Control network

Results: 9285



#Item
901Cyberwarfare / Cyber security standards / Invensys / Professional certification / Security / Computer security / Computer network security

The Achilles Certification Program Goes Mainstream July 15, 2009 Wurldtech Announces 14th Certified Control System & Program Expansion To Address Emerging Cyber Security Challenges Faced By Critical Infrastructure Indust

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
902Technology / Cyber security standards / Cyberwarfare / Invensys / SCADA / Computer network security / Security / Computer security

Invensys I/A ZCP 270 Is Achilles Certified September 09, 2009 Wurldtech Announces 15th Industrial Control System To Achieve Internationally Recognized Benchmark For Cyber Security & Robustness Vancouver, BC, Canada — S

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
903Atmosphere / Air pollution / Air quality / United States Environmental Protection Agency / California Air Resources Board / Atmospheric sciences / Environment / Earth

Great Basin Unified Air Pollution Control District 2015 Annual Air Quality Monitoring Network Plan February 13, 2015

Add to Reading List

Source URL: www.gbuapcd.org

Language: English - Date: 2015-02-12 20:45:20
904Internet / Routing / Routing algorithms / Topology control / Network theory / Wireless networking / Link-state routing protocol / Routing in delay-tolerant networking / Network architecture / Computing / Wireless sensor network

Yale University Department of Computer Science Towards Mobility as a Network Control Primitive David K. Goldenberg∗1 , Jie Lin† , A. Stephen Morse†∗ , Brad E. Rosen∗ , Y. Richard Yang∗2

Add to Reading List

Source URL: www-net.cs.yale.edu

Language: English - Date: 2003-12-16 17:29:37
905Network performance / Data transmission / Flow control / TCP/IP / TCP congestion avoidance algorithm / Network congestion / Transmission Control Protocol / Additive increase/multiplicative decrease / Congestion window / Data / Information / Computing

Computer Networks–210 www.elsevier.com/locate/comnet Transient behaviors of TCP-friendly congestion control protocols q Y. Richard Yang, Min Sik Kim, Simon S. Lam

Add to Reading List

Source URL: www-net.cs.yale.edu

Language: English - Date: 2004-10-11 11:30:36
906Network architecture / Internet Protocol / Policy charging and rules function / Telecommunications engineering / 3GPP / Internet / IP Multimedia Subsystem / GPRS Core Network / Technology / Electronic engineering / Electronics

Distributed Decisions in Network Policy Control

Add to Reading List

Source URL: www.sandvine.com

Language: English
907Data / User Datagram Protocol / Transport layer / Transmission Control Protocol / TCP/IP model / Communications protocol / Internet Protocol / Packet loss / Traffic flow / Computing / Internet protocols / Network architecture

Unreliable Transport Protocol for Commodity–Based OpenGL Distributed Visualization Samuel Thibault ENS Lyon Olivier Festor∗

Add to Reading List

Source URL: dept-info.labri.fr

Language: English - Date: 2005-03-06 09:02:21
908Cyberwarfare / Computer security / SYN flood / Data security / Denial-of-service attack / Transmission Control Protocol / Ping / Firewall / Flooding / Computer network security / Denial-of-service attacks / Computing

Network Intrusion Detection of Third Party Effects by Richard Bejtlich, TaoSecurity www.bejtlich.net v1.01, 05 September 2000

Add to Reading List

Source URL: www.taosecurity.com

Language: English - Date: 2004-11-14 11:10:18
909Human interface device / D-STAR / Serial port / Network packet / Transmission Control Protocol / Computing / Computer hardware / Universal Serial Bus / USB flash drive

DLP-RF1 & DLP-RF1-Z USB / RF OEM Transceiver Module The DLP-RF1-Z combines a USB interface, Freescale™ MC13193 2.4GHz Direct-Sequence Spread Spectrum RF Transceiver IC and Freescale MC9S08GT60 microcontroller to form a

Add to Reading List

Source URL: www.ftdichip.com

Language: English - Date: 2012-05-14 07:25:08
910Computer network security / Internet privacy / Privacy / Password / Vulnerability / Ethics / Computer security / Security

Poster: A Set of Privacy Preserving Requirements For Smart Home Control System Mobile Apps Sophia Hannah, Jonathan Ganz, Andy Applebaum, Matt Bishop and Karl Levitt Department of Computer Science University of California

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:48
UPDATE