Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Telnet

National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
With the wireless technologies being widely used, it is for sure that all types of wireless networking will become more and more… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 6
  • figure 4
2005
2005
Today's networking environment has become very complex. Networks have been growing in size rapidly and have come to support more… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2004
Highly Cited
2004
Intruders on the Internet often prefer to launch network intrusions indirectly, i.e., using a chain of hosts on the Internet as… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
2004
2004
Building and updating an effective intrusion detection system is complex engineering knowledge. A method of learning the… Expand
2002
2002
センター利用者の皆様は,インターネットにおける通信内容は他者に傍受される可能性がある事を御存知でしょ うか.例えば通信にイーサネットを用いる場合,他の計算機から通信内容を傍受することが可能です.イーサネッ トは同じ通信線を共有して通信を行なう CSMA/CD… Expand
1998
1998
Abstract Since August 1995, near-infrared images of Neptune have regularly been obtained with the University-of-Hawaii telescope… Expand
Highly Cited
1997
Highly Cited
1997
A MUD (Multi-User Dungeon or, sometimes, Multi-User Dimension) is a network-accessible, multi-participant, user-extensible… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
Highly Cited
1997
Highly Cited
1997
Electronic mail has become the unexciting and mundane electronic communication medium we love to hate. It wasn’t always that way… Expand
Highly Cited
1994
Highly Cited
1994
We analyze 2.5 million TCP connections that occurred during 14 wide-area traffic traces. The traces were gathered at five “stub… Expand
  • table 2
  • table 1
  • table 3
  • table 4
  • table 5
Review
1994
Review
1994
A recently completed single-site study has yielded information about how Internet traffic will evolve, as new users discover the… Expand
  • table 1
  • figure 1
  • table 2
  • figure 2
  • figure 3