Protocol vulnerability detection based on network traffic analysis and binary reverse engineering
Events
Loading … Spinner

Mendeley | Further Information

{"title"=>"Protocol vulnerability detection based on network traffic analysis and binary reverse engineering", "type"=>"journal", "authors"=>[{"first_name"=>"Shameng", "last_name"=>"Wen", "scopus_author_id"=>"56237168400"}, {"first_name"=>"Qingkun", "last_name"=>"Meng", "scopus_author_id"=>"57192211415"}, {"first_name"=>"Chao", "last_name"=>"Feng", "scopus_author_id"=>"36600462800"}, {"first_name"=>"Chaojing", "last_name"=>"Tang", "scopus_author_id"=>"7404394649"}], "year"=>2017, "source"=>"PLoS ONE", "identifiers"=>{"issn"=>"19326203", "doi"=>"10.1371/journal.pone.0186188", "sgr"=>"85031739083", "scopus"=>"2-s2.0-85031739083", "isbn"=>"1111111111", "pui"=>"618803007"}, "id"=>"df5c1750-6d0d-3fe7-891a-219c66df0abf", "link"=>"http://www.mendeley.com/research/protocol-vulnerability-detection-based-network-traffic-analysis-binary-reverse-engineering", "reader_count"=>5, "reader_count_by_academic_status"=>{"Student > Master"=>3, "Researcher"=>1, "Other"=>1}, "reader_count_by_user_role"=>{"Student > Master"=>3, "Researcher"=>1, "Other"=>1}, "reader_count_by_subject_area"=>{"Computer Science"=>3, "Social Sciences"=>1, "Engineering"=>1}, "reader_count_by_subdiscipline"=>{"Engineering"=>{"Engineering"=>1}, "Social Sciences"=>{"Social Sciences"=>1}, "Computer Science"=>{"Computer Science"=>3}}, "group_count"=>1}

Scopus | Further Information

{"@_fa"=>"true", "link"=>[{"@_fa"=>"true", "@ref"=>"self", "@href"=>"https://api.elsevier.com/content/abstract/scopus_id/85031739083"}, {"@_fa"=>"true", "@ref"=>"author-affiliation", "@href"=>"https://api.elsevier.com/content/abstract/scopus_id/85031739083?field=author,affiliation"}, {"@_fa"=>"true", "@ref"=>"scopus", "@href"=>"https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85031739083&origin=inward"}, {"@_fa"=>"true", "@ref"=>"scopus-citedby", "@href"=>"https://www.scopus.com/inward/citedby.uri?partnerID=HzOxMe3b&scp=85031739083&origin=inward"}], "prism:url"=>"https://api.elsevier.com/content/abstract/scopus_id/85031739083", "dc:identifier"=>"SCOPUS_ID:85031739083", "eid"=>"2-s2.0-85031739083", "dc:title"=>"Protocol vulnerability detection based on network traffic analysis and binary reverse engineering", "dc:creator"=>"Wen S.", "prism:publicationName"=>"PLoS ONE", "prism:eIssn"=>"19326203", "prism:volume"=>"12", "prism:issueIdentifier"=>"10", "prism:pageRange"=>nil, "prism:coverDate"=>"2017-10-01", "prism:coverDisplayDate"=>"October 2017", "prism:doi"=>"10.1371/journal.pone.0186188", "citedby-count"=>"4", "affiliation"=>[{"@_fa"=>"true", "affilname"=>"National University of Defense Technology", "affiliation-city"=>"Changsha", "affiliation-country"=>"China"}], "pubmed-id"=>"29049409", "prism:aggregationType"=>"Journal", "subtype"=>"ar", "subtypeDescription"=>"Article", "article-number"=>"e0186188", "source-id"=>"10600153309", "openaccess"=>"1", "openaccessFlag"=>true}

Counter

  • {"month"=>"10", "year"=>"2017", "pdf_views"=>"44", "xml_views"=>"6", "html_views"=>"191"}
  • {"month"=>"11", "year"=>"2017", "pdf_views"=>"29", "xml_views"=>"2", "html_views"=>"153"}
  • {"month"=>"12", "year"=>"2017", "pdf_views"=>"27", "xml_views"=>"0", "html_views"=>"164"}
  • {"month"=>"1", "year"=>"2018", "pdf_views"=>"25", "xml_views"=>"0", "html_views"=>"66"}
  • {"month"=>"2", "year"=>"2018", "pdf_views"=>"68", "xml_views"=>"1", "html_views"=>"48"}
  • {"month"=>"3", "year"=>"2018", "pdf_views"=>"40", "xml_views"=>"2", "html_views"=>"50"}
  • {"month"=>"4", "year"=>"2018", "pdf_views"=>"26", "xml_views"=>"0", "html_views"=>"29"}
  • {"month"=>"5", "year"=>"2018", "pdf_views"=>"17", "xml_views"=>"0", "html_views"=>"29"}
  • {"month"=>"6", "year"=>"2018", "pdf_views"=>"8", "xml_views"=>"5", "html_views"=>"30"}
  • {"month"=>"7", "year"=>"2018", "pdf_views"=>"7", "xml_views"=>"3", "html_views"=>"27"}
  • {"month"=>"8", "year"=>"2018", "pdf_views"=>"9", "xml_views"=>"2", "html_views"=>"53"}
  • {"month"=>"9", "year"=>"2018", "pdf_views"=>"5", "xml_views"=>"1", "html_views"=>"44"}
  • {"month"=>"10", "year"=>"2018", "pdf_views"=>"12", "xml_views"=>"1", "html_views"=>"36"}
  • {"month"=>"11", "year"=>"2018", "pdf_views"=>"7", "xml_views"=>"1", "html_views"=>"47"}
  • {"month"=>"12", "year"=>"2018", "pdf_views"=>"18", "xml_views"=>"0", "html_views"=>"19"}
  • {"month"=>"1", "year"=>"2019", "pdf_views"=>"1", "xml_views"=>"2", "html_views"=>"9"}
  • {"month"=>"2", "year"=>"2019", "pdf_views"=>"16", "xml_views"=>"3", "html_views"=>"17"}
  • {"month"=>"3", "year"=>"2019", "pdf_views"=>"9", "xml_views"=>"1", "html_views"=>"18"}
  • {"month"=>"4", "year"=>"2019", "pdf_views"=>"10", "xml_views"=>"2", "html_views"=>"14"}
  • {"month"=>"5", "year"=>"2019", "pdf_views"=>"9", "xml_views"=>"0", "html_views"=>"19"}
  • {"month"=>"6", "year"=>"2019", "pdf_views"=>"8", "xml_views"=>"1", "html_views"=>"16"}
  • {"month"=>"7", "year"=>"2019", "pdf_views"=>"5", "xml_views"=>"2", "html_views"=>"16"}
  • {"month"=>"8", "year"=>"2019", "pdf_views"=>"24", "xml_views"=>"0", "html_views"=>"25"}
  • {"month"=>"9", "year"=>"2019", "pdf_views"=>"6", "xml_views"=>"1", "html_views"=>"17"}
  • {"month"=>"10", "year"=>"2019", "pdf_views"=>"5", "xml_views"=>"0", "html_views"=>"19"}
  • {"month"=>"11", "year"=>"2019", "pdf_views"=>"6", "xml_views"=>"1", "html_views"=>"18"}
  • {"month"=>"12", "year"=>"2019", "pdf_views"=>"8", "xml_views"=>"3", "html_views"=>"13"}
  • {"month"=>"1", "year"=>"2020", "pdf_views"=>"7", "xml_views"=>"0", "html_views"=>"15"}

PMC Usage Stats

  • {"unique-ip"=>"23", "full-text"=>"27", "pdf"=>"3", "abstract"=>"0", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"0", "supp-data"=>"1", "cited-by"=>"0", "year"=>"2017", "month"=>"11"}
  • {"unique-ip"=>"34", "full-text"=>"33", "pdf"=>"3", "abstract"=>"0", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"1", "supp-data"=>"0", "cited-by"=>"0", "year"=>"2017", "month"=>"12"}
  • {"unique-ip"=>"28", "full-text"=>"31", "pdf"=>"4", "abstract"=>"0", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"1", "supp-data"=>"0", "cited-by"=>"0", "year"=>"2018", "month"=>"1"}
  • {"unique-ip"=>"5", "full-text"=>"3", "pdf"=>"2", "abstract"=>"0", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"0", "supp-data"=>"0", "cited-by"=>"0", "year"=>"2018", "month"=>"2"}
  • {"unique-ip"=>"60", "full-text"=>"72", "pdf"=>"2", "abstract"=>"0", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"1", "supp-data"=>"0", "cited-by"=>"0", "year"=>"2018", "month"=>"3"}
  • {"unique-ip"=>"86", "full-text"=>"94", "pdf"=>"1", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"0", "supp-data"=>"0", "cited-by"=>"0", "year"=>"2019", "month"=>"1"}
  • {"unique-ip"=>"110", "full-text"=>"130", "pdf"=>"2", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"0", "supp-data"=>"2", "cited-by"=>"0", "year"=>"2018", "month"=>"11"}
  • {"unique-ip"=>"157", "full-text"=>"200", "pdf"=>"9", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"0", "supp-data"=>"0", "cited-by"=>"0", "year"=>"2018", "month"=>"9"}
  • {"unique-ip"=>"80", "full-text"=>"88", "pdf"=>"2", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"0", "supp-data"=>"1", "cited-by"=>"0", "year"=>"2018", "month"=>"12"}
  • {"unique-ip"=>"51", "full-text"=>"56", "pdf"=>"5", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"0", "supp-data"=>"0", "cited-by"=>"0", "year"=>"2018", "month"=>"4"}
  • {"unique-ip"=>"70", "full-text"=>"74", "pdf"=>"1", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"1", "supp-data"=>"0", "cited-by"=>"0", "year"=>"2018", "month"=>"5"}
  • {"unique-ip"=>"67", "full-text"=>"78", "pdf"=>"3", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"1", "supp-data"=>"0", "cited-by"=>"0", "year"=>"2018", "month"=>"6"}
  • {"unique-ip"=>"47", "full-text"=>"57", "pdf"=>"3", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"0", "supp-data"=>"1", "cited-by"=>"0", "year"=>"2018", "month"=>"7"}
  • {"unique-ip"=>"168", "full-text"=>"208", "pdf"=>"2", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"0", "supp-data"=>"3", "cited-by"=>"0", "year"=>"2018", "month"=>"10"}
  • {"unique-ip"=>"86", "full-text"=>"97", "pdf"=>"3", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"1", "supp-data"=>"23", "cited-by"=>"0", "year"=>"2018", "month"=>"8"}
  • {"unique-ip"=>"102", "full-text"=>"106", "pdf"=>"2", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"0", "supp-data"=>"1", "cited-by"=>"0", "year"=>"2019", "month"=>"2"}
  • {"unique-ip"=>"103", "full-text"=>"113", "pdf"=>"1", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"0", "supp-data"=>"0", "cited-by"=>"0", "year"=>"2019", "month"=>"3"}
  • {"unique-ip"=>"71", "full-text"=>"77", "pdf"=>"0", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"0", "supp-data"=>"0", "cited-by"=>"0", "year"=>"2019", "month"=>"4"}
  • {"unique-ip"=>"66", "full-text"=>"66", "pdf"=>"2", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"0", "supp-data"=>"2", "cited-by"=>"0", "year"=>"2019", "month"=>"5"}
  • {"unique-ip"=>"60", "full-text"=>"69", "pdf"=>"4", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"0", "supp-data"=>"0", "cited-by"=>"0", "year"=>"2019", "month"=>"8"}
  • {"unique-ip"=>"105", "full-text"=>"126", "pdf"=>"1", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"0", "supp-data"=>"0", "cited-by"=>"0", "year"=>"2019", "month"=>"9"}
  • {"unique-ip"=>"101", "full-text"=>"118", "pdf"=>"3", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"0", "supp-data"=>"0", "cited-by"=>"0", "year"=>"2019", "month"=>"10"}
  • {"unique-ip"=>"56", "full-text"=>"58", "pdf"=>"2", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"0", "supp-data"=>"1", "cited-by"=>"0", "year"=>"2019", "month"=>"12"}
Loading … Spinner
There are currently no alerts