Publisher
Springer International Publishing
Reference18 articles.
1. L. C. Li Xiang-Dong, “A survey on methods of automatic protocol reverse engineering[C],” Proceedings of the 2011 Seventh International Conference on Computational Intelligence and Security., pp. 685-689, 2011.
2. D. V. B. D. B. Hoang, “Multi-layer security analysis and experimentation of high speed protocol data transfer for GRID,” International Journal of Grid and Utility Computing, vol. 3, pp. 81-88, 2012.
3. W. Chang, A. Mohaisen, A. Wang, and S. Chen, “Measuring Botnets in the Wild: Some New Trends,” presented at the Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, Singapore, Republic of Singapore, 2015.
4. L.-z. G. Ying WANGa, Zhong-xian LIb, Yi-xian YANGa, “Protocol reverse engineering through dynamic and static binary analysis,” The Journal of China Universities of Posts and Telecommunications, vol. 20, pp. 75–79, 2013.
5. J. Narayan, S. K. Shukla, and T. C. Clancy, “A Survey of Automatic Protocol Reverse Engineering Tools,” ACM Comput. Surv., vol. 48, pp. 1-26, 2015.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Deep Learning-Based Reverse Method of Binary Protocol;Communications in Computer and Information Science;2020