共 43 条
- [1] Ali S, Sun HL, Zhao YW., Model learning: A survey of foundations, tools and applications, Frontiers of Computer Science, 15, 5, (2021)
- [2] Chalupar G, Peherstorfer S, Poll E, de Ruiter J, de Ruiter JEJ., Automated reverse engineering using LEGO, Proc. of the 8th USENIX Workship on Offensive Technologies, pp. 1-10, (2014)
- [3] de Ruiter J, Poll E., Protocol state fuzzing of TLS implementations, Proc. of the 24th USENIX Conf. on Security Symp, pp. 193-206, (2015)
- [4] Aslam K, Cleophas L, Schiffelers R, van den Brand M., Interface protocol inference to aid understanding legacy software components, Software and Systems Modeling, 19, 6, pp. 1519-1540, (2020)
- [5] Gold EM., Complexity of automaton identification from given data, Information & Control, 37, 3, pp. 302-320, (1978)
- [6] Angluin D., Learning regular sets from queries and counterexamples, Information & Computation, 75, 2, pp. 87-106, (1987)
- [7] Chow TS., Testing software design modeled by finite-state machines, IEEE Trans. on Software Engineering, SE-4, 3, pp. 178-187, (1978)
- [8] Fujiwara S, Bochmann GV, Khendek F, Amalou M, Ghedamsi A., Test selection based on finite state models, IEEE Trans. on Software Engineering, 17, 6, pp. 591-603, (1991)
- [9] Daniel LA, Poll E, de Ruiter J., Inferring OpenVPN state machines using protocol state fuzzing, Proc. of the 2018 IEEE European Symp. on Security and Privacy Workshops (EuroS&PW), pp. 11-19, (2018)
- [10] Guo JX, Gu CX, Chen X, Wei FS., Model learning and model checking of IPSec implementations for internet of things, IEEE Access, 7, pp. 171322-171332, (2019)