{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:14:13Z","timestamp":1749701653363,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491080"},{"type":"electronic","value":"9783319491097"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49109-7_61","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T09:03:15Z","timestamp":1477040595000},"page":"639-649","source":"Crossref","is-referenced-by-count":1,"title":["Instruction Sequences Clustering and Analysis of Network Protocol\u2019s Dormant Behaviors"],"prefix":"10.1007","author":[{"given":"Yan-Jing","family":"Hu","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"61_CR1","doi-asserted-by":"crossref","unstructured":"L. C. Li Xiang-Dong, \u201cA survey on methods of automatic protocol reverse engineering[C],\u201d Proceedings of the 2011 Seventh International Conference on Computational Intelligence and Security., pp. 685-689, 2011.","DOI":"10.1109\/CIS.2011.156"},{"key":"61_CR2","doi-asserted-by":"crossref","unstructured":"D. V. B. D. B. Hoang, \u201cMulti-layer security analysis and experimentation of high speed protocol data transfer for GRID,\u201d International Journal of Grid and Utility Computing, vol. 3, pp. 81-88, 2012.","DOI":"10.1504\/IJGUC.2012.047758"},{"key":"61_CR3","doi-asserted-by":"crossref","unstructured":"W. Chang, A. Mohaisen, A. Wang, and S. Chen, \u201cMeasuring Botnets in the Wild: Some New Trends,\u201d presented at the Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, Singapore, Republic of Singapore, 2015.","DOI":"10.1145\/2714576.2714637"},{"key":"61_CR4","doi-asserted-by":"crossref","unstructured":"L.-z. G. Ying WANGa, Zhong-xian LIb, Yi-xian YANGa, \u201cProtocol reverse engineering through dynamic and static binary analysis,\u201d The Journal of China Universities of Posts and Telecommunications, vol. 20, pp. 75\u201379, 2013.","DOI":"10.1016\/S1005-8885(13)60217-4"},{"key":"61_CR5","doi-asserted-by":"crossref","unstructured":"J. Narayan, S. K. Shukla, and T. C. Clancy, \u201cA Survey of Automatic Protocol Reverse Engineering Tools,\u201d ACM Comput. Surv., vol. 48, pp. 1-26, 2015.","DOI":"10.1145\/2840724"},{"key":"61_CR6","unstructured":"J. L. S. Yu, \u201cPosition-based automatic reverse engineering of network protocols,\u201d Journal of Network & Computer Applications, vol. 3, pp. 1070-1077, 2013."},{"key":"61_CR7","doi-asserted-by":"crossref","unstructured":"Y. W. Meijian Li, Shangjie Jin, Peidai Xie, \u201cReverse extraction of protocol model from network applications,\u201d International Journal of Internet Protocol Technology, vol. 7, pp. 228 - 245, 2013.","DOI":"10.1504\/IJIPT.2013.058671"},{"key":"61_CR8","doi-asserted-by":"crossref","unstructured":"D. C. C. Mansour, \u201cSecurity challenges in the internet of things,\u201d International Journal of Space-Based and Situated Computing, vol. 5, pp. 141-149, 2015.","DOI":"10.1504\/IJSSC.2015.070945"},{"key":"61_CR9","unstructured":"S. K. T. G. X. F. B. L. C. Chen, \u201cOptimizing Communication for Multi-Join Query Processing in Cloud Data Warehouses,\u201d International Journal of High Performance Computing and Networking, vol. 4, pp. 113-130, 2015."},{"key":"61_CR10","doi-asserted-by":"crossref","unstructured":"M. Ficco, \u201cSecurity Event Correlation Approach for Cloud Computing,\u201d International Journal of High Performance Computing and Networking, vol. 3, pp. 173-185, 2013.","DOI":"10.1504\/IJHPCN.2013.056525"},{"key":"61_CR11","unstructured":"W. Q.-Y. Zhang Zhao, Tang Wen, \u201cSurvey of mining protocol specifications[J],\u201d Computer Engineering and Applications., 2013."},{"key":"61_CR12","doi-asserted-by":"crossref","unstructured":"M. Fanzhi Meng, Yuan Liu, Chunrui Zhang, Tong Li \u201cInferring protocol state machine for binary communication protocol[C],\u201d Advanced Research and Technology in Industry Applications (WARTIA), 2014., pp. 870 - 874 2014","DOI":"10.1109\/WARTIA.2014.6976411"},{"key":"61_CR13","doi-asserted-by":"crossref","unstructured":"J. Newsome, D. Brumley, J. Franklin, and D. Song, \u201cReplayer: automatic protocol replay by binary analysis,\u201d presented at the Proceedings of the 13th ACM conference on Computer and communications security, Alexandria, Virginia, USA, 2006.","DOI":"10.1145\/1180405.1180444"},{"key":"61_CR14","doi-asserted-by":"crossref","unstructured":"B. Anderson, C. Storlie, and T. Lane, \u201cImproving malware classification: bridging the static\/dynamic gap,\u201d presented at the Proceedings of the 5th ACM workshop on Security and artificial intelligence, Raleigh, North Carolina, USA, 2012.","DOI":"10.1145\/2381896.2381900"},{"key":"61_CR15","unstructured":"Z. L. X. J. D. X. X. Zhang, \u201cAutomatic protocol format reverse engineering through context-aware monitored execution,\u201d Network & Distributed System Security Symposium, 2008, 2008."},{"key":"61_CR16","doi-asserted-by":"crossref","unstructured":"C. Leita, M. Dacier, and F. Massicotte, \u201cAutomatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots,\u201d in Recent Advances in Intrusion Detection: 9th International Symposium, RAID 2006 Hamburg, Germany, September 20-22, 2006 Proceedings, D. Zamboni and C. Kruegel, Eds., ed Berlin, Heidelberg: Springer Berlin Heidelberg, 2006, pp. 185-205.","DOI":"10.1007\/11856214_10"},{"key":"61_CR17","unstructured":"C. L. K. M. M. Dacier, \u201cScriptGen: an automated script generation tool for Honeyd,\u201d Computer Security Applications Conference, vol. 12, pp. 203-214, 2006."},{"key":"61_CR18","doi-asserted-by":"crossref","unstructured":"P. McMinn, M. Harman, D. Binkley, and P. Tonella, \u201cThe species per path approach to SearchBased test data generation,\u201d presented at the Proceedings of the 2006 international symposium on Software testing and analysis, Portland, Maine, USA, 2006.","DOI":"10.1145\/1146238.1146241"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49109-7_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T19:00:51Z","timestamp":1749668451000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49109-7_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491080","9783319491097"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49109-7_61","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}