1 J. Cache, "Wright, Hacking exposed wireless: wireless security secrets & solutions" McGraw-Hill 2007
2 G. Tenebro, "W32. waledac threat analysis" 2009
3 E. Research, "USRP N2x0 Series Device Manual"
4 T. Berson, "Skype security evaluation" 31 : 2005
5 V. M. Igure, "Security issues in SCADA networks" 25 (25): 498-506, 2006
6 J. Antunes, "Reverse engineering of protocols from network traces" 169-178, 2011
7 J. -Z. Luo, "Position-based automatic reverse engineering of network protocols" 36 (36): 1070-1077, 2013
8 G. Starnberger, "Overbot : a botnet protocol based on Kademlia" 13-, 2008
9 IEEE Computer Society, "IEEE 802.11: Wireless LAN medium access control and physical layer specifications"
10 The GNU Radio Foundation, "GNU Radio"
1 J. Cache, "Wright, Hacking exposed wireless: wireless security secrets & solutions" McGraw-Hill 2007
2 G. Tenebro, "W32. waledac threat analysis" 2009
3 E. Research, "USRP N2x0 Series Device Manual"
4 T. Berson, "Skype security evaluation" 31 : 2005
5 V. M. Igure, "Security issues in SCADA networks" 25 (25): 498-506, 2006
6 J. Antunes, "Reverse engineering of protocols from network traces" 169-178, 2011
7 J. -Z. Luo, "Position-based automatic reverse engineering of network protocols" 36 (36): 1070-1077, 2013
8 G. Starnberger, "Overbot : a botnet protocol based on Kademlia" 13-, 2008
9 IEEE Computer Society, "IEEE 802.11: Wireless LAN medium access control and physical layer specifications"
10 The GNU Radio Foundation, "GNU Radio"
11 G. Bossert, "Exploiting Semantic for the Automatic Reverse Engineering of Communication Protocols" 2014
12 W. Cui, "Discoverer : Automatic Protocol Reverse Engineering from Network Traces" 1-14, 2007
13 Y. Wang, "Biprominer : Automatic mining of binary protocol features" 179-184, 2011
14 D. Andriesse, "An analysis of the zeus peer-to-peer protocol" VU University Amsterdam 2013
15 M. Lynn, "Advanced 802.11 attack" Black Hat Briefings 2002
16 J. Narayan, "A survey of automatic protocol reverse engineering tools" 48 (48): 40-, 2016
17 Y. Wang, "A semantics aware approach to automated reverse engineering unknown protocols" 1-10, 2012