Source string Source string

English Actions
Sklower, K. 1989. `Improving the efficiency of the OSI checksum calculation <http://doi.acm.org/10.1145/74681.74684>`_. SIGCOMM Computer Communication Review 19, 5 (Oct. 1989), 32-43.
Sarrar, N., Maier, G., Ager, B., Sommer, R. and Uhlig, S., `Investigating IPv6 traffic <http://link.springer.com/chapter/10.1007/978-3-642-28537-0_2>`_, Passive and Active Measurements, Lecture Notes in Computer Science vol 7192, 2012, pp.11-20
Stallings, W., `Protocol Basics: Secure Shell Protocol <http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_12-4/124_ssh.html>`_, Internet Protocol Journal, vol 12, n 4, Dec. 2009
Stevens, R., `TCP/IP Illustrated : the Protocols <http://books.google.com/books?id=-btNds68w84C>`_, Addison-Wesley, 1994
Stevens, R., `UNIX Network Programming, Volume 1, Second Edition: Networking APIs: Sockets and XTI <http://books.google.com/books?id=ptSC4LpwGA0C>`_, Prentice Hall, 1998
Shreedhar and G. Varghese. `Efficient fair queueing using deficit round robin <http://doi.acm.org/10.1145/217391.217453>`_ SIGCOMM Computer Communication Review 25, 4 (October 1995), 231-242.
Turkovic, B., Kuipers, F., Uhlig, S., `Fifty Shades of Congestion Control: A Performance and Interactions Evaluation <https://arxiv.org/abs/1903.03852>`_ CoRR abs/1903.03852 (2019)
Thomborson, C., `The V.42bis Standard for Data-Compressing Modems <http://www.computer.org/portal/web/csdl/doi/10.1109/40.166712>`_, IEEE Micro, September/October 1992 (vol. 12 no. 5), pp. 41-53
The Unicode Consortium. `The Unicode Standard <http://unicode.org/versions/Unicode5.0.0/>`_, Version 5.0.0, defined by: The Unicode Standard, Version 5.0 (Boston, MA, Addison-Wesley, 2007
Vasseur, J., Pickavet, M., and Demeester, P., `Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS <http://books.google.com/books?id=nYO305Y5eNAC>`_. Morgan Kaufmann Publishers Inc., 2004
Varghese, G., `Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices <http://books.google.com/books?id=01QORuRF6fIC>`_, Morgan Kaufmann, 2005
Vyncke, E., Paggen, C., `LAN Switch Security: What Hackers Know About Your Switches <http://books.google.com/books?id=HkraAQAACAAJ>`_, Cisco Press, 2007
Wang XS, Balasubramanian A, Krishnamurthy A, Wetherall D. `How Speedy is SPDY ? <https://www.usenix.org/conference/nsdi14/technical-sessions/wang>`_ . In 11th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 14) 2014 (pp. 387-399).
White, R., Mc Pherson, D., Srihari, S., `Practical BGP <http://books.google.com/books?id=9OlSAAAAMAAJ>`_, Addison-Wesley, 2004
Wessels, D., Fomenkov, M., `Wow, That's a lot of packets <https://www.caida.org/publications/papers/2003/dnspackets/>`_, Passive and Active Network Measurement Workshop (PAM), Apr 2003
Williams, R. `A painless guide to CRC error detection algorithms`, August 1993, unpublished manuscript, https://web.archive.org/web/20060101004751/http://www.ross.net/crc/download/crc_v3.txt
Ware, R., Mukerjee, M., Seshan, S. and Sherry, J. `Modeling BBR's Interactions with Loss-Based Congestion Control <https://doi.org/10.1145/3355369.3355604>`_. In Proceedings of the Internet Measurement Conference (IMC '19). ACM, New York, NY, USA, 137-143.
ITU-T, recommendation X.200, `Open Systems Interconnection - Model and Notation <http://www.itu.int/rec/T-REC-X.200-199407-I/en>`_, 1994
Ylonen, T., `SSH — Secure Login Connections over the Internet <https://www.usenix.org/legacy/publications/library/proceedings/sec96/full_papers/ylonen/index.html>`_, Usenix Security 1996
Zimmermann T., Wolters B., Hohlfeld O., Wehrle K. `Is the web ready for HTTP/2 server push? <http://doi.acm.org/10.1145/3281411.3281434>`_ , Proceedings of the 14th International Conference on emerging Networking Experiments and Technologies 2018 Dec 4 (pp. 13-19). ACM.
Zimmermann, H., `OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection <https://dx.doi.org/10.1109/TCOM.1980.1094702>`_, IEEE Transactions on Communications, vol. 28, no. 4, April 1980, pp. 425 - 432.
Zakon, R., `Hobbes Internet Timeline <https://www.zakon.org/robert/internet/timeline/>`_, online, https://www.zakon.org/robert/internet/timeline/
Zheng, X., `Phishing with Unicode Domains <https://www.xudongz.com/blog/2017/idn-phishing/>`_, April 14, 2017, https://www.xudongz.com/blog/2017/idn-phishing/

Loading…

No matching activity found.
Browse all component changes

Glossary

English English
No related strings found in the glossary.

String information

Flags
read-only
Source string location
../../bibliography.rst:363
String age
5 years ago
Source string age
5 years ago
Translation file
locale/pot/bibliography.pot, string 150