Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2
hits: 16
1.
  • Toward Automated Field Sema... Toward Automated Field Semantics Inference for Binary Protocol Reverse Engineering
    Zhan, Mengqi; Li, Yang; Li, Bo ... IEEE transactions on information forensics and security, 2024, Volume: 19
    Journal Article
    Peer reviewed

    Network protocol reverse engineering is the basis for many security applications. A common class of protocol reverse engineering methods is based on the analysis of network message traces. After ...
Full text
Available for: IJS, NUK, UL
2.
  • Certain diagonal equations ... Certain diagonal equations and conflict-avoiding codes of prime lengths
    Hsia, Liang-Chung; Li, Hua-Chieh; Sun, Wei-Liang Finite fields and their applications, December 2023, 2023-12-00, Volume: 92
    Journal Article
    Peer reviewed
    Open access

    We study the construction of optimal conflict-avoiding codes (CAC) from a number theoretical point of view. The determination of the size of optimal CAC of prime length p and weight 3 is formulated ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
3.
  • Unsupervised Binary Protoco... Unsupervised Binary Protocol Clustering Based on Maximum Sequential Patterns
    Shi, Jiaxin; Ye, Lin; Li, Zhongwei ... Computer modeling in engineering & sciences, 2022, Volume: 130, Issue: 1
    Journal Article
    Open access

    With the rapid development of the Internet, a large number of private protocols emerge on the network. However, some of them are constructed by attackers to avoid being analyzed, posing a threat to ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
4.
  • An unknown Protocol improve... An unknown Protocol improved k-means clustering algorithm based on Pearson distance
    Yin, Shizhuang; Wang, Tao Journal of intelligent & fuzzy systems, 04/2020, Volume: 38, Issue: 4
    Journal Article
    Peer reviewed

    In order to solve the clustering problem of unknown binary protocols, an improved k-means unknown binary protocol clustering method is proposed, which determines the initial clustering center and ...
Full text
Available for: DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, UILJ, UKNU, UL, UM, UPUK
5.
  • Message Clustering Method f... Message Clustering Method for Private Binary Protocol
    XU Xudong, ZHANG Zhixiang, ZHANG Xian Jisuanji kexue yu tansuo, 06/2020, Volume: 14, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    Message clustering is one of the main steps of protocol reverse engineering. For the private binary protocol packets, the current message clustering method has the problem of message vectorization ...
Full text
Available for: NUK, UL, UM, UPUK
6.
  • ProsegDL: Binary Protocol Format Extraction by Deep Learning-based Field Boundary Identification
    Zhao, Sen; Wang, Jinfa; Yang, Shouguo ... 2022 IEEE 30th International Conference on Network Protocols (ICNP), 2022-Oct.-30
    Conference Proceeding

    Protocol reverse engineering can be applied to various security applications, including fuzzing, malware analysis, and intrusion detection. It aims to acquire an unknown protocol's format, semantic, ...
Full text
Available for: IJS, NUK, UL, UM
7.
  • Design of an Embedded Integrated Navigation Hardware Platform Based on OMAPL138
    Lu, Yongjie; Wang, Dongsheng; Zhang, Lei ... 2018 37th Chinese Control Conference (CCC), 2018-July
    Conference Proceeding

    The Global Positioning System (GPS) and Inertial Navigation System (INS) are the two main types of navigation system currently, they may complement each other very well, which make GPS/INS integrated ...
Full text
Available for: IJS, NUK, UL, UM
8.
  • Automatic Field Extraction of Extended TLV for Binary Protocol Reverse Engineering
    Huang, Zewen; Wu, Kui; Huang, Shengqiang ... 2022 International Conference on Computer Communications and Networks (ICCCN), 2022-July
    Conference Proceeding

    Type Length Value (TLV) is one of the main structures commonly used in network protocols. A large number of proprietary protocols, whose specification is unknown to the public, run in the current ...
Full text
Available for: IJS, NUK, UL, UM
9.
  • Binary Protocol Classification based on Information Entropy and Convolution Neural Network
    Yin, Shizhuang; Shi, Quan 2020 IEEE 2nd International Conference on Civil Aviation Safety and Information Technology (ICCASIT, 2020-Oct.-14
    Conference Proceeding

    In order to solve the problem that there are many kinds of unknown binary protocols on the network, which are not easy to manage, In order to ensure the safe and orderly operation of the network, it ...
Full text
Available for: IJS, NUK, UL, UM
10.
  • Design of an embedded multi-antenna satellite data acquisition system based on ARM-Linux
    Lu, Yongjie; Wang, Dongsheng; Zhu, Songhao 2018 Chinese Control And Decision Conference (CCDC), 2018-June
    Conference Proceeding

    The Global Positioning System (GPS) can provides high-precision positioning information. The GPS information of multi-antenna satellite data is acquired for attitude measurement. An embedded ...
Full text
Available for: IJS, NUK, UL, UM
1 2
hits: 16

Load filters