{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:48:58Z","timestamp":1740098938499,"version":"3.37.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319672199"},{"type":"electronic","value":"9783319672205"}],"license":[{"start":{"date-parts":[[2017,9,2]],"date-time":"2017-09-02T00:00:00Z","timestamp":1504310400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-67220-5_9","type":"book-chapter","created":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T07:19:00Z","timestamp":1504250340000},"page":"95-106","source":"Crossref","is-referenced-by-count":1,"title":["Active Protocol Discoverer Based on Grammatical Evolution"],"prefix":"10.1007","author":[{"given":"Dariusz","family":"Pa\u0142ka","sequence":"first","affiliation":[]},{"given":"Marek","family":"Zachara","sequence":"additional","affiliation":[]},{"given":"Krzysztof","family":"W\u00f3jcik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,2]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1145\/287000.287001","volume":"7","author":"JE Cook","year":"1998","unstructured":"Cook, J.E., Wolf, A.L.: Discovering models of software process from even-base data. ACM Trans. Softw. Eng. Methodol. 7, 215\u2013249 (1998)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"9_CR2","doi-asserted-by":"publisher","unstructured":"Saint-Paul, R., Casati, F., Motahari-Nezhad, H.R., Benatallah, B.: Protocol discovery from imperfect service interaction logs. In: IEEE 29th International Conference on Data Engineering (ICDE), pp. 1405\u20131409 (2007), doi:\n10.1109\/ICDE.2007.369022","DOI":"10.1109\/ICDE.2007.369022"},{"key":"9_CR3","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/S0169-023X(03)00066-1","volume":"47","author":"WMP Aalst van der","year":"2003","unstructured":"van der Aalst, W.M.P., van Dongen, B.F., Herbst, J., Maruster, L., Schimm, G., Weijters, A.J.M.M.: Workflow mining: a survey of issues and approaches. Data Knowl. Eng. 47, 237\u2013267 (2003)","journal-title":"Data Knowl. Eng."},{"key":"9_CR4","unstructured":"Cui, W., Kannan, J., Wang, H.J.: Discoverer: automatic protocol reverse engineering from network traces. In: Provos, N. (ed.) USENIX Security Symposium. USENIX Association (2007)"},{"issue":"11","key":"9_CR5","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/240455.240463","volume":"39","author":"U Fayyad","year":"1996","unstructured":"Fayyad, U., Uthurusamy, R.: Data mining and knowledge discovery in databases. Commun. ACM 39(11), 24\u201336 (1996)","journal-title":"Commun. ACM"},{"key":"9_CR6","unstructured":"Das, S., Mozer, M.C.: A unified gradient-descent\/clustering architecture for finite state machine induction. In: Proceedings of the 1993 Conference, vol. 6. Advances in Neural Information Processing Systems, pp. 19\u201326. Morgan Kaufmann (1994)"},{"key":"9_CR7","doi-asserted-by":"crossref","first-page":"976","DOI":"10.1162\/neco.1993.5.6.976","volume":"5","author":"Z Zeng","year":"1993","unstructured":"Zeng, Z., Goodman, R.M., Smyth, P.: Learning finite state machines with self-clustering recurrent networks. Neural Comput. 5, 976\u2013990 (1993)","journal-title":"Neural Comput."},{"key":"9_CR8","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1016\/S0019-9958(67)91165-5","volume":"10","author":"EM Gold","year":"1967","unstructured":"Gold, E.M.: Language identification in the limit. Inf. Control 10, 447\u2013474 (1967)","journal-title":"Inf. Control"},{"key":"9_CR9","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1016\/S0019-9958(78)90562-4","volume":"37","author":"EM Gold","year":"1978","unstructured":"Gold, E.M.: Complexity of automatic identification from given data. Inf. Control 37, 302\u2013320 (1978)","journal-title":"Inf. Control"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Comparetti, P.M., Wondracek, G., Kruegel, Ch., Kirda, E.: Prospex: Protocol Specification Extraction. In: IEEE Symposium on Security and Privacy, pp. 110\u2013125. IEEE Computer Society (2009)","DOI":"10.1109\/SP.2009.14"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"O\u2019Neill, M., Ryan, C.: Grammatical evolution by grammatical evolution: the evolution of grammar and genetic code. In: Keijzer, M., O\u2019Reilly, U.M., Lucas, S.M., Costa, E., Soule, T. (eds.) Genetic Programming 7th European Conference, EuroGP 2004, Proceedings. LNCS, vol. 3003, 5\u20137 April, pp. 138\u2013149. Springer, Portugal (2004)","DOI":"10.1007\/978-3-540-24650-3_13"},{"issue":"4","key":"9_CR12","doi-asserted-by":"publisher","first-page":"349358","DOI":"10.1109\/4235.942529","volume":"5","author":"M O\u2019Neill","year":"2001","unstructured":"O\u2019Neill, M., Ryan, C.: Grammatical evolution. IEEE Trans. Evol. Comput. 5(4), 349358 (2001). doi:\n10.1109\/4235.942529","journal-title":"IEEE Trans. Evol. Comput."},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"O\u2019Neill, M., Ryan, C.: Grammatical evolution: evolutionary automatic programming in a arbitrary language. Genetic Programming, vol. 4. Kluwer Academic Publishers (2003)","DOI":"10.1007\/978-1-4615-0447-4"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Pa\u0142ka, D., Zachara, M., W\u00f3jcik, K.: Evolutionary scanner of web application vulnerabilities. In: Gaj, P., Kwiecien, A., Stera, P. (eds.) CN, Communications in Computer and Information Science, vol. 608, pp. 384\u2013396. Springer (2016), \nhttp:\/\/dx.doi.org\/10.1007\/978-3-319-39207-3_33","DOI":"10.1007\/978-3-319-39207-3_33"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Pa\u0142ka, D., Zachara, M.: Automatic grammar induction for grammar based genetic programming. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds.) ICAISC (1). Lecture Notes in Computer Science, vol. 9119, pp. 350\u2013360. Springer (2015), \nhttp:\/\/dx.doi.org\/10.1007\/978-3-319-19324-3_32","DOI":"10.1007\/978-3-319-19324-3_32"},{"key":"9_CR16","unstructured":"Sony EVI-D30\/D31 Command List, \nhttps:\/\/www.cs.rochester.edu\/~nelson\/courses\/vision\/resources\/sony_evi-d31.pdf\n\n, Accessed 16 May 2017"},{"key":"9_CR17","unstructured":"Sony Color Video Camera Technical Manual, \nhttps:\/\/pro.sony.com\/bbsccms\/assets\/files\/mkt\/remotemonitoring\/manuals\/rm-EVID100_technical_manual.pdf\n\n, Accessed 16 May 2017"}],"container-title":["Advances in Intelligent Systems and Computing","Information Systems Architecture and Technology: Proceedings of 38th International Conference on Information Systems Architecture and Technology \u2013 ISAT 2017"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67220-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T07:25:28Z","timestamp":1504250728000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67220-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,2]]},"ISBN":["9783319672199","9783319672205"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67220-5_9","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,9,2]]}}}