Search Results for author: Rens Wouter van der Heijden

Found 2 papers, 1 papers with code

Message Type Identification of Binary Network Protocols using Continuous Segment Similarity

1 code implementation9 Feb 2020 Stephan Kleber, Rens Wouter van der Heijden, Frank Kargl

Protocol reverse engineering based on traffic traces infers the behavior of unknown network protocols by analyzing observable network messages.

Networking and Internet Architecture Cryptography and Security

Multi-Source Fusion Operations in Subjective Logic

no code implementations3 May 2018 Rens Wouter van der Heijden, Henning Kopp, Frank Kargl

The purpose of multi-source fusion is to combine information from more than two evidence sources, or subjective opinions from multiple actors.

valid

Cannot find the paper you are looking for? You can Submit a new open access paper.