共 26 条
[1]
Bossert G., Guihery F., Hiet G., Towards automated protocol reverse engineering using semantic information, Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, (2014)
[2]
Caballero J., Song D., Automatic protocol reverse-engineering: Message format extraction and field semantics inference, Computer Networks, 57, 2, pp. 451-474, (2013)
[3]
Chang W., Mohaisen A., Wang A., Chen S., Measuring Botnets in the Wild: Some New Trends, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, (2015)
[4]
Comparetti P.M., Salvaneschi G., Kirda E., Kolbitsch C., Kruegel C., Zanero S., Identifying Dormant Functionality in Malware Programs, pp. 61-76, (2010)
[5]
Cui B., Wang F., Hao Y., Wang L., A taint based approach for automatic reverse engineering of gray-box file formats, Soft Computing, (2015)
[6]
Fanzhi Meng M., Liu Y., Zhang C., Li T., Inferring protocol state machine for binary communication protocol, Advanced Research and Technology in Industry Applications, 2014, pp. 870-874, (2014)
[7]
Ficco M., Security Event Correlation Approach for Cloud Computing, International Journal of High Performance Computing and Networking, 3, 3, pp. 173-185, (2013)
[8]
Hailong Sun J.H., Liu X., Li J., RECON: A novel approach to fighting unreliability in peer-to-peer grids, International Journal of Grid and Utility Computing, 2, pp. 77-84, (2011)
[9]
Hoang D.V.B.D.B., Multi-layer security analysis and experimentation of high speed protocol data transfer for GRID, International Journal of Grid and Utility Computing, 3, 2-3, pp. 81-88, (2012)
[10]
Juan Caballero D.S., Automatic protocol reverse-engineering: Message format extraction and field semantics inference, Computer Networks, 54, 2, pp. 451-474, (2012)