Login / Signup
A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace.
Fusheng Wu
Huanguo Zhang
Wengqing Wang
Jianwei Jia
Shi Yuan
Published in:
Secur. Commun. Networks (2017)
Keyphrases
</>
synthetic data
cost function
dynamic programming
experimental evaluation
detection method
segmentation method
similarity measure
preprocessing
pairwise
significant improvement
probabilistic model
computational complexity
intrusion detection
authentication protocol