Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Network packet

Known as: Packet (network), Packet, Packet (information technology) 
A network packet is a formatted unit of data carried by a packet-switched network. Computer communications links that do not support packets, such as… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
The ever-increasing number of resource-constrained machine-type communication (MTC) devices is leading to the critical challenge… Expand
  • table I
  • figure 1
  • table II
  • table III
  • figure 2
Review
2019
Review
2019
Traffic classification has been studied for two decades and applied to a wide range of applications from QoS provisioning and… Expand
  • figure 1
  • table 1
  • table 2
Review
2019
Review
2019
Abstract Labeled data sets are necessary to train and evaluate anomaly-based network intrusion detection systems. This work… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • table II
Review
2019
Review
2019
Underwater Wireless Sensor Networks (UWSNs) contain several components such as vehicles and sensors that are deployed in a… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Review
2019
Review
2019
P4 has emerged as the de facto standard language for describing how network packets should be processed, and is becoming widely… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Review
2019
Review
2019
Abstract The Internet was initially used to transfer data packets between users and data sources with a specific IP address. Due… Expand
Review
2018
Review
2018
Peer-to-peer (P2P) energy trading has emerged as a next-generation energy-management mechanism for the smart grid that enables… Expand
  • figure 1
  • table I
  • table II
  • figure 2
  • figure 3
Review
2018
Review
2018
Machine learning is adopted in a wide range of domains where it shows its superiority over traditional rule-based algorithms… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Review
2017
Review
2017
In an increasingly networked world in which information is becoming increasingly actual, how can a system know with certainty… Expand
  • figure 2.1
  • figure 2.2
  • figure 2.3
  • figure 3.1
  • figure 3.2
Highly Cited
2003
Highly Cited
2003
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the… Expand
  • figure 1
  • figure 2