Publisher
Springer International Publishing
Reference26 articles.
1. Anderson, D.P., and Landweber, L.H.: A grammar-based methodology for protocol specification and implementation. In: Proceedings of the Ninth Symposium on Data Communications, New York, NY, USA, SIGCOMM 1985, pp. 63–70. ACM (1985)
2. Basin, D., Cremers, C.: Know your enemy: compromising adversaries in protocol analysis. ACM Trans. Inf. Syst. Secur. 17(2), 7:1–7:31 (2014)
3. Antunes, J., Neves, N., Verissimo, P.: Reverse engineering of protocols from network traces. In: Proceedings of the 2011 18th Working Conference on Reverse Engineering, Washington, DC, USA, WCRE 2011, pp. 169–178. IEEE Computer Society (2011)
4. Jiang, L., Yang, X., Li, T.: The analysis and design for a network protocol analysis system based on winpcap. In: Communications Security Conference (CSC 2014), pp. 1–4, May 2014
5. Hai, L., Yue-Yue, Y., Chang, L., Li-Na, C.: A protocol analysis platform based on open source software. In: 2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC), pp. 846–849, December 2012