Author:
Duchêne Julien,Le Guernic Colas,Alata Eric,Nicomette Vincent,Kaâniche Mohamed
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Hardware and Architecture,Software,Computer Science (miscellaneous)
Reference51 articles.
1. Angluin, D.: Learning regular sets from queries and counterexamples. Inf. Comput. 75(2), 87–106 (1987). doi:
10.1016/0890-5401(87)90052-6
2. Antunes, J., Neves, N., Verissimo, P.: Reverse engineering of protocols from network traces. In: 2011 18th Working Conference on Reverse Engineering (WCRE), pp. 169–178. IEEE, New York, NY (2011). doi:
10.1109/WCRE.2011.28
3. Beddoe, M.: Network Protocol Analysis using Bioinformatics Algorithms. (2004).
http://www.4tphi.net/~awalters/PI/pi.pdf
4. Beddoe, M.: Protocol Informatics Project. (2004).
http://www.4tphi.net/~awalters/PI/PI.html
5. Bohlin, T., Jonsson, B.: Regular Inference for Communication Protocol Entities. Technical Report 2008-024, Department of Information Technology, Uppsala University, Uppsala University, Sweden (2008)
Cited by
43 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献