Subject
Computer Networks and Communications
Reference41 articles.
1. High-speed application protocol parsing and extraction for deep flow inspection;Liu;IEEE J. Sel. Areas Commun.,2014
2. N. Borisov, D. Brumley, H.J. Wang, J. Dunagan, P. Joshi, C. Guo, Generic Application-Level Protocol Analyzer and its Language, in: NDSS, 2007.
3. N. Stakhanova, A.A. Ghorbani, Managing intrusion detection rule sets, in: Proceedings of the Third European Workshop on System Security, 2010, pp. 29–35.
4. A review of anomaly based intrusion detection systems;Jyothsna;Int. J. Comput. Appl.,2011
5. L. Bilge, D. Balzarotti, W. Robertson, E. Kirda, C. Kruegel, Disclosure: Detecting botnet command and control servers through large-scale netflow analysis, in: Proceedings of the 28th Annual Computer Security Applications Conference, 2012, pp. 129–138.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Industrial Control Protocol Type Inference Using Transformer and Rule-based Re-Clustering;IEEE INFOCOM 2024 - IEEE Conference on Computer Communications;2024-05-20
2. Toward Automated Field Semantics Inference for Binary Protocol Reverse Engineering;IEEE Transactions on Information Forensics and Security;2024
3. Extracting Length Field of Unknown Binary Network Protocol from Static Trace;2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2023-11-01