SLIDE 21 Chair for Network Architectures and Services Technische Universit¨ at M¨ unchen
Bibliography I
[1] R. K¨
- tter J. Hagenauer. Skriptum zur Vorlesung Nachrichtentechnik 1, 2009.
[2] Zhao Yaqin, Ren Guanghui, Wang Xuexia, Wu Zhilu, and Gu Xuemai. Automatic digital modulation recognition using artificial neural networks. In Neural Networks and Signal Processing, 2003. Proceedings of the 2003 International Conference
[3] Antoine Valembois. Detection and recognition of a binary linear code. In Discrete Applied Mathematics, volume 111, 2001. [4] M. Marazin, R. Gautier, and G. Burel. Dual Code Method for Blind Identification of Convolutional Encoder for Cognitive Radio Receiver Design. In GLOBECOM Workshops, 2009 IEEE, pages 1–6, Nov 2009. [5] Paulo Verissimo Jo˜ ao Antunes, Nuno Ferreira Neves. ReverX: Reverse Engineering of Protocols. Technical report, LASIGE, University of Lisboa, Portugal, 2011. [6] Weidong Cui, Vern Paxson, Nicholas Weaver, and Randy H. Katz. Protocol-Independent Adaptive Replay of Application Dialog. In Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS), 2006. [7] Weidong Cui, Jayanthkumar Kannan, and Helen J. Wang. Discoverer: Automatic Protocol Reverse Engineering from Network Traces. In Proceedings of the 16th USENIX Security Symposium, 2007.
Technische Universit¨ at M¨ unchen – Chair for Network Architectures and Services 21