Review Article

A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View

Figure 5

WASp: summarized architecture overview Figure reproduced from Choi et al. (2016), [under the Creative Commons Attribution License/public domain]}.