A. Moore and K. Papagiannaki, Toward the Accurate Identification of Network Applications, Passive and Active Network Measurement, pp.41-54, 2005.
DOI : 10.1007/978-3-540-31966-5_4

S. Sen, O. Spatscheck, and D. Wang, Accurate, scalable in-network identification of p2p traffic using application signatures, Proceedings of the 13th conference on World Wide Web , WWW '04, pp.512-521, 2004.
DOI : 10.1145/988672.988742

A. Moore and D. Zuev, Internet traffic classification using bayesian analysis techniques, ACM SIGMETRICS Performance Evaluation Review, pp.50-60, 2005.
DOI : 10.1145/1064212.1064220

URL : http://www.cl.cam.ac.uk/~awm22/publications/moore2005internet.pdf

A. Mcgregor, M. Hall, P. Lorier, and J. Brunskill, Flow Clustering Using Machine Learning Techniques, Passive and Active Network Measurement, pp.205-214, 2004.
DOI : 10.1007/978-3-540-24668-8_21

P. Bermolen, M. Mellia, M. Meo, D. Rossi, and S. Valenti, Abacus: Accurate behavioral classification of P2P-TV traffic, Computer Networks, vol.55, issue.6, pp.1394-1411, 2011.
DOI : 10.1016/j.comnet.2010.12.004

K. Fall, R. Stevens, and T. /. Ip, The protocols, 2011.

E. Gold, Language identification in the limit, Information and Control, vol.10, issue.5, pp.447-474, 1967.
DOI : 10.1016/S0019-9958(67)91165-5

K. Lang, B. Pearlmutter, and R. Price, Results of the Abbadingo one DFA learning competition and a new evidence-driven state merging algorithm, Proc. 4th ICGI, pp.1-12, 1998.
DOI : 10.1007/BFb0054059

A. Pnueli, J. Xu, and L. Zuck, Liveness with (0, 1, infty)-counter abstraction, Proc. 14th CAV, pp.107-122, 2002.
DOI : 10.1007/3-540-45657-0_9

C. Parsons, Deep Packet Inspection in Perspective: Tracing Its Lineage and Surveillance potentials. Citeseer, 2008.

M. Heule and S. Verwer, Exact DFA Identification Using SAT Solvers, Grammatical Inference: Theoretical Results and Applications, pp.66-79, 2010.
DOI : 10.1007/978-3-642-15488-1_7

URL : http://www.st.ewi.tudelft.nl/~marijn/publications/DFA_ICGI.pdf

D. Angluin, Learning regular sets from queries and counterexamples, Information and Computation, vol.75, issue.2, pp.87-106, 1987.
DOI : 10.1016/0890-5401(87)90052-6

URL : https://doi.org/10.1016/0890-5401(87)90052-6

A. Biermann and J. Feldman, On the Synthesis of Finite-State Machines from Samples of Their Behavior, IEEE Transactions on Computers, vol.21, issue.6, pp.592-597, 1972.
DOI : 10.1109/TC.1972.5009015

C. Baier and J. Katoen, Principles of model checking, 2008.

R. Van-glabbeek, The linear time - branching time spectrum, pp.278-297, 1990.
DOI : 10.1007/BFb0039066

A. Emerson and R. Trefler, From Asymmetry to Full Symmetry: New Techniques for Symmetry Reduction in Model Checking, Proc. 10th CHARME, pp.142-156, 1999.
DOI : 10.1007/3-540-48153-2_12

Z. Sabahi, F. Ghassemi, and F. Bajelan, Automatic transition system model identifications for network applications from packet traces, 2017.

D. Lorenzoli, L. Mariani, and M. Pezzè, Automatic generation of software behavioral models, Proceedings of the 13th international conference on Software engineering , ICSE '08, pp.501-510, 2008.
DOI : 10.1145/1368088.1368157

M. Ernst, J. Cockrell, W. Griswold, and D. Notkin, Dynamically discovering likely program invariants to support program evolution, IEEE Transactions on Software Engineering, vol.27, issue.2, pp.99-123, 2001.
DOI : 10.1109/32.908957

A. Khalili and A. Tacchella, Learning nondeterministic mealy machines, Proc. 12th ICGI, pp.109-123, 2014.

S. Verwer, Efficient identification of timed automata: Theory and practice, 2010.

F. Aarts, B. Jonsson, and J. Uijen, Generating models of infinite-state communication protocols using regular inference with abstraction, Testing Software and Systems, pp.188-204, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00767416

N. Walkinshaw, J. Derrick, and Q. Guo, Iterative Refinement of Reverse-Engineered Models by Model-Based Testing, Proc. 2nd FM, pp.305-320, 2009.
DOI : 10.1007/978-3-642-05089-3_20

D. Lo and S. Maoz, Scenario-based and value-based specification mining, Proceedings of the IEEE/ACM international conference on Automated software engineering, ASE '10, pp.423-458, 2012.
DOI : 10.1145/1858996.1859081

J. Antunes, N. Neves, and P. Verissimo, Reverse Engineering of Protocols from Network Traces, 2011 18th Working Conference on Reverse Engineering, pp.169-178, 2011.
DOI : 10.1109/WCRE.2011.28