuth 2.0 has been analyzed using formal web protocol analysis. This analysis revealed that in setups with multiple authorization
Drawing (4,865 words) [view diff] exact match in snippet view article find links to article
F.; Kozbelt, A.; Sitaras, S. (2011). "Think global, act local: A protocol analysis comparison of artists' and nonartists' cognitions, metacognitions
Network Security Toolkit (372 words) [view diff] exact match in snippet view article find links to article
Mercator World Map bit image, a browser-based packet capture and protocol analysis system capable of monitoring up to four network interfaces using Wireshark
Dolev–Yao model (486 words) [view diff] case mismatch in snippet view article find links to article
Quingfeng; Zhang, Chengqi; Zhang, Shichao (2008), Secure Transaction Protocol Analysis: Models and Applications, Lecture Notes in Computer Science / Programming
Introspection (3,409 words) [view diff] case mismatch in snippet view article find links to article
reports and the analysis of rules: A review of Ericsson and Simon's Protocol Analysis: Verbal Reports as Data". Journal of the Experimental Analysis of
Matrix-M (796 words) [view diff] exact match in snippet view article find links to article
and 67% in sites with age-based implementation in the modified per-protocol analysis. /> In influenza vaccine candidates, Matrix-M was shown to offer cross-protection
K. Anders Ericsson (901 words) [view diff] case mismatch in snippet view article find links to article
Herbert A. Simon on verbal reports of thinking is summarized in a book Protocol Analysis: Verbal Reports as Data, which was revised in 1993. In G. H. Bower
Centipede game (2,905 words) [view diff] exact match in snippet view article find links to article
cooperation and competition in the Centipede game through verbal protocol analysis: Exploring cooperation". European Journal of Social Psychology. 46
Pcap (1,574 words) [view diff] no match in snippet view article find links to article
application. Wireshark (formerly Ethereal), a graphical packet-capture and protocol-analysis tool. XLink Kai, software that allows various LAN console games to
Patrick Lincoln (2,273 words) [view diff] exact match in snippet view article find links to article
Software Engineering, 371-374, 2000 cited 400 A meta-notation for protocol analysis, I Cervesato, NA Durgin, PD Lincoln, JC Mitchell, A Scedrov, Computer
Mental rotation (5,425 words) [view diff] exact match in snippet view article find links to article
study used several methods such as reaction time studies, verbal protocol analysis, and eye tracking. In the initial reaction time experiments, those
Certified wireless network expert (281 words) [view diff] exact match in snippet view article find links to article
covered by the other CWNP certification exams, including wireless protocol analysis, security, advanced design, spectrum analysis, wired network administration
Ergonomics (8,102 words) [view diff] exact match in snippet view article find links to article
P. (2000). "A comparison of concurrent and retrospective verbal protocol analysis". The American Journal of Psychology. 113 (3): 387–404. doi:10.2307/1423365
Catherine Meadows (277 words) [view diff] case mismatch in snippet view article find links to article
particular Preface, pp. vii–ix; "Cathy Meadows: A Central Figure in Protocol Analysis", Sylvan Pinsky, pp. 1–5; "A Long Slow Conversation", Jon Millen,
Serial Peripheral Interface (5,952 words) [view diff] exact match in snippet view article find links to article
oscilloscopes). Most oscilloscope vendors offer optional support for SPI protocol analysis (both 2-, 3-, and 4-wire SPI) with triggering. Various alternative
Biliary microlithiasis (173 words) [view diff] case mismatch in snippet view article find links to article
detectable by ultrasound using a Rapid Patient Rotation Ultrasound Protocol Analysis of biliary sludge obtained through endoscopic retrograde cholangiopancreatography
Discursive psychology (2,193 words) [view diff] exact match in snippet view article find links to article
their minds. Talk is seen as (and, in experimental psychology and protocol analysis, used as) descriptions of people's mental content. In contrast, discursive
Bad Pharma (4,212 words) [view diff] exact match in snippet view article find links to article
it is misleading; ignoring patients who drop out (i.e. using per-protocol analysis, where only patients who complete the trial are counted in the final
Presentation timestamp (393 words) [view diff] case mismatch in snippet view article find links to article
fields. Packetized elementary stream Audio to video synchronization A Guide to MPEG Fundamentals and Protocol Analysis, specification notes by Tektronix.
Cas Cremers (444 words) [view diff] exact match in snippet view article find links to article
protocols. This work ranges from developing mathematical foundations for protocol analysis to the development of analysis tools, notably the Scyther and Tamarin
Dual process theory (7,233 words) [view diff] case mismatch in snippet view article find links to article
Miroslav (2023-04-21). "Tell Us What You Really Think: A Think Aloud Protocol Analysis of the Verbal Cognitive Reflection Test". Journal of Intelligence
Border Gateway Protocol (7,970 words) [view diff] case mismatch in snippet view article find links to article
RFC 4273, Definitions of Managed Objects for BGP-4 RFC 4274, BGP-4 Protocol Analysis RFC 4275, BGP-4 MIB Implementation Survey RFC 4276, BGP-4 Implementation
List of statistics articles (8,280 words) [view diff] exact match in snippet view article find links to article
(prob/stats related court case) Per capita Per-comparison error rate Per-protocol analysis Percentile Percentile rank Periodic variation – redirects to Seasonality
RV 144 (2,170 words) [view diff] exact match in snippet view article find links to article
persons originally enrolled in the trial, and p=0.16 for the "per protocol analysis" including only persons from the modified intent to treat group who
Intermittent preventive therapy (2,534 words) [view diff] no match in snippet view article find links to article
intervention and 38% in the comparison areas (p=0.06). In a ‘per protocolanalysis, which only included infants who actually received IPTi there was
Aggelos Kiayias (1,986 words) [view diff] no match in snippet view article find links to article
A. Garay, Aggelos Kiayias, Nikos Leonardos: The Bitcoin Backbone Protocol: Analysis and Applications. EUROCRYPT (2) 2015: 281–310 Aggelos Kiayias, Serdar
Reachability analysis (1,705 words) [view diff] exact match in snippet view article find links to article
over half- duplex links, C.ACM 12, 260 (1969). Note: In the case of protocol analysis, there are normally only two entities. Note: The corruption or loss
Darren Kimura (2,933 words) [view diff] exact match in snippet view article find links to article
of Savvius formerly known as WildPackets famous for their OmniPeek protocol analysis software. Kimura retired from LiveAction business operations in 2019
Wearable cardioverter defibrillator (5,308 words) [view diff] exact match in snippet view article find links to article
endpoints, thus positive results for the use of the WCD. In a per protocol analysis (PPA) published in 2020, the reduction in arrhythmic mortality was
Reproductive immunology (4,960 words) [view diff] case mismatch in snippet view article find links to article
Gonadotropin-Detected Pregnancy, Pregnancy Loss, and Live Birth: Per Protocol Analysis of a Randomized Trial". Annals of Internal Medicine. 174 (5): 595–601
IoT forensics (2,638 words) [view diff] exact match in snippet view article find links to article
investigations, involving different tools and appropriate network protocol analysis. Cloud forensics: Process of extrapolating information in the cloud
Dual process theory (moral psychology) (8,138 words) [view diff] case mismatch in snippet view article
Sirota, Miroslav (2023). "Tell Us What You Really Think: A Think Aloud Protocol Analysis of the Verbal Cognitive Reflection Test". Journal of Intelligence
Attribute hierarchy method (6,762 words) [view diff] exact match in snippet view article find links to article
Issues and Practice, 26, 3–16. Ericsson, K. A. & Simon, H. A. (1993). Protocol analysis: Verbal reports as data. Cambridge, MA: MIT Press. Leighton, J.P.
Carbon Connect Delta Program (3,126 words) [view diff] no match in snippet view article find links to article
Retrieved 14 April 2023. "Carbon Capture and Storage and the London ProtocolAnalysis". IEA. Retrieved 2023-04-14. Garrett, Justine; McCoy, Sean (2013-01-01)