Traffic to protocol reverse engineering.
Antonio TrifiloStefan BurschkaErnst W. BiersackPublished in: CISDA (2009)
Keyphrases
- reverse engineering
- network devices
- software engineering
- medium access control
- ip address
- software maintenance
- object oriented
- network layer
- gene regulatory networks
- dynamic analysis
- network traffic
- computer aided design
- program understanding
- legacy systems
- traffic flow
- business rules
- artificial intelligence
- software evolution
- denial of service attacks
- ip addresses
- reverse engineer
- conceptual schema
- machine learning
- data model
- database
- platform independent
- eye tracking
- program slicing