-
1by Wells, John DowlingSubjects: “...Network mobility...”
Published 2014
Get full text
Get full text
Others -
2by Good, Stephen D.Subjects: “...VSAT networks...”
Published 2014
Get full text
Get full text
Others -
3by Thorp, Brian J.Subjects: “...Session Initiation Protocol...”
Published 2014
Get full text
Get full text
Others -
4
-
5by Chugh, Sarabjeet SinghSubjects: “...Network...”
Published 2014
Get full text
Get full text
Others -
6by Snow, Michael ThomasSubjects: “...Wired Networks...”
Published 2014
Get full text
Get full text
Others -
7by McNevin, Timothy John“... become a critical research issue in network security. Recently, client puzzle protocols have received...”
Published 2014
Get full text
Get full text
Others -
8by Clore, Brittany Michelle“...Internet Protocol version 6 (IPv6) is being adopted in networks around the world as the Internet...”
Published 2014
Get full text
Get full text
Others -
9by Filippi, Geoffrey George“...) provides a mapping between host names and Internet Protocol (IP) addresses. Hosts that are configured using...”
Published 2014
Get full text
Get full text
Others -
10by DiMarco, Peter Lewis“... defenses to mitigate the effects. The two most notable defenses used are the firewall and Internet Protocol...”
Published 2013
Get full text
Others -
11by Hager, Creighton Tsuan-Ren“... and emerging Internet Protocol (IP) networks employing Differentiated Services (DiffServ). This work shows a...”
Published 2014
Get full text
Get full text
Others