Статті в журналах з теми "Protocol Reverse Engineering"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Protocol Reverse Engineering".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Sija, Baraka D., Young-Hoon Goo, Kyu-Seok Shim, Huru Hasanova, and Myung-Sup Kim. "A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View." Security and Communication Networks 2018 (2018): 1–17. http://dx.doi.org/10.1155/2018/8370341.
Повний текст джерелаYu, Tianxiang, Yang Xin, Yuexin Tao, Bingqing Hou, and Hongliang Zhu. "Network Communication Protocol Reverse Engineering Based on Auto-Encoder." Security and Communication Networks 2022 (October 6, 2022): 1–14. http://dx.doi.org/10.1155/2022/2924479.
Повний текст джерелаTao, Huan Qi, Fan Jia, and Yang Wang. "Comparative Analysis of the Status of the Network Protocol Reverse Engineering." Applied Mechanics and Materials 590 (June 2014): 722–26. http://dx.doi.org/10.4028/www.scientific.net/amm.590.722.
Повний текст джерелаDzhum, V. S., and V. A. Losev. "Analysis of network protocol reverse engineering tools." Information Security Questions, no. 1 (2021): 3–10. http://dx.doi.org/10.52190/2073-2600_2021_1_3.
Повний текст джерелаXiao, Ming-Ming, and Yu-Ping Luo. "Automatic protocol reverse engineering using grammatical inference." Journal of Intelligent & Fuzzy Systems 32, no. 5 (April 24, 2017): 3585–94. http://dx.doi.org/10.3233/jifs-169294.
Повний текст джерелаLuo, Jian-Zhen, Shun-Zheng Yu, and Jun Cai. "Capturing Uncertainty Information and Categorical Characteristics for Network Payload Grouping in Protocol Reverse Engineering." Mathematical Problems in Engineering 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/962974.
Повний текст джерелаHuang, Yuyao, Hui Shu, Fei Kang, and Yan Guang. "Protocol Reverse-Engineering Methods and Tools: A Survey." Computer Communications 182 (January 2022): 238–54. http://dx.doi.org/10.1016/j.comcom.2021.11.009.
Повний текст джерелаNarayan, John, Sandeep K. Shukla, and T. Charles Clancy. "A Survey of Automatic Protocol Reverse Engineering Tools." ACM Computing Surveys 48, no. 3 (February 8, 2016): 1–26. http://dx.doi.org/10.1145/2840724.
Повний текст джерелаJi, Yukai, Tao Huang, Chunlai Ma, Chao Hu, Zhanfeng Wang, and Anmin Fu. "IMCSA: Providing Better Sequence Alignment Space for Industrial Control Protocol Reverse Engineering." Security and Communication Networks 2022 (November 24, 2022): 1–9. http://dx.doi.org/10.1155/2022/8026280.
Повний текст джерелаCai, Jun, Jian-Zhen Luo, and Fangyuan Lei. "Analyzing Network Protocols of Application Layer Using Hidden Semi-Markov Model." Mathematical Problems in Engineering 2016 (2016): 1–14. http://dx.doi.org/10.1155/2016/9161723.
Повний текст джерелаZhao, Li Hua, Xue Jia Liang, Xiang Peng, Hua Feng Kong, and Mei Zhen Wang. "An Automatic Network Protocol State Machine Inference Method in Protocol Reverse Engineering." Applied Mechanics and Materials 513-517 (February 2014): 2496–501. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2496.
Повний текст джерелаLuo, Xin, Dan Chen, Yongjun Wang, and Peidai Xie. "A Type-Aware Approach to Message Clustering for Protocol Reverse Engineering." Sensors 19, no. 3 (February 10, 2019): 716. http://dx.doi.org/10.3390/s19030716.
Повний текст джерелаLuo, Jian-Zhen, Chun Shan, Jun Cai, and Yan Liu. "IoT Application-Layer Protocol Vulnerability Detection using Reverse Engineering." Symmetry 10, no. 11 (November 1, 2018): 561. http://dx.doi.org/10.3390/sym10110561.
Повний текст джерелаWANG, Ying, Li-ze GU, Zhong-xian LI, and Yi-xian YANG. "Protocol reverse engineering through dynamic and static binary analysis." Journal of China Universities of Posts and Telecommunications 20 (December 2013): 75–79. http://dx.doi.org/10.1016/s1005-8885(13)60217-4.
Повний текст джерелаStute, Milan, David Kreitschmann, and Matthias Hollick. "Reverse Engineering and Evaluating the Apple Wireless Direct Link Protocol." GetMobile: Mobile Computing and Communications 23, no. 1 (July 24, 2019): 30–33. http://dx.doi.org/10.1145/3351422.3351432.
Повний текст джерелаDuchêne, Julien, Colas Le Guernic, Eric Alata, Vincent Nicomette, and Mohamed Kaâniche. "State of the art of network protocol reverse engineering tools." Journal of Computer Virology and Hacking Techniques 14, no. 1 (January 25, 2017): 53–68. http://dx.doi.org/10.1007/s11416-016-0289-8.
Повний текст джерелаLiu, Hai Yan, Yue Zhao, and Rui Huang. "Study and Design on Vulnerability Discovering of Network Protocols." Applied Mechanics and Materials 556-562 (May 2014): 5526–30. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5526.
Повний текст джерелаWang, Xiaowei, Kezhi Lv, and Bo Li. "IPART: an automatic protocol reverse engineering tool based on global voting expert for industrial protocols." International Journal of Parallel, Emergent and Distributed Systems 35, no. 3 (September 3, 2019): 376–95. http://dx.doi.org/10.1080/17445760.2019.1655740.
Повний текст джерелаJi, Ran, Jian Wang, Chaojing Tang, and Ruilin Li. "Automatic Reverse Engineering of Private Flight Control Protocols of UAVs." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/1308045.
Повний текст джерелаTao, Siyu, Hongyi Yu, and Qing Li. "Bit-oriented format extraction approach for automatic binary protocol reverse engineering." IET Communications 10, no. 6 (April 14, 2016): 709–16. http://dx.doi.org/10.1049/iet-com.2015.0797.
Повний текст джерелаCaballero, Juan, and Dawn Song. "Automatic protocol reverse-engineering: Message format extraction and field semantics inference." Computer Networks 57, no. 2 (February 2013): 451–74. http://dx.doi.org/10.1016/j.comnet.2012.08.003.
Повний текст джерелаWang, Sheng, Wen-Shu Ni, Ze-Wen Chen, Bao Feng, Yu Ning, Yi-Hao Kang, and Yan Xia. "Nonadiabatic geometric quantum computation of W-state codes using invariant-based reverse engineering." Laser Physics Letters 20, no. 1 (December 8, 2022): 015203. http://dx.doi.org/10.1088/1612-202x/aca759.
Повний текст джерелаMa, Rongkuan, Hao Zheng, Jingyi Wang, Mufeng Wang, Qiang Wei, and Qingxian Wang. "Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis." Frontiers of Information Technology & Electronic Engineering 23, no. 3 (March 2022): 351–60. http://dx.doi.org/10.1631/fitee.2000709.
Повний текст джерелаWen, Shameng, Qingkun Meng, Chao Feng, and Chaojing Tang. "Protocol vulnerability detection based on network traffic analysis and binary reverse engineering." PLOS ONE 12, no. 10 (October 19, 2017): e0186188. http://dx.doi.org/10.1371/journal.pone.0186188.
Повний текст джерелаDing, Li Li, Zheng Wei Wang, and Xiao Ling Wang. "Auction-Based Resource Allocation in Computational Grids." Advanced Materials Research 816-817 (September 2013): 847–50. http://dx.doi.org/10.4028/www.scientific.net/amr.816-817.847.
Повний текст джерелаGao, Yan Lin, Wen Peng Wang, and Chuan Sheng Wu. "Exploring Data Communication at System Level through Reverse Engineering." Applied Mechanics and Materials 687-691 (November 2014): 3809–11. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.3809.
Повний текст джерелаHan, Joong Soo, and Eul Gyu Im. "Method of Protocol Reverse Engineering using Application Inference Method based on Symbolic Execution." KIISE Transactions on Computing Practices 25, no. 4 (April 30, 2019): 231–37. http://dx.doi.org/10.5626/ktcp.2019.25.4.231.
Повний текст джерелаLee, Min-Seob, Kyu-Seok Shim, Young-Hoon Goo, Ui-Jun Baek, Byeong-Min Chae, Ho-Won Moon, and Myung-Sup Kim. "Identification of Delimiter and Static Field in Protocol Reverse Engineering Using Statistic Analysis." Journal of Korean Institute of Communications and Information Sciences 44, no. 5 (May 31, 2019): 904–13. http://dx.doi.org/10.7840/kics.2019.44.5.904.
Повний текст джерелаKleber, Stephan, Lisa Maile, and Frank Kargl. "Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis." IEEE Communications Surveys & Tutorials 21, no. 1 (2019): 526–61. http://dx.doi.org/10.1109/comst.2018.2867544.
Повний текст джерелаAbeyesinghe, Anura, Igor Devetak, Patrick Hayden, and Andreas Winter. "The mother of all protocols: restructuring quantum information’s family tree." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 465, no. 2108 (June 5, 2009): 2537–63. http://dx.doi.org/10.1098/rspa.2009.0202.
Повний текст джерелаSummers, Joshua D., Claudia Eckert, and Ashok K. Goel. "Function in engineering: Benchmarking representations and models." Artificial Intelligence for Engineering Design, Analysis and Manufacturing 31, no. 4 (September 14, 2017): 401–12. http://dx.doi.org/10.1017/s0890060417000476.
Повний текст джерелаJärpe, Eric. "An Alternative Diffie-Hellman Protocol." Cryptography 4, no. 1 (February 25, 2020): 5. http://dx.doi.org/10.3390/cryptography4010005.
Повний текст джерелаLin, Ying-Dar, Yu-Kuen Lai, Quan Tien Bui, and Yuan-Cheng Lai. "ReFSM: Reverse engineering from protocol packet traces to test generation by extended finite state machines." Journal of Network and Computer Applications 171 (December 2020): 102819. http://dx.doi.org/10.1016/j.jnca.2020.102819.
Повний текст джерелаMomenian, Nayere, and Behrouz Tork Ladani. "Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages." Signal and Data Processing 16, no. 2 (September 1, 2019): 19–40. http://dx.doi.org/10.29252/jsdp.16.2.19.
Повний текст джерелаKang, Wang Lin, Xin Min Liu, and Kai Wang. "A Multi-Agent Management System for Grid Resource Allocation." Advanced Materials Research 760-762 (September 2013): 973–76. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.973.
Повний текст джерелаLuo, Jia-Ning, and Ming-Hour Yang. "EMV-Compatible Offline Mobile Payment Protocol with Mutual Authentication." Sensors 19, no. 21 (October 23, 2019): 4611. http://dx.doi.org/10.3390/s19214611.
Повний текст джерелаAryanfar, Asghar, Yara Ghamlouche, and William A. Goddard III. "Pulse Reverse Protocol for efficient suppression of dendritic micro-structures in rechargeable batteries." Electrochimica Acta 367 (January 2021): 137469. http://dx.doi.org/10.1016/j.electacta.2020.137469.
Повний текст джерелаDing, Li Li, Xiao Ling Wang, and Zheng Wei Wang. "A Grid Flow Management System for Resource Allocation Problem." Advanced Materials Research 706-708 (June 2013): 1985–88. http://dx.doi.org/10.4028/www.scientific.net/amr.706-708.1985.
Повний текст джерелаHan, Shi-Yuan, and Chang-Yue Zhang. "ASMAC: An Adaptive Slot Access MAC Protocol in Distributed VANET." Electronics 11, no. 7 (April 5, 2022): 1145. http://dx.doi.org/10.3390/electronics11071145.
Повний текст джерелаMarino, Bruno D. V., Vinh Truong, J. William Munger, and Richard Gyimah. "Direct measurement forest carbon protocol: a commercial system-of-systems to incentivize forest restoration and management." PeerJ 8 (April 27, 2020): e8891. http://dx.doi.org/10.7717/peerj.8891.
Повний текст джерелаHang, R., W. A. Krzymien, and C. L. Despins. "Improved MAC protocol for reverse link packet data transmission in wideband DS-CDMA." IEEE Transactions on Wireless Communications 2, no. 1 (January 2003): 162–74. http://dx.doi.org/10.1109/twc.2002.806388.
Повний текст джерелаAdhi, B. Anantasatya, Ruki Harwahyu, Abdusy Syarif, Harris Simaremare, R. Fitri Sari, and Pascal Lorenz. "AODV-UI Proof of Concept on MIPS-based Wireless Router." Journal of Communications Software and Systems 10, no. 1 (March 21, 2014): 14. http://dx.doi.org/10.24138/jcomss.v10i1.136.
Повний текст джерелаAslam, Kousar, Loek Cleophas, Ramon Schiffelers, and Mark van den Brand. "Interface protocol inference to aid understanding legacy software components." Software and Systems Modeling 19, no. 6 (June 28, 2020): 1519–40. http://dx.doi.org/10.1007/s10270-020-00809-2.
Повний текст джерелаLong, Hao, Shukui Zhang, Yang Zhang, Li Zhang, and Jin Wang. "A Privacy-Preserving Method Based on Server-Aided Reverse Oblivious Transfer Protocol in MCS." IEEE Access 7 (2019): 164667–81. http://dx.doi.org/10.1109/access.2019.2953221.
Повний текст джерелаEnamul Quadir, Md Shahed, and John A. Chandy. "Key Generation for Hardware Obfuscation Using Strong PUFs." Cryptography 3, no. 3 (July 17, 2019): 17. http://dx.doi.org/10.3390/cryptography3030017.
Повний текст джерелаSun, Haitao, Chengjie Jin, Xiaohan Helu, Hui Lu, Man Zhang, and Zhihong Tian. "Research on android infiltration technology based on the silent installation of an accessibility service." International Journal of Distributed Sensor Networks 16, no. 2 (February 2020): 155014772090362. http://dx.doi.org/10.1177/1550147720903628.
Повний текст джерелаLi, Fulin. "Application of Artificial Intelligence Technology in Computer Network Security Communication." Journal of Control Science and Engineering 2022 (July 21, 2022): 1–6. http://dx.doi.org/10.1155/2022/9785880.
Повний текст джерелаCui, Xinyu, and Guifen Chen. "Research on Distributed In-Vehicle Wireless Self-Organized Routing Protocol Distribution Mechanism." Journal of Sensors 2021 (October 13, 2021): 1–10. http://dx.doi.org/10.1155/2021/8343536.
Повний текст джерелаCui, Xinyu, and Guifen Chen. "Research on Distributed In-Vehicle Wireless Self-Organized Routing Protocol Distribution Mechanism." Journal of Sensors 2021 (October 13, 2021): 1–10. http://dx.doi.org/10.1155/2021/8343536.
Повний текст джерелаNGAN, A. H. W., and K. W. SIU. "Are super-long escalators safe? Lessons learned from the Langham Place escalator incident in Hong Kong." HKIE Transactions 28, no. 1 (April 15, 2021): 49–57. http://dx.doi.org/10.33430/v28n1thie-2019-0029.
Повний текст джерела