language:
Find link is a tool written by Edward Betts.searching for Protocol analysis 59 found (68 total)
alternate case: protocol analysis
Cryptographic protocol
(1,015 words)
[view diff]
no match in snippet
view article
find links to article
A cryptographic protocol is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequencesAnalysis of clinical trials (1,121 words) [view diff] exact match in snippet view article find links to article
This analysis is known as an "on-treatment" or "per protocol" analysis. A per-protocol analysis represents a "best-case scenario" to reveal the effectGavin Lowe (computer scientist) (577 words) [view diff] exact match in snippet view article
include computer security, for which he developed the cryptographic protocol analysis tool Casper, and concurrency. Lowe studied mathematics as an undergraduateRMON (627 words) [view diff] exact match in snippet view article find links to article
Monitoring (RMON) MIB was developed by the IETF to support monitoring and protocol analysis of local area networks (LANs). The original version (sometimes referredOmniPeek (879 words) [view diff] exact match in snippet view article find links to article
from Savvius, a LiveAction company, for network troubleshooting and protocol analysis. It supports an application programming interface (API) for pluginsCFosSpeed (355 words) [view diff] exact match in snippet view article find links to article
Windows network stack where it performs packet inspection and layer-7 protocol analysis. It has been noted as causing some issues with network connectionsEttercap (software) (564 words) [view diff] exact match in snippet view article
man-in-the-middle attacks on a LAN. It can be used for computer network protocol analysis and security auditing. It runs on various Unix-like operating systemsProVerif (1,382 words) [view diff] exact match in snippet view article find links to article
as privacy, traceability and verifiability can also be considered. Protocol analysis is considered with respect to an unbounded number of sessions andBus analyzer (794 words) [view diff] exact match in snippet view article find links to article
A bus analyzer is a type of a protocol analysis tool, used for capturing and analyzing communication data across a specific interface bus, usually embeddedList of Six Sigma software packages (231 words) [view diff] no match in snippet view article find links to article
classes of software used to support the Six Sigma process improvement protocol: Analysis tools, which are used to perform statistical or process analysis;Jitterlyzer (558 words) [view diff] exact match in snippet view article find links to article
analyzer or protocol analyzer, it can correlate these measurements with protocol analysis. Physical-layer tests can be performed while the system under test3-D Secure (2,945 words) [view diff] no match in snippet view article find links to article
requirements and resolving some of the short-comings of the original protocol. Analysis of the first version of the protocol by academia has shown it to haveIntention-to-treat analysis (1,245 words) [view diff] exact match in snippet view article find links to article
participants who adhere to it. [citation needed] In comparison, in a per-protocol analysis, only patients who complete the entire clinical trial according toLaura Chappell (244 words) [view diff] case mismatch in snippet view article find links to article
course developer. In October 1993, she founded her first company, the Protocol Analysis Institute, where has served as a Senior Protocol and Security AnalystSnort (software) (437 words) [view diff] exact match in snippet view article
packet logging on Internet Protocol (IP) networks. Snort performs protocol analysis, content searching and matching. The program can also be used to detectTypestate analysis (1,836 words) [view diff] exact match in snippet view article find links to article
Typestate analysis, sometimes called protocol analysis, is a form of program analysis employed in programming languages. It is most commonly applied toLeCroy Corporation (293 words) [view diff] exact match in snippet view article find links to article
had acquired Frontline Test Equipment, Inc., a provider of wireless protocol analysis test tools. On April 13, 2016, Teledyne LeCroy announced it had enteredRubber duck debugging (529 words) [view diff] case mismatch in snippet view article find links to article
Sirota, Miroslav (2023). "Tell Us What You Really Think: A Think Aloud Protocol Analysis of the Verbal Cognitive Reflection Test". Journal of IntelligenceIntrusion detection system (5,513 words) [view diff] exact match in snippet view article find links to article
methods: signature-based, statistical anomaly-based, and stateful protocol analysis.: 301 Signature-based detection: Signature-based IDS monitors packetsUnification (computer science) (7,390 words) [view diff] exact match in snippet view article
used in SMT solvers, term rewriting algorithms, and cryptographic protocol analysis. A unification problem is a finite set E={ l1 ≐ r1, ..., ln ≐ rn }CoVLP (1,643 words) [view diff] exact match in snippet view article find links to article
the Delta variant, and 88.6% against the Gamma variant in the per-protocol analysis, with "similar" results in the intention-to-treat analysis. "ProductHerbert A. Simon (5,984 words) [view diff] exact match in snippet view article find links to article
Anders Ericsson, Simon developed the experimental technique of verbal protocol analysis. Simon was interested in the role of knowledge in expertise. He saidZoom (software) (8,699 words) [view diff] exact match in snippet view article
accused Zoom's security team of failing to credit his open-source protocol analysis research software, Verifpal, with being instrumental during the designMPEG transport stream (1,723 words) [view diff] case mismatch in snippet view article find links to article
book}}: |website= ignored (help) A Guide to MPEG Fundamentals and Protocol Analysis (PDF), Tektronix, p. 37, retrieved 23 April 2020 BD ROM – Audio VisualWireshark (1,674 words) [view diff] exact match in snippet view article find links to article
Internet service provider, Network Integration Services. The commercial protocol analysis products at the time were priced around $1500 and did not run on theOAuth (2,821 words) [view diff] exact match in snippet view article find links to article
Redirect" by Wang Jing. OAuth 2.0 has been analyzed using formal web protocol analysis. This analysis revealed that in setups with multiple authorizationDrawing (4,865 words) [view diff] exact match in snippet view article find links to article
F.; Kozbelt, A.; Sitaras, S. (2011). "Think global, act local: A protocol analysis comparison of artists' and nonartists' cognitions, metacognitionsNetwork Security Toolkit (372 words) [view diff] exact match in snippet view article find links to article
Mercator World Map bit image, a browser-based packet capture and protocol analysis system capable of monitoring up to four network interfaces using WiresharkDolev–Yao model (486 words) [view diff] case mismatch in snippet view article find links to article
Quingfeng; Zhang, Chengqi; Zhang, Shichao (2008), Secure Transaction Protocol Analysis: Models and Applications, Lecture Notes in Computer Science / ProgrammingIntrospection (3,409 words) [view diff] case mismatch in snippet view article find links to article
reports and the analysis of rules: A review of Ericsson and Simon's Protocol Analysis: Verbal Reports as Data". Journal of the Experimental Analysis ofMatrix-M (796 words) [view diff] exact match in snippet view article find links to article
and 67% in sites with age-based implementation in the modified per-protocol analysis. /> In influenza vaccine candidates, Matrix-M was shown to offer cross-protectionK. Anders Ericsson (901 words) [view diff] case mismatch in snippet view article find links to article
Herbert A. Simon on verbal reports of thinking is summarized in a book Protocol Analysis: Verbal Reports as Data, which was revised in 1993. In G. H. BowerCentipede game (2,905 words) [view diff] exact match in snippet view article find links to article
cooperation and competition in the Centipede game through verbal protocol analysis: Exploring cooperation". European Journal of Social Psychology. 46Pcap (1,574 words) [view diff] no match in snippet view article find links to article
application. Wireshark (formerly Ethereal), a graphical packet-capture and protocol-analysis tool. XLink Kai, software that allows various LAN console games toPatrick Lincoln (2,273 words) [view diff] exact match in snippet view article find links to article
Software Engineering, 371-374, 2000 cited 400 A meta-notation for protocol analysis, I Cervesato, NA Durgin, PD Lincoln, JC Mitchell, A Scedrov, ComputerMental rotation (5,425 words) [view diff] exact match in snippet view article find links to article
study used several methods such as reaction time studies, verbal protocol analysis, and eye tracking. In the initial reaction time experiments, thoseCertified wireless network expert (281 words) [view diff] exact match in snippet view article find links to article
covered by the other CWNP certification exams, including wireless protocol analysis, security, advanced design, spectrum analysis, wired network administrationErgonomics (8,102 words) [view diff] exact match in snippet view article find links to article
P. (2000). "A comparison of concurrent and retrospective verbal protocol analysis". The American Journal of Psychology. 113 (3): 387–404. doi:10.2307/1423365Catherine Meadows (277 words) [view diff] case mismatch in snippet view article find links to article
particular Preface, pp. vii–ix; "Cathy Meadows: A Central Figure in Protocol Analysis", Sylvan Pinsky, pp. 1–5; "A Long Slow Conversation", Jon Millen,Serial Peripheral Interface (5,952 words) [view diff] exact match in snippet view article find links to article
oscilloscopes). Most oscilloscope vendors offer optional support for SPI protocol analysis (both 2-, 3-, and 4-wire SPI) with triggering. Various alternativeBiliary microlithiasis (173 words) [view diff] case mismatch in snippet view article find links to article
detectable by ultrasound using a Rapid Patient Rotation Ultrasound Protocol Analysis of biliary sludge obtained through endoscopic retrograde cholangiopancreatographyDiscursive psychology (2,193 words) [view diff] exact match in snippet view article find links to article
their minds. Talk is seen as (and, in experimental psychology and protocol analysis, used as) descriptions of people's mental content. In contrast, discursiveBad Pharma (4,212 words) [view diff] exact match in snippet view article find links to article
it is misleading; ignoring patients who drop out (i.e. using per-protocol analysis, where only patients who complete the trial are counted in the finalPresentation timestamp (393 words) [view diff] case mismatch in snippet view article find links to article
fields. Packetized elementary stream Audio to video synchronization A Guide to MPEG Fundamentals and Protocol Analysis, specification notes by Tektronix.Cas Cremers (444 words) [view diff] exact match in snippet view article find links to article
protocols. This work ranges from developing mathematical foundations for protocol analysis to the development of analysis tools, notably the Scyther and TamarinDual process theory (7,233 words) [view diff] case mismatch in snippet view article find links to article
Miroslav (2023-04-21). "Tell Us What You Really Think: A Think Aloud Protocol Analysis of the Verbal Cognitive Reflection Test". Journal of IntelligenceBorder Gateway Protocol (7,970 words) [view diff] case mismatch in snippet view article find links to article
RFC 4273, Definitions of Managed Objects for BGP-4 RFC 4274, BGP-4 Protocol Analysis RFC 4275, BGP-4 MIB Implementation Survey RFC 4276, BGP-4 ImplementationList of statistics articles (8,280 words) [view diff] exact match in snippet view article find links to article
(prob/stats related court case) Per capita Per-comparison error rate Per-protocol analysis Percentile Percentile rank Periodic variation – redirects to SeasonalityRV 144 (2,170 words) [view diff] exact match in snippet view article find links to article
persons originally enrolled in the trial, and p=0.16 for the "per protocol analysis" including only persons from the modified intent to treat group whoIntermittent preventive therapy (2,534 words) [view diff] no match in snippet view article find links to article
intervention and 38% in the comparison areas (p=0.06). In a ‘per protocol’ analysis, which only included infants who actually received IPTi there wasAggelos Kiayias (1,986 words) [view diff] no match in snippet view article find links to article
A. Garay, Aggelos Kiayias, Nikos Leonardos: The Bitcoin Backbone Protocol: Analysis and Applications. EUROCRYPT (2) 2015: 281–310 Aggelos Kiayias, SerdarReachability analysis (1,705 words) [view diff] exact match in snippet view article find links to article
over half- duplex links, C.ACM 12, 260 (1969). Note: In the case of protocol analysis, there are normally only two entities. Note: The corruption or lossDarren Kimura (2,933 words) [view diff] exact match in snippet view article find links to article
of Savvius formerly known as WildPackets famous for their OmniPeek protocol analysis software. Kimura retired from LiveAction business operations in 2019Wearable cardioverter defibrillator (5,308 words) [view diff] exact match in snippet view article find links to article
endpoints, thus positive results for the use of the WCD. In a per protocol analysis (PPA) published in 2020, the reduction in arrhythmic mortality wasReproductive immunology (4,960 words) [view diff] case mismatch in snippet view article find links to article
Gonadotropin-Detected Pregnancy, Pregnancy Loss, and Live Birth: Per Protocol Analysis of a Randomized Trial". Annals of Internal Medicine. 174 (5): 595–601IoT forensics (2,638 words) [view diff] exact match in snippet view article find links to article
investigations, involving different tools and appropriate network protocol analysis. Cloud forensics: Process of extrapolating information in the cloudDual process theory (moral psychology) (8,138 words) [view diff] case mismatch in snippet view article
Sirota, Miroslav (2023). "Tell Us What You Really Think: A Think Aloud Protocol Analysis of the Verbal Cognitive Reflection Test". Journal of IntelligenceAttribute hierarchy method (6,762 words) [view diff] exact match in snippet view article find links to article
Issues and Practice, 26, 3–16. Ericsson, K. A. & Simon, H. A. (1993). Protocol analysis: Verbal reports as data. Cambridge, MA: MIT Press. Leighton, J.P.Carbon Connect Delta Program (3,126 words) [view diff] no match in snippet view article find links to article
Retrieved 14 April 2023. "Carbon Capture and Storage and the London Protocol – Analysis". IEA. Retrieved 2023-04-14. Garrett, Justine; McCoy, Sean (2013-01-01)