• Protocol analysis is a psychological research method that elicits verbal reports from research participants. Protocol analysis is used to study thinking...
    3 KB (345 words) - 16:29, 22 April 2023
  • A Compiler for the Analysis of Security Protocols cpsa: Symbolic cryptographic protocol analyzer "Knowledge In Security protocolS (KISS)". Archived from...
    9 KB (1,009 words) - 18:49, 5 August 2024
  • John Rieman. The method was developed based on the techniques of protocol analysis by K. Ericsson and H. Simon. However, there are some significant differences...
    9 KB (1,167 words) - 00:48, 5 March 2024
  • per-protocol analysis, only patients who complete the entire clinical trial according to the protocol are counted towards the final results. Analysis of...
    11 KB (1,245 words) - 02:03, 7 March 2024
  • Thumbnail for Analysis
    artifacts discovered. Protocol analysis – a means for extracting persons' thoughts while they are performing a task Formal analysis Metabolism in biology...
    22 KB (2,486 words) - 12:56, 25 July 2024
  • Thumbnail for Border Gateway Protocol
    Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems...
    65 KB (7,969 words) - 20:39, 1 October 2024
  • Thumbnail for Rubber duck debugging
    Sirota, Miroslav (2023). "Tell Us What You Really Think: A Think Aloud Protocol Analysis of the Verbal Cognitive Reflection Test". Journal of Intelligence...
    6 KB (557 words) - 13:59, 29 September 2024
  • Thumbnail for Wireshark
    packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal...
    18 KB (1,715 words) - 13:32, 25 August 2024
  • Thumbnail for Network Time Protocol
    The Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data...
    57 KB (5,947 words) - 16:01, 26 September 2024
  • This analysis is known as an "on-treatment" or "per protocol" analysis. A per-protocol analysis represents a "best-case scenario" to reveal the effect...
    10 KB (1,131 words) - 00:32, 13 September 2024
  • Thumbnail for Ettercap (software)
    man-in-the-middle attacks on a LAN. It can be used for computer network protocol analysis and security auditing. It runs on various Unix-like operating systems...
    7 KB (564 words) - 17:45, 15 August 2024
  • Monitoring (RMON) MIB was developed by the IETF to support monitoring and protocol analysis of local area networks (LANs). The original version (sometimes referred...
    5 KB (627 words) - 17:32, 15 February 2024
  • the Six Sigma process improvement protocol: Analysis tools, which are used to perform statistical or process analysis; Program management tools, used to...
    3 KB (231 words) - 17:29, 20 March 2022
  • computer networking, the Name/Finger protocol and the Finger user information protocol are simple network protocols for the exchange of human-oriented status...
    6 KB (698 words) - 08:20, 16 June 2024
  • transmission and storage of audio, video, and Program and System Information Protocol (PSIP) data. It is used in broadcast systems such as DVB, ATSC and IPTV...
    25 KB (1,730 words) - 18:26, 22 September 2024
  • 3-D Secure (category Cryptographic protocols)
    resolving some of the short-comings of the original protocol. Analysis of the first version of the protocol by academia has shown it to have many security...
    24 KB (2,944 words) - 15:25, 5 July 2024
  • have obtained 99.73% accuracy. Stateful protocol analysis detection: This method identifies deviations of protocol states by comparing observed events with...
    46 KB (5,573 words) - 22:27, 1 August 2024
  • analysis services), fraud prevention, billing, local number portability, quality of service, surveillance (global call trace), maintenance (protocol analysis)...
    3 KB (313 words) - 15:53, 23 April 2024
  • perform real-time traffic analysis and packet logging on Internet Protocol (IP) networks. Snort performs protocol analysis, content searching and matching...
    6 KB (441 words) - 12:10, 5 July 2024
  • Support for LWAPP is also found in analysis products from AirMagnet, who has implemented a software based on this protocol to analyze Cisco wireless products...
    3 KB (434 words) - 04:00, 20 March 2024
  • from Savvius, a LiveAction company, for network troubleshooting and protocol analysis. It supports an application programming interface (API) for plugins...
    9 KB (969 words) - 10:52, 24 September 2024
  • OAuth (category Internet protocols)
    by Wang Jing. OAuth 2.0 has been analyzed using formal web protocol analysis. This analysis revealed that in setups with multiple authorization servers...
    26 KB (2,748 words) - 13:37, 22 September 2024
  • oscilloscopes). Most oscilloscope vendors offer optional support for SPI protocol analysis (both 2-, 3-, and 4-wire SPI) with triggering. Various alternative...
    51 KB (6,034 words) - 14:17, 28 September 2024
  • the security analysis of actual network protocols: Abadi & Blanchet used correspondence assertions to verify the certified email protocol. Abadi, Blanchet...
    13 KB (1,382 words) - 14:28, 13 February 2024
  • Thumbnail for HTTPS
    Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It uses encryption for secure communication over...
    40 KB (4,186 words) - 16:07, 1 October 2024
  • Syslog (redirect from Syslog (protocol))
    Event Manager Server log Simple Network Management Protocol (SNMP) syslog-ng Web counter Web log analysis software "Eric Allman". Internet Hall of Fame. Retrieved...
    16 KB (1,498 words) - 13:20, 2 October 2024
  • Thumbnail for Zoom (software)
    open-source protocol analysis research software, Verifpal, with being instrumental during the design phase of Zoom's new encryption protocol, as described...
    99 KB (8,548 words) - 22:45, 30 September 2024
  • The Digital Audio Access Protocol (DAAP) is the proprietary protocol introduced by Apple in its iTunes software to share media across a local network...
    8 KB (542 words) - 15:21, 26 January 2024
  • Thumbnail for Montreal Protocol
    The Montreal Protocol on Substances That Deplete the Ozone Layer is an international treaty designed to protect the ozone layer by phasing out the production...
    63 KB (6,268 words) - 17:09, 20 September 2024
  • CFosSpeed (category Internet Protocol based network software)
    Windows network stack where it performs packet inspection and layer-7 protocol analysis. It has been noted as causing some issues with network connections...
    4 KB (355 words) - 15:10, 8 March 2024