-
1
Clustering perception mining of network protocol’s stealth attack behavior
Published 2017-06-01Subjects: “…protocol reverse analysis…”
Get full text
Article -
2
Mining and utilization of network protocol’s stealth attack behavior
Published 2017-10-01Subjects: “…protocol reverse analysis…”
Get full text
Article -
3
Analysis of communication data of mobile terminal based on protocol reversal
Published 2018-12-01Subjects: Get full text
Article -
4
Progressive active inference method of protocol state machine
Published 2023-04-01Subjects: “…protocol reverse analysis…”
Get full text
Article