Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 209,921,006 papers from all fields of science
Search
Sign In
Create Free Account
HTTP tunnel
Known as:
HTTP tunnel (software)
, HTTP tunneling
, Tunnel (disambiguation)
HTTP tunneling is a technique by which communications performed using various network protocols are encapsulated using the HTTP protocol, the network…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Anonymous web browsing
Firewall (computing)
Hypertext Transfer Protocol
ICMP tunnel
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Linked Data (in Low-Resource) Platforms: A Mapping for Constrained Application Protocol
G. Loseto
,
S. Ieva
,
F. Gramegna
,
M. Ruta
,
F. Scioscia
,
E. D. Sciascio
International Workshop on the Semantic Web
2016
Corpus ID: 19769444
This paper proposes a mapping of the Linked Data Platform (LDP) specification for Constrained Application Protocol (CoAP). Main…
Expand
2015
2015
Countermeasures for Covert Channel-Internal Control Protocols
J. Kaur
,
S. Wendzel
,
Michael Meier
ARES
2015
Corpus ID: 6008248
Network covert channels have become a sophisticated means for transferring hidden information over the network, and thereby…
Expand
2009
2009
Classification of audio and video traffic over HTTP protocol
Samruay Kaoprakhon
,
V. Visoottiviseth
9th International Symposium on Communications and…
2009
Corpus ID: 5855721
A widely use of the Internet introduces various online services such as online game, radio online, music online, TV online and…
Expand
2008
2008
Contacts for High-Resistivity (Cd,Mn)Te Crystals
M. Witkowska-Baran
,
A. Mycielski
,
+10 authors
R. James
IEEE Transactions on Nuclear Science
2008
Corpus ID: 1684614
Semi-insulating (Cd,Mn)Te crystals offer a material that may compete well with the commonly used (Cd,Zn)Te crystals for…
Expand
2007
2007
Detecting HTTP Tunnels with Statistical Mechanisms
Manuel Crotti
,
M. Dusi
,
F. Gringoli
,
L. Salgarelli
IEEE International Conference on Communications
2007
Corpus ID: 258761
Application level gateways and firewalls are commonly used to enforce security policies at network boundaries, especially in…
Expand
2003
2003
A 2-bit MONOS nonvolatile memory cell based on asymmetric double gate MOSFET structure
Kam Hung Yuen
,
T. Y. Man
,
A. Chan
,
M. Chan
IEEE Electron Device Letters
2003
Corpus ID: 44628531
A novel 2-bit/cell nonvolatile memory (NVM) with metal-oxide-nitride-oxide-semiconductor (MONOS) asymmetric double gate (ADG…
Expand
2002
2002
Detecting HTTP Tunneling Activities
D. Pack
,
W. Streilein
,
S. Webster
,
R. Cunningham
2002
Corpus ID: 16388072
In this paper we present a novel intrusion detection sys- tem which makes use of behavior proflles to identify HyperText Transfer…
Expand
Highly Cited
1997
Highly Cited
1997
Controlled cluster condensation into preformed nanometer-sized pits
H. Hövel
,
T. Becker
,
A. Bettac
,
B. Reihl
,
M. Tschudy
,
E. Williams
1997
Corpus ID: 55984811
We have performed scanning tunneling microscopy (STM) in ultrahigh vacuum and transmission electron microscopy (TEM) on silver…
Expand
Highly Cited
1997
Highly Cited
1997
Performance interactions between P-HTTP and TCP implementations
J. Heidemann
CCRV
1997
Corpus ID: 6992265
This document describes several performance problems resulting from interactions between implementations of persistent-HTTP (P…
Expand
Highly Cited
1975
Highly Cited
1975
A subnanosecond Josephson tunneling memory cell with nondestructive readout
H. Zappe
IEEE Journal of Solid-State Circuits
1975
Corpus ID: 23892205
The design and experimental investigation of a Josephson tunneling memory cell with nondestructive readout (NDRO) is described…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE