1 code implementation • 9 Feb 2020 • Stephan Kleber, Rens Wouter van der Heijden, Frank Kargl
Protocol reverse engineering based on traffic traces infers the behavior of unknown network protocols by analyzing observable network messages.
Networking and Internet Architecture Cryptography and Security
no code implementations • 3 May 2018 • Rens Wouter van der Heijden, Henning Kopp, Frank Kargl
The purpose of multi-source fusion is to combine information from more than two evidence sources, or subjective opinions from multiple actors.