Review Article
A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View
Figure 5
WASp: summarized architecture overview Figure reproduced from Choi et al. (2016), [under the Creative Commons Attribution License/public domain]}.