From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Key-count differential-based proactive key relay algorithm for scalable quantum-secured networking., , , и . J. Opt. Commun. Netw., 15 (5): 282-293 (мая 2023)The Method of Clustering Network Traffic Classifications for Extracting Payload Signature by Function., , , , и . ICTC, стр. 1335-1337. IEEE, (2018)Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services., , и . KSII Trans. Internet Inf. Syst., 12 (4): 1572-1593 (2018)Application traffic classification using payload size sequence signature., , , и . Int. J. Netw. Manag., (2017)Effective behavior signature extraction method using sequence pattern algorithm for traffic identification., , , , , и . Int. J. Netw. Manag., (2018)A message keyword extraction approach by accurate identification of field boundaries., , , и . Int. J. Netw. Manag., (2021)Survey on network protocol reverse engineering approaches, methods and tools., , , , , и . APNOMS, стр. 271-274. IEEE, (2017)Automatic Payload Signature Update System for the Classification of Dynamically Changing Internet Applications., , , и . KSII Trans. Internet Inf. Syst., 13 (3): 1284-1297 (2019)Framework for precise protocol reverse engineering based on network traces., , , и . NOMS, стр. 1-4. IEEE, (2018)HTTP and DNS traffic traces for experimenting of protocol reverse engineering methods., , , и . (мая 2022)