Analyze Network Protocol's Hidden Behavior | IEEE Conference Publication | IEEE Xplore