共 39 条
- [1] Ambainis A, 1996, LECT NOTES COMPUT SC, V1178, P233, DOI 10.1007/BFb0009499
- [3] Antunes J., 2011, 2011 18th Working Conference on Reverse Engineering, P169, DOI 10.1109/WCRE.2011.28
- [4] Biondi P., 2005, SCAPY EXPLORE NET NE
- [5] Bossert G., 2012, INT COMM CRIT C
- [8] Casacuberta F, 2000, LECT NOTES ARTIF INT, V1891, P1
- [9] Exploring Effective Fuzzing Strategies to Analyze Communication Protocols [J]. FEAST'19: PROCEEDINGS OF THE 3RD ACM WORKSHOP ON FORMING AN ECOSYSTEM AROUND SOFTWARE TRANSFORMATION, 2019, : 17 - 23
- [10] Inference and Analysis of Formal Models of Botnet Command and Control Protocols [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 426 - 439