Keyphrases
Bit Level
100%
Field Identification
100%
Protocol Reverse Engineering
100%
Network Traces
37%
Trace-based
37%
Engineering Method
25%
Utility Value
25%
Byte
25%
Multi-objective Decision Model
25%
Analysis Precision
25%
Reverse Engineering Technique
25%
Security Applications
12%
Exhaustive Search
12%
Precision Requirements
12%
Search Space
12%
Security Analysis
12%
Actual Use
12%
Internet Protocol
12%
Global Features
12%
Identification Problem
12%
Pareto Solution Set
12%
Local Characteristics
12%
Intrusion Detection
12%
Engineering Schemes
12%
Field Boundaries
12%
Space Reduction
12%
Wireless Protocol
12%
Field Segmentation
12%
Ease of Implementation
12%
Industrial Communication Protocols
12%
Vulnerability Mining
12%
Reverse Engineering Analysis
12%
Dedicated Devices
12%
Computer Science
Reverse Engineering
100%
Identification Field
100%
Multiobjective
25%
Decision Model
25%
Identification Problem
12%
Security Analysis
12%
Intrusion Detection
12%
Security Application
12%
Search Space
12%
Protocol Field
12%
Industrial Protocol
12%
Wireless Internet
12%
Analysis Technique
12%
Representativeness
12%
Exhaustive Search
12%
Pareto Solution
12%
Engineering Analysis
12%
Engineering
Reverse Engineering
100%
Engineering Method
25%
Engineering Analysis
12%
Exhaustive Search
12%
Pareto Solution
12%
Search Space
12%
Field Boundary
12%