Computer Science ›› 2014, Vol. 41 ›› Issue (11): 12-15.doi: 10.11896/j.issn.1002-137X.2014.11.003
Previous Articles Next Articles
DU Xing-zhou,XU Chao and MENG Zhao-peng
[1] Ahlswede R,Cai Ning,Li Shuo-yen,et al.Network information flow[J].IEEE Transactions on Information Theory,2000,46(4):1204-1216 [2] 陶少国,黄佳庆,杨宗凯,等.网络编码研究综述[J].小型微型计算机系统,2008,29(4):583-592 [3] 张盛勇,陈世康.网络编码的安全问题初探[J].通信技术,2012,45(1):105-107 [4] Kienle H M,Müller H A.Rigi—An environment for software reverse engineering,exploration,visualization,and redocumentation[J].S cience of Computer Programming,2010,75(4):247-263 [5] 熊志强,黄佳庆,刘威,等.无线网络编码综述[J].计算机科学,2007,34(3):6-9 [6] 严秀,李龙澍.软件逆向工程技术研究[J].计算机技术与发展,2009,19(4):20-24 [7] Zhou Hui,Du Wen-cai.How Network Reverse Engineering Differs from Software Reverse Engineering[J].Wireless Communications and Applications ,2012,72(1):33-43 [8] Wondracek G,Comparetti M P,Kruegel C,et al.Automatic network protocol analysis[C]∥Proceedings of the Network and Distributed System Security Symposium,2008.San Diego,California,USA,2008 [9] 何永君,舒辉,熊小兵.基于动态二进制分析的网络协议逆向解析[J].计算机工程,2010,36(9):268-270 [10] Cui Wei-dong,Kannan J,Wang H J.Discoverer:automatic protocol reverse engineering from network traces[C]∥SS’07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium,2007.CA,USA,2007 [11] Antunes J,Neves N,Verissimo P.Reverse Engineering of Proto-cols from Network Traces[C]∥2011 18th Working Conference on Reverse Engineering (WCRE).Limerick,Ireland:IEEE,2011:169-178 [12] 彭磊,袁海,曾家智.无线传感器网络的协议再工程与方法研究[J].计算机集成制造系统,2008,14(6):1236-1243 [13] 黄政,王新.网络编码中的优化问题研究[J].软件学报,2009,20(5):1349-1361 [14] 刘外喜,余顺争,蔡君.安全的网络编码所面临的挑战和对策[J].计算机科学,2011,38(6):20-27 [15] 曹张华,唐元生.安全网络编码综述[J].计算机应用,2010,30(2):499-504 [16] Pamela S,Suzanne S.Law and Economics of Reverse Enginee-ring[J].Yale Law Journal,2002,111(7):1575-1664 [17] Madison M J.Some Optimism About Fair Use and CopyrightLaw[J].Journal of the Copyright Society of the USA,2010,57(3):351-370 [18] 张志斌,高峰,唐朝京.净室软件工程中的关键技术研究[J].计算机应用研究,2003,20(2):17-20 |
No related articles found! |
|