Research Article

A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols

Figure 12

Deficiency of TLM and SLM model in considering message parameters separately.