Skip to main content
guest
Join | Help | Sign In
maniali Home
guest| Join | Help | Sign In
maniali
  • Wiki Home
  • Recent Changes
  • Pages and Files
  • Members
  1. Home
  2. About
  3. Calender
  4. Contact
  5. d-POSL
  6. Docs
  7. Emerald
  8. FilesforUpload
  9. Flyerdposl
  10. Generalization
  11. Glossaries
  12. Godel
  13. HornLogic
  14. Interview
  15. jade
  16. jess
  17. Latex
  18. Links
  19. Literature
  20. MobileAgents
  21. Networking
  22. News
  23. Notation3
  24. Note
  25. OO jDREW
  26. Papers
  27. POSL
  28. Posl D-POSL
  29. Presentation
  30. Project
  31. ProjectAgenda
  32. Prolog
  33. Prova
  34. REST
  35. RuleML
  36. RuleRespGuide
  37. ruleresproadmap
  38. SemanticHandbook
  39. SemanticWeb
  40. Sioc
  41. SocialSemanticWeb
  42. Sparql
  43. SPImplementation
  44. SPInstallation
  45. SPInstantiations
  46. Survey
  47. Test
  48. Thesis

  1. calender
  2. emerald
  3. generalizationofsp
  4. glossaries
  5. hornlogic
  6. jade
  7. jess
  8. latex
  9. links
  10. literature
  11. mobileagents
  12. n3
  13. news
  14. oo jdrew
  15. posl
  16. prolog
  17. prova
  18. ruleml
  19. sioc
  20. sparql

Networking

Edit 0 5 …
  • 0 Tags
    • No tags
  • Notify
  • RSS
  • Backlinks
  • Source
  • Print
  • Export (PDF)
dekker.pdf
dekker.pdf
  • Details
  • Download
  • 587 KB

A Network Intrusion Detection System with the Snooping Agents.pdf
A Network Intrusion Detection System with the Snooping Agents.pdf
  • Details
  • Download
  • 537 KB

A Comprehensive Online Tool [WR-3] that Detects Security Flaws in Networks.pdf
A Comprehensive Online Tool [WR-3] that Detects Security Flaws in Networks.pdf
  • Details
  • Download
  • 1 MB

59298016-BackTrack.pdf
59298016-BackTrack.pdf
  • Details
  • Download
  • 264 KB

10.1.1.140.4986.pdf
10.1.1.140.4986.pdf
  • Details
  • Download
  • 238 KB

Federated Identity Management.pdf
Federated Identity Management.pdf
  • Details
  • Download
  • 736 KB


Papers:

Wireless-Network-Behavior-Under-ICMP-Ping-Flood-DoS-Attack-and-Mitigation-Techniques.pdf
Wireless-Network-Behavior-Under-ICMP-Ping-Flood-DoS-Attack-and-Mitigation-Techniques.pdf
  • Details
  • Download
  • 518 KB


Security Comparison of Wired and Wireless Network.pdf
Security Comparison of Wired and Wireless Network.pdf
  • Details
  • Download
  • 307 KB

Performance-analysis-of-wlan.pdf
Performance-analysis-of-wlan.pdf
  • Details
  • Download
  • 485 KB

Performance-Analysis-of-Wired-and-Wireless-LAN.pdf
Performance-Analysis-of-Wired-and-Wireless-LAN.pdf
  • Details
  • Download
  • 476 KB

Compare Network Simulators.pdf
Compare Network Simulators.pdf
  • Details
  • Download
  • 245 KB

Comparative Throughput of WiFi & Ethernet LANs.pdf
Comparative Throughput of WiFi & Ethernet LANs.pdf
  • Details
  • Download
  • 209 KB



CS 5865.pptx
CS 5865.pptx
  • Details
  • Download
  • 786 KB

CS 5865.pdf
CS 5865.pdf
  • Details
  • Download
  • 977 KB

OPNET Modeler and Ns Summary.pdf
OPNET Modeler and Ns Summary.pdf
  • Details
  • Download
  • 594 KB

help on how to format text

Help · About · Pricing · Privacy · Terms · Support · Upgrade
Contributions to http://maniali.wikispaces.com/ are licensed under a Creative Commons Attribution Share-Alike 3.0 License. Creative Commons Attribution Share-Alike 3.0 License
Portions not contributed by visitors are Copyright 2018 Tangient LLC
TES: The largest network of teachers in the world
Turn off "Getting Started"
  1. Home
  2. ...
Loading...