Abstract: In network trace-based protocol reverse engineering, multi-sequence alignment and sequence clustering algorithms are commonly used for message analysis. However, these approaches primarily ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results