Toward the Accurate Identification of Network Applications, Passive and Active Network Measurement, pp.41-54, 2005. ,
DOI : 10.1007/978-3-540-31966-5_4
Accurate, scalable in-network identification of p2p traffic using application signatures, Proceedings of the 13th conference on World Wide Web , WWW '04, pp.512-521, 2004. ,
DOI : 10.1145/988672.988742
Internet traffic classification using bayesian analysis techniques, ACM SIGMETRICS Performance Evaluation Review, pp.50-60, 2005. ,
DOI : 10.1145/1064212.1064220
URL : http://www.cl.cam.ac.uk/~awm22/publications/moore2005internet.pdf
Flow Clustering Using Machine Learning Techniques, Passive and Active Network Measurement, pp.205-214, 2004. ,
DOI : 10.1007/978-3-540-24668-8_21
Abacus: Accurate behavioral classification of P2P-TV traffic, Computer Networks, vol.55, issue.6, pp.1394-1411, 2011. ,
DOI : 10.1016/j.comnet.2010.12.004
The protocols, 2011. ,
Language identification in the limit, Information and Control, vol.10, issue.5, pp.447-474, 1967. ,
DOI : 10.1016/S0019-9958(67)91165-5
Results of the Abbadingo one DFA learning competition and a new evidence-driven state merging algorithm, Proc. 4th ICGI, pp.1-12, 1998. ,
DOI : 10.1007/BFb0054059
Liveness with (0, 1, infty)-counter abstraction, Proc. 14th CAV, pp.107-122, 2002. ,
DOI : 10.1007/3-540-45657-0_9
Deep Packet Inspection in Perspective: Tracing Its Lineage and Surveillance potentials. Citeseer, 2008. ,
Exact DFA Identification Using SAT Solvers, Grammatical Inference: Theoretical Results and Applications, pp.66-79, 2010. ,
DOI : 10.1007/978-3-642-15488-1_7
URL : http://www.st.ewi.tudelft.nl/~marijn/publications/DFA_ICGI.pdf
Learning regular sets from queries and counterexamples, Information and Computation, vol.75, issue.2, pp.87-106, 1987. ,
DOI : 10.1016/0890-5401(87)90052-6
URL : https://doi.org/10.1016/0890-5401(87)90052-6
On the Synthesis of Finite-State Machines from Samples of Their Behavior, IEEE Transactions on Computers, vol.21, issue.6, pp.592-597, 1972. ,
DOI : 10.1109/TC.1972.5009015
Principles of model checking, 2008. ,
The linear time - branching time spectrum, pp.278-297, 1990. ,
DOI : 10.1007/BFb0039066
From Asymmetry to Full Symmetry: New Techniques for Symmetry Reduction in Model Checking, Proc. 10th CHARME, pp.142-156, 1999. ,
DOI : 10.1007/3-540-48153-2_12
Automatic transition system model identifications for network applications from packet traces, 2017. ,
Automatic generation of software behavioral models, Proceedings of the 13th international conference on Software engineering , ICSE '08, pp.501-510, 2008. ,
DOI : 10.1145/1368088.1368157
Dynamically discovering likely program invariants to support program evolution, IEEE Transactions on Software Engineering, vol.27, issue.2, pp.99-123, 2001. ,
DOI : 10.1109/32.908957
Learning nondeterministic mealy machines, Proc. 12th ICGI, pp.109-123, 2014. ,
Efficient identification of timed automata: Theory and practice, 2010. ,
Generating models of infinite-state communication protocols using regular inference with abstraction, Testing Software and Systems, pp.188-204, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00767416
Iterative Refinement of Reverse-Engineered Models by Model-Based Testing, Proc. 2nd FM, pp.305-320, 2009. ,
DOI : 10.1007/978-3-642-05089-3_20
Scenario-based and value-based specification mining, Proceedings of the IEEE/ACM international conference on Automated software engineering, ASE '10, pp.423-458, 2012. ,
DOI : 10.1145/1858996.1859081
Reverse Engineering of Protocols from Network Traces, 2011 18th Working Conference on Reverse Engineering, pp.169-178, 2011. ,
DOI : 10.1109/WCRE.2011.28