Lifting Network Protocol Implementation to Precise Format Specification with Security Applications.
Qingkai ShiJunyang ShaoYapeng YeMingwei ZhengXiangyu ZhangPublished in: CoRR (2023)
Keyphrases
- access control
- protocol specification
- wavelet transform
- intrusion detection
- specification language
- neural network
- information systems
- metadata
- high level
- data sets
- efficient implementation
- network security
- information security
- security management
- security problems
- authentication protocol
- statistical databases
- security policies
- multimedia
- databases