Protocol analysis is a psychological research method that elicits verbal reports from research participants. Protocol analysis is used to study thinking in cognitive psychology (Crutcher, 1994), cognitive science (Simon & Kaplan, 1989), and behavior analysis (Austin & Delaney, 1998). It has found further application in the design of surveys and interviews (Sudman, Bradburn & Schwarz, 1996), usability testing (Henderson, Smith, Podd, & Varela-Alvarez, 1995), educational psychology (Pressley & Afflerbach 1995; Renkl, 1997) and design research (Gero & McNeill 1998). With the introduction of video- and audio-based based surveys, the scale and scope of verbal report collection is increased dramatically compared to in-person verbal report recording (Byrd, Joseph, Gongora, & Sirota 2023).
Protocolanalysis is a psychological research method that elicits verbal reports from research participants. Protocolanalysis is used to study thinking...
A Compiler for the Analysis of Security Protocols cpsa: Symbolic cryptographic protocol analyzer "Knowledge In Security protocolS (KISS)". Archived from...
John Rieman. The method was developed based on the techniques of protocolanalysis by K. Ericsson and H. Simon. However, there are some significant differences...
artifacts discovered. Protocolanalysis – a means for extracting persons' thoughts while they are performing a task Formal analysis Metabolism in biology...
Sirota, Miroslav (2023). "Tell Us What You Really Think: A Think Aloud ProtocolAnalysis of the Verbal Cognitive Reflection Test". Journal of Intelligence...
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems...
packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal...
The Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data...
This analysis is known as an "on-treatment" or "per protocol" analysis. A per-protocolanalysis represents a "best-case scenario" to reveal the effect...
Typestate analysis, sometimes called protocolanalysis, is a form of program analysis employed in programming languages. It is most commonly applied to...
Monitoring (RMON) MIB was developed by the IETF to support monitoring and protocolanalysis of local area networks (LANs). The original version (sometimes referred...
have obtained 99.73% accuracy. Stateful protocolanalysis detection: This method identifies deviations of protocol states by comparing observed events with...
transmission and storage of audio, video, and Program and System Information Protocol (PSIP) data. It is used in broadcast systems such as DVB, ATSC and IPTV...
by Wang Jing. OAuth 2.0 has been analyzed using formal web protocolanalysis. This analysis revealed that in setups with multiple authorization servers...
from Savvius, a LiveAction company, for network troubleshooting and protocolanalysis. It supports an application programming interface (API) for plugins...
Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It uses encryption for secure communication over...
oscilloscopes). Most oscilloscope vendors offer optional support for SPI protocolanalysis (both 2-, 3-, and 4-wire SPI) with triggering. The term "master" is...
the security analysis of actual network protocols: Abadi & Blanchet used correspondence assertions to verify the certified email protocol. Abadi, Blanchet...
messages. Reachability analysis was introduced in a paper of 1978 for the analysis and verification of communication protocols. This paper was inspired...
Event Manager Server log Simple Network Management Protocol (SNMP) syslog-ng Web counter Web log analysis software "Eric Allman". Internet Hall of Fame. Retrieved...
The Montreal Protocol on Substances That Deplete the Ozone Layer is an international treaty designed to protect the ozone layer by phasing out the production...
Windows network stack where it performs packet inspection and layer-7 protocolanalysis. It has been noted as causing some issues with network connections...
documentation of the protocol be published internally. The report should include: A summation of relevant data and analysis from the protocol An explanation...
analysis of the protocol, concluding that the protocol was cryptographically sound. Another audit of the protocol was published in 2017. The protocol...
A bus analyzer is a type of a protocolanalysis tool, used for capturing and analyzing communication data across a specific interface bus, usually embedded...