Research Article

A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols

Figure 15

Protocol analysis as a binary classification problem.