{"id":"https://openalex.org/W3009862661","doi":"https://doi.org/10.1109/icoin48656.2020.9016521","title":"A study on unknown protocol security","display_name":"A study on unknown protocol security","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3009862661","doi":"https://doi.org/10.1109/icoin48656.2020.9016521","mag":"3009862661"},"language":"en","primary_location":{"id":"doi:10.1109/icoin48656.2020.9016521","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icoin48656.2020.9016521","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Conference on Information Networking (ICOIN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100363394","display_name":"Seungho Lee","orcid":"https://orcid.org/0009-0006-0151-8292"},"institutions":[{"id":"https://openalex.org/I24062138","display_name":"Konkuk University","ror":"https://ror.org/025h1m602","country_code":"KR","type":"education","lineage":["https://openalex.org/I24062138"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Seungho Lee","raw_affiliation_strings":["dept. of Computer Science & Engineering, Konkuk Univ., Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"dept. of Computer Science & Engineering, Konkuk Univ., Seoul, Korea","institution_ids":["https://openalex.org/I24062138"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013923198","display_name":"Won-jong Song","orcid":null},"institutions":[{"id":"https://openalex.org/I24062138","display_name":"Konkuk University","ror":"https://ror.org/025h1m602","country_code":"KR","type":"education","lineage":["https://openalex.org/I24062138"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Wonjong Song","raw_affiliation_strings":["dept. of IT Convergence Information Security, Konkuk Univ., Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"dept. of IT Convergence Information Security, Konkuk Univ., Seoul, Korea","institution_ids":["https://openalex.org/I24062138"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036609310","display_name":"Keechoen Kim","orcid":null},"institutions":[{"id":"https://openalex.org/I24062138","display_name":"Konkuk University","ror":"https://ror.org/025h1m602","country_code":"KR","type":"education","lineage":["https://openalex.org/I24062138"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Keechoen Kim","raw_affiliation_strings":["dept. of Computer Science & Engineering, Konkuk Univ., Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"dept. of Computer Science & Engineering, Konkuk Univ., Seoul, Korea","institution_ids":["https://openalex.org/I24062138"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100363394"],"corresponding_institution_ids":["https://openalex.org/I24062138"],"apc_list":null,"apc_paid":null,"fwci":0.1612,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.50660156,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"660","last_page":"662"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.8789292573928833},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7945588827133179},{"id":"https://openalex.org/keywords/universal-composability","display_name":"Universal composability","score":0.6533721089363098},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6292948126792908},{"id":"https://openalex.org/keywords/otway\u2013rees-protocol","display_name":"Otway\u2013Rees protocol","score":0.5378991365432739},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5231174826622009},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.5170448422431946},{"id":"https://openalex.org/keywords/internet-protocol-control-protocol","display_name":"Internet Protocol Control Protocol","score":0.4550044536590576},{"id":"https://openalex.org/keywords/protocol-analysis","display_name":"Protocol analysis","score":0.44133132696151733},{"id":"https://openalex.org/keywords/general-inter-orb-protocol","display_name":"General Inter-ORB Protocol","score":0.43284469842910767},{"id":"https://openalex.org/keywords/user-datagram-protocol","display_name":"User Datagram Protocol","score":0.4147428274154663},{"id":"https://openalex.org/keywords/internet-protocol-suite","display_name":"Internet protocol suite","score":0.3622969388961792},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3301832377910614},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.25469285249710083},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2074742615222931},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.19239956140518188},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.14617887139320374},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.13015639781951904},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.10327285528182983}],"concepts":[{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.8789292573928833},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7945588827133179},{"id":"https://openalex.org/C165751822","wikidata":"https://www.wikidata.org/wiki/Q7894118","display_name":"Universal composability","level":4,"score":0.6533721089363098},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6292948126792908},{"id":"https://openalex.org/C35788789","wikidata":"https://www.wikidata.org/wiki/Q1320237","display_name":"Otway\u2013Rees protocol","level":5,"score":0.5378991365432739},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5231174826622009},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.5170448422431946},{"id":"https://openalex.org/C162571340","wikidata":"https://www.wikidata.org/wiki/Q1667988","display_name":"Internet Protocol Control Protocol","level":5,"score":0.4550044536590576},{"id":"https://openalex.org/C133112747","wikidata":"https://www.wikidata.org/wiki/Q7251931","display_name":"Protocol analysis","level":2,"score":0.44133132696151733},{"id":"https://openalex.org/C75114861","wikidata":"https://www.wikidata.org/wiki/Q594324","display_name":"General Inter-ORB Protocol","level":5,"score":0.43284469842910767},{"id":"https://openalex.org/C20636137","wikidata":"https://www.wikidata.org/wiki/Q11163","display_name":"User Datagram Protocol","level":4,"score":0.4147428274154663},{"id":"https://openalex.org/C65567647","wikidata":"https://www.wikidata.org/wiki/Q81414","display_name":"Internet protocol suite","level":3,"score":0.3622969388961792},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3301832377910614},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25469285249710083},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2074742615222931},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.19239956140518188},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.14617887139320374},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.13015639781951904},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.10327285528182983},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C207828512","wikidata":"https://www.wikidata.org/wiki/Q1060131","display_name":"Challenge-Handshake Authentication Protocol","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icoin48656.2020.9016521","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icoin48656.2020.9016521","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Conference on Information Networking (ICOIN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47999998927116394,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W815498435","https://openalex.org/W1538375546","https://openalex.org/W1972428331","https://openalex.org/W1987384612","https://openalex.org/W2022023965","https://openalex.org/W2074231493","https://openalex.org/W2078623873","https://openalex.org/W2162783010","https://openalex.org/W2241428156","https://openalex.org/W2542218569","https://openalex.org/W2992401861","https://openalex.org/W6623053763","https://openalex.org/W6632460521","https://openalex.org/W6729112673","https://openalex.org/W7020685959"],"related_works":["https://openalex.org/W2268875388","https://openalex.org/W2350708904","https://openalex.org/W2350536881","https://openalex.org/W2381123248","https://openalex.org/W1967193464","https://openalex.org/W2391121612","https://openalex.org/W2039853888","https://openalex.org/W2237876205","https://openalex.org/W2140626418","https://openalex.org/W3009862661"],"abstract_inverted_index":{"Numerous":[0],"studies":[1],"are":[2],"being":[3],"conducted":[4,104],"on":[5,13],"the":[6,21,24,39,42,66,69,72,79,86,95,98,125,139,153],"unknown":[7,25],"protocol":[8,26,51,70,80,113,126,142],"inference,":[9],"which":[10],"is":[11,49,91],"based":[12],"inferences":[14],"about":[15],"various":[16],"protocols":[17],"that":[18],"emerged":[19],"with":[20],"IoT.":[22],"However,":[23],"used":[27],"only":[28],"within":[29],"a":[30,50,59,112],"specific":[31],"company":[32],"can't":[33],"be":[34,116,145],"easily":[35],"researched":[36],"due":[37],"to":[38,55,64,93,107,138,152],"security":[40],"of":[41,68,76,78,85,97,156],"data":[43],"itself.":[44],"In":[45,100],"addition,":[46],"since":[47],"it":[48,90],"developed":[52],"by":[53],"itself":[54],"protect":[56],"information":[57],"in":[58],"company,":[60],"it's":[61],"not":[62,115],"easy":[63],"find":[65],"specification":[67],"or":[71],"existence":[73],"and":[74,118,130,141],"characteristics":[75],"rules":[77],"as":[81],"an":[82,105],"inference":[83,143],"method":[84],"general":[87],"protocol.":[88,99,158],"Therefore,":[89],"hard":[92],"verify":[94],"safety":[96],"this":[101],"study,":[102],"we":[103],"experiment":[106],"determine":[108],"whether":[109],"if":[110,119],"such":[111],"could":[114,144],"inferred":[117],"possible,":[120],"provide":[121],"adequate":[122],"safety.":[123],"Using":[124],"automatic":[127],"analyzers":[128],"Netzob":[129],"Needleman-Wunsch":[131],"Algorithm,":[132],"simple":[133],"strings":[134],"were":[135],"separated":[136],"according":[137,151],"rules,":[140],"made":[146],"through":[147],"separate":[148],"experimental":[149],"procedures":[150],"structural":[154],"features":[155],"each":[157]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
