Login / Signup
Fingerprinting violating machines with in-memory protocol artefacts.
Mohammed I. Al-Saleh
Yaser Jararweh
Published in:
Int. J. Adv. Intell. Paradigms (2020)
Keyphrases
</>
lightweight
network protocols
interprocess communication
memory usage
coloured petri nets
memory requirements
computing power
memory space
ip address
memory size
state information
authentication protocol
memory management
communication protocol
security protocols
limited memory
main memory