Related references
Note: Only part of the references are listed.Overlapping Community Detection Based on Node Importance and Adjacency Information
Ping Wang et al.
SECURITY AND COMMUNICATION NETWORKS (2021)
On Manually Reverse Engineering Communication Protocols of Linux-Based IoT Systems
Kaizheng Liu et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Clustering of unknown protocol messages based on format comparison
Fanghui Sun et al.
COMPUTER NETWORKS (2020)
IPART: an automatic protocol reverse engineering tool based on global voting expert for industrial protocols
Xiaowei Wang et al.
INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS (2020)
Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis
Stephan Kleber et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
A Type-Aware Approach to Message Clustering for Protocol Reverse Engineering
Xin Luo et al.
SENSORS (2019)
IoT Application-Layer Protocol Vulnerability Detection using Reverse Engineering
Jian-Zhen Luo et al.
SYMMETRY-BASEL (2018)
Automatic Reverse Engineering of Private Flight Control Protocols of UAVs
Ran Ji et al.
SECURITY AND COMMUNICATION NETWORKS (2017)
Robust Network Traffic Classification
Jun Zhang et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2015)
Toward Unsupervised Protocol Feature Word Extraction
Zhuo Zhang et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2014)
Clustering by passing messages between data points
Brendan J. Frey et al.
SCIENCE (2007)
Reducing the dimensionality of data with neural networks
G. E. Hinton et al.
SCIENCE (2006)