共 50 条
- [42] Protocol Reverse Engineering Using LDA and Association Analysis 2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 312 - 316
- [44] Recovery of communications protocol design from protocol execution traces SECOND IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS: HELD JOINTLY WITH 6TH CSESAW, 4TH IEEE RTAW, AND SES'96, 1996, : 265 - 272
- [46] Toward Fuzz Test Based on Protocol Reverse Engineering INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 : 892 - 897
- [47] PREUNN: Protocol Reverse Engineering using Neural Networks PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 345 - 356
- [48] An Automatic Protocol Reverse Engineering Approach from the Viewpoint of the TCP/IP Reference Model APNOMS 2020: 2020 21ST ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2020, : 43 - 48
- [49] An Improved Short Message Security Protocol For Home Network 2009 ETP INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATION (FCC 2009), 2009, : 62 - 65
- [50] MinVisited: A Message Routing Protocol for Delay Tolerant Network 2018 26TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP 2018), 2018, : 325 - 328