Showing 1 - 6 results of 6 for search '"protocol identification"', query time: 0.04s Refine Results
  1. 1

    Flow-awared identification model of sophisticated network application by Luo-shi ZHANG, Da-wei WANG, Yi-bo XUE

    Published 2015-03-01
    Subjects: “…protocol identification…”
    Get full text
    Article
  2. 2
  3. 3

    Monitoring approach for online security of cryptographic protocol by Yu-na ZHU, Ji-hong HAN, Lin YUAN, Yu-dan FAN, Han-tuo CHEN, Wen GU

    Published 2016-06-01
    Subjects: “…cryptographic protocol identification…”
    Get full text
    Article
  4. 4
  5. 5
  6. 6