Skip to search formSkip to main contentSkip to account menu

Telnet

National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
2015
2015
With the wireless technologies being widely used, it is for sure that all types of wireless networking will become more and more… 
Highly Cited
2004
Highly Cited
2004
Intruders on the Internet often prefer to launch network intrusions indirectly, i.e., using a chain of hosts on the Internet as… 
2002
2002
  • 2002
  • Corpus ID: 58864501
センター利用者の皆様は,インターネットにおける通信内容は他者に傍受される可能性がある事を御存知でしょ うか.例えば通信にイーサネットを用いる場合,他の計算機から通信内容を傍受することが可能です.イーサネッ トは同じ通信線を共有して通信を行なう CSMA/CD… 
1998
1998
Abstract Since August 1995, near-infrared images of Neptune have regularly been obtained with the University-of-Hawaii telescope… 
Highly Cited
1997
Highly Cited
1997
A MUD (Multi-User Dungeon or, sometimes, Multi-User Dimension) is a network-accessible, multi-participant, user-extensible… 
Review
1996
Review
1996
The chapter begins by describing the fundamental concepts of hypertext and gives a brief overview of the different philosophical… 
Review
1995
Review
1995
In the last few years, an explosive growth in computer telecommunications has been brought about by advances in computer… 
Highly Cited
1994
Highly Cited
1994
Analyzes 3 million TCP connections that occurred during 15 wide-area traffic traces. The traces were gathered at five "stub… 
Review
1977
Review
1977
The protocol discussed in this paper was developed by many members of the ARPANET community starting in 1969 and continuing…