Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,433,250 papers from all fields of science
Search
Sign In
Create Free Account
Binary protocol
A binary protocol is a protocol which is intended or expected to be read by a machine rather than a human being, as opposed to a plain text protocol…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Advanced Message Queuing Protocol
Apache Thrift
Binary file
EbXML
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Low Latency Stream Processing: Apache Heron with Infiniband & Intel Omni-Path
Supun Kamburugamuve
,
K. Ramasamy
,
Martin Swany
,
G. Fox
International Conference on Utility and Cloud…
2017
Corpus ID: 36685922
Worldwide data production is increasing both in volume and velocity, and with this acceleration, data needs to be processed in…
Expand
2016
2016
Selective Capping of Packet Payloads at Multi-Gb/s Rates
V. Uceda
,
Miguel Rodríguez
,
Javier Ramos
,
J. García-Dorado
,
J. Aracil
IEEE Journal on Selected Areas in Communications
2016
Corpus ID: 36814825
Network managers and analysts are well aware of the importance of network traces to understand traffic behavior, detect anomalies…
Expand
2016
2016
OPC UA hardware offloading engine as dedicated peripheral IP core
C. Iatrou
,
L. Urbas
IEEE International Workshop on Factory…
2016
Corpus ID: 10562016
OPCUA is a promising candidate for achieving a vertical semantic integration of field devices in the next generation of…
Expand
2015
2015
Netty in Action
Norman Maurer
,
M. Wolfthal
2015
Corpus ID: 181819063
Network applications must handle events intelligently and efficiently, establish priorities, resolve conflicts, and manage…
Expand
2014
2014
Inferring protocol state machine for binary communication protocol
Fanzhi Meng
,
Yuan Liu
,
Chunrui Zhang
,
Tong Li
,
Yang Yue
IEEE Workshop on Advanced Research and Technology…
2014
Corpus ID: 17191075
Communication protocol reverse engineering has played an important role in the field of network security. Inferring protocol…
Expand
Highly Cited
2012
Highly Cited
2012
N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols
Dina Hadziosmanovic
,
Lorenzo Simionato
,
Damiano Bolzoni
,
E. Zambon
,
S. Etalle
International Symposium on Recent Advances in…
2012
Corpus ID: 9319993
In recent years we have witnessed several complex and high-impact attacks specifically targeting "binary" protocols (RPC, Samba…
Expand
2011
2011
Efficient middleware and resource management in mobile peer-to-peer systems
O. Kassinen
2011
Corpus ID: 55328638
Mobile peer-to-peer (P2P) networks have emerged as a substrate for distributed wireless Internet applications. With P2P systems…
Expand
2009
2009
Traffic to protocol reverse engineering
A. Trifilo
,
S. Burschka
,
E. Biersack
IEEE Symposium on Computational Intelligence for…
2009
Corpus ID: 2382142
Network Protocol Reverse Engineering (NPRE) has played an increasing role in honeypot operations. It allows to automatically…
Expand
2009
2009
Validation of SDL specifications using EFSM-based test generation
W. E. Wong
,
Andy Restrepo
,
Byoungju Choi
Information and Software Technology
2009
Corpus ID: 6118381
Review
2004
Review
2004
Information Theory and the Security of Binary Data Perturbation
P. Vora
International Conference on Cryptology in India
2004
Corpus ID: 14127854
Random data perturbation (RDP) has been in use for several years in statistical databases and public surveys as a means of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE