Control message

Results: 842



#Item
111Software engineering / Information technology management / Middleware / Message-oriented middleware / Software architecture / Real-Time Innovations / Data distribution service / Database-centric architecture / Service-oriented architecture / Enterprise application integration / Systems engineering / Computing

WHITEPAPER Data-Centric Middleware Modular Software Infrastructure to Monitor, Control and Collect Real-Time Equipment Analytics

Add to Reading List

Source URL: www.rti.com

Language: English - Date: 2015-04-10 15:34:03
112Middleware / Data distribution service / Message-oriented middleware / Computer network security / Real-Time Innovations / SCADA / Service-oriented architecture / Access control / Communications protocol / Computing / Technology / Security

WHITEPAPER Four Keys to Securing Distributed Control Systems Executive Summary At the core of critical infrastructure and industrial applications, control systems drive today’s power grid,

Add to Reading List

Source URL: www.rti.com

Language: English - Date: 2015-04-10 15:34:04
113Internet protocols / Internet standards / Internet Control Message Protocol / Computer network security / Path MTU Discovery / ICMPv6 / ICMP Destination Unreachable / Transmission Control Protocol / Ip / Computing / Network architecture / Internet

Microsoft Word - draft-ietf-tcpm-icmp-attacks-00.txt

Add to Reading List

Source URL: www.gont.com.ar

Language: English - Date: 2011-11-08 11:19:24
114Sensor grid / Wireless sensor network / WS-ReliableMessaging / Grid computing / WS-Security / Java Message Service / Transmission Control Protocol / Middleware / Ping / Computing / System software / Message-oriented middleware

Grids for Real-time and Streaming Applications PPAM 2005 – 6th International Conference on Parallel Processing and Applied Mathematics Poznan Poland September

Add to Reading List

Source URL: icis.pcz.pl

Language: English - Date: 2005-11-11 16:38:14
115Network protocols / Internet protocols / Secure multicast / Data transmission / IP multicast / Transmission Control Protocol / Public-key cryptography / Message authentication code / Communications protocol / Data / Information / Network architecture

Efficient and Secure Source Authentication for Multicast Adrian Perrig  Ran Canetti

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:22:53
116Internet standards / Internet protocols / Traceroute / Internet Control Message Protocol / Ping / Ip / ICMP Time Exceeded / Time to live / Transmission Control Protocol / Computing / Internet / Network architecture

ICMP ActiveX Control ICMP ActiveX Control for Microsoft Windows

Add to Reading List

Source URL: www.distinct.com

Language: English - Date: 2003-06-11 16:30:02
117HMAC / Transmission Control Protocol / SCADA / Public-key cryptography / Block cipher modes of operation / Key / Cipher / Cryptography / Message authentication codes / Hashing

Crypto Corner Editors: Peter Gutmann, David Naccache, Charles C. Palmer, Room at the Bottom

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-08-15 15:03:54
118Virtual machine / Actor model / Transmission Control Protocol / Mesh networking / Message queue / Computing / Inter-process communication / RADIUS

Timed Virtual Stationary Automata for Mobile Networks Shlomi Dolev1 , Seth Gilbert2 , Limor Lahiani1 , Nancy Lynch2 , and Tina Nolte2 1 Dep. of Computer Science, Ben-Gurion University of the Negev, Beer-Sheva, 84105, Is

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2007-09-28 06:20:37
119Internet protocols / Data transmission / Communications protocol / Protocols / Transmission Control Protocol / IP multicast / Public-key cryptography / Message authentication code / Authentication / Cryptography / Data / Information

RSA Laboratories Volume 5, No. 2, Summer / Fall 2002 CONTENTS I.

Add to Reading List

Source URL: www.cryptrec.go.jp

Language: English - Date: 2013-08-15 00:54:53
120SMS / Marketing / Short message service center / Network congestion / Denial-of-service attack / Voice-mail / Control channel / Spam / RoS / Technology / Mobile technology / Text messaging

Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks Patrick Traynor, William Enck, Patrick McDaniel, and Thomas La Porta Systems and Internet Infrastructure Security Laboratory Networking and Securi

Add to Reading List

Source URL: www.enck.org

Language: English
UPDATE