Dr. Varga Pál OData support

Department of Telecommunications and Media Informatics

Tags

100 GbE (1) · 100Gbit/s (4) · 4. generation mobile newtorks (1) · algorithm design (1) · Android (1) · Android application (1) · anomaly detection (1) · API (1) · application (1) · application whitelisting (1) · architecture (1) · ARP (1) · ARP protocol (1) · Arrowhead (4) · Arrowhead framework (4) · ASP.NET (1) · atomic clock (1) · attack (1) · auditing (2) · authentication (2) · authorization (2) · AWK (1) · Bluetooth (1) · call control (2) · call data record (1) · call data rekord (1) · central data-storage (1) · C-GEP (1) · Cisco (3) · Cisco Call Manager (1) · clock synchronization (1) · clocks (1) · cloud (2) · cloud security (1) · cloud services (1) · cloud-based technology (1) · core network (1) · correlation (1) · Cyber-Physical Cloud Computing (1) · cyber-physical systems (3) · csrf (1) · data analysis (1) · data center (1) · data mining (1) · data processing (1) · data science (1) · data security (1) · data transfer (1) · datamining (1) · DDoS (4) · defender (1) · defending (1) · defensive techniques (1) · Denial of Service (1) · Design of computer networks (1) · device control (1) · Distributed Denial of Service (1) · DoS (2) · electric vehicle (1) · embedded software development (1) · endpoint (1) · error detection (1) · Ethernet (2) · event forecasting (1) · Facebook (1) · failure analysis (1) · Fibre Channel over Ethernet (FCoE) (1) · firewall (1) · flooding (1) · FPGA (5) · FPGA environment (3) · FPGA-based device (2) · framework (1) · GPS (2) · graph-based algorithm (1) · GTP (2) · hardware design (1) · hardware protocol implementation (2) · High Availability (1) · high speed network (1) · high-speed networking (1) · ICMP protocol (1) · IDS (1) · IMS (1) · indoor localization (2) · indoor positioning (1) · Indoor positioning system (1) · injection (1) · Instagram (1) · Internet of Things (9) · interperability (1) · IoT (4) · IoT security (2) · IP network (1) · Iperf (1) · IPS (1) · IPTV (1) · IPv4 (1) · IT security (1) · Java (1) · JavaEE (1) · JSON (1) · Juniper (5) · Junos OS (1) · load balancing (2) · load test (1) · localization (1) · Log parser (1) · Long Term Evolution (LTE) (1) · LTE (2) · LTE core network (1) · microservices (1) · mobile application (1) · mobile network (1) · module testing (1) · monitoring (1) · needs analysis (1) · network attack (1) · network design (1) · Network Function Virtualization (1) · Network management (3) · network monitoring (4) · network protocol (1) · network security (2) · network traffic analysis (4) · network traffic measurement (1) · NFC (1) · Nginx (1) · node.js (1) · OAuth2 (1) · optimalisation (1) · orchestration (1) · orchestrator (2) · oscillator (1) · patch management (1) · performance analysis (1) · PHP programming (1) · Play Framework (1) · positioning (1) · Predictive Maintenance (1) · private cloud (1) · proactive maintenance (2) · Process modeling (1) · protection (1) · protocol (1) · Python (1) · QoE (1) · QoS (1) · Quality of Experience-QoE (1) · Quality of Service-QoS (2) · RAN (1) · React.js (1) · redundancy (1) · REST (1) · RESTful (1) · RFC 2544 (1) · RFID (1) · risk analysis (1) · RTLS (1) · S1 Application Protocol (1) · safety (1) · safety-critical systems (1) · SAML2 (1) · Scala (1) · scalability (1) · SDN (3) · SDN controller (1) · security (1) · security analysis (1) · security system (1) · security vulnerabilities (1) · server virtualization (1) · service (1) · service oriented architecture (4) · service-oriented architecture (1) · SIP (1) · smart metering (1) · smartphone (1) · SNMP (2) · SOA (1) · Software Defined Networking (1) · software testing (1) · sport (1) · structured network (1) · suffix array (1) · suffix tree (1) · system design (1) · TCP protocol (2) · tcxo (1) · team sport (1) · telecommunication (1) · test (1) · Test Environment (1) · testing in real industrial environment (1) · testing methods (1) · TFTP (1) · time (1) · time dilation (1) · Tinder (1) · UDP (1) · UWB (2) · VHDL (3) · Viavi (1) · virtualization (1) · VoIP server (1) · VoLTE (1) · WAF (1) · web (1) · web application (1) · webapplication (1) · Web-based authentication (1) · Wi-Fi (1) · Wireshark (2) · xss (1) · Yii2 (1)

Theses

52 theses in total.  View all theses »

By degree:

By semester: