Author:
Wang YiPeng,Yun Xiaochun,Zhang Yongzheng,Chen Liwei,Wu Guangjun
Funder
National Natural Science Foundation of China
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference24 articles.
1. Cui, W., Kannan, J., Wang, H.J., Discoverer: automatic protocol reverse engineering from network traces. In: SS'07: Proceedings of the 16th USENIX Security Symposium on USENIX Security Symposium, 2007, pp. 1–14.
2. Kiss;Finamore;IEEE/ACM Trans. Netw.,2010
3. GT: picking up the truth from the ground for internet traffic;Gringoli;SIGCOMM Comput. Commun. Rev.,2009
4. Kannan, J., Jung, J., Paxson, V., Koksal, C.E., Semi-automated discovery of application session structure. In: IMC ’06: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 2006, pp. 119–132.
5. La Mantia, G., Rossi, D., Finamore, A., Mellia, M., Meo, M., Stochastic packet inspection for tcp traffic. In: Proceedings of the IEEE International Conference on Communications (ICC), 2010, pp. 1–6.
Cited by
25 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献