Found: 6
Select item for more details and to access through your institution.
A message keyword extraction approach by accurate identification of field boundaries.
- Published in:
- International Journal of Network Management, 2021, v. 31, n. 4, p. 1, doi. 10.1002/nem.2140
- By:
- Publication type:
- Article
Clustering method in protocol reverse engineering for industrial protocols.
- Published in:
- International Journal of Network Management, 2020, v. 30, n. 6, p. 1, doi. 10.1002/nem.2126
- By:
- Publication type:
- Article
Effective behavior signature extraction method using sequence pattern algorithm for traffic identification.
- Published in:
- International Journal of Network Management, 2018, v. 28, n. 2, p. 1, doi. 10.1002/nem.2011
- By:
- Publication type:
- Article
Application traffic classification using payload size sequence signature.
- Published in:
- International Journal of Network Management, 2017, v. 27, n. 5, p. n/a, doi. 10.1002/nem.1981
- By:
- Publication type:
- Article
Changes in hepatitis B virus antibody titers over time among children: a single center study from 2012 to 2015 in an urban of South Korea.
- Published in:
- 2017
- By:
- Publication type:
- journal article
A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/8370341
- By:
- Publication type:
- Article