Binary protocol

A binary protocol is a protocol which is intended or expected to be read by a machine rather than a human being, as opposed to a plain text protocol… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2001-2016
02420012016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Protocol message format extraction is a principal process of automatic network protocol reverse engineering when target protocol… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2016
2016
Representational state transfer (REST) is a wide-spread architecture style for decentralized applications. REST proposes the use… (More)
  • table I
  • figure 1
  • figure 2
  • table II
  • figure 3
Is this relevant?
2016
2016
As the development of network became more complex, protocol reverse engineering has attracted increasing attention and widely… (More)
Is this relevant?
2015
2015
We investigate the simultaneous stabilization of a set of subsystems controlled by a remote computer in a cyber-physical system… (More)
Is this relevant?
2015
2015
Few can deny the diverse applications of NoSQL Database technology today. The last decade has witnessed an exponential rise in… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2015
2015
Automatic protocol reverse engineering for application protocol is becoming more and more important for many applications such as… (More)
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2014
2014
Communication protocol reverse engineering has played an important role in the field of network security. Inferring protocol… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2012
2012
Extracting the protocol message format specifications of unknown applications from network traces is important for a variety of… (More)
  • figure 2
  • figure 3
  • figure 4
  • table I
  • figure 5
Is this relevant?
2012
2012
Within the last years, new techniques for network covert channels arose, such as covert channel overlay networking, protocol… (More)
  • figure 1
  • figure 2
Is this relevant?
2011
2011
Application-level protocol specifications are helpful for network security management, including intrusion detection and… (More)
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 3
Is this relevant?