{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:50:58Z","timestamp":1755838258309,"version":"3.40.2"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642291777"},{"type":"electronic","value":"9783642291784"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29178-4_2","type":"book-chapter","created":{"date-parts":[[2012,3,24]],"date-time":"2012-03-24T12:39:35Z","timestamp":1332592775000},"page":"11-20","source":"Crossref","is-referenced-by-count":3,"title":["Network Protocol Discovery and Analysis via Live Interaction"],"prefix":"10.1007","author":[{"given":"Patrick","family":"LaRoche","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]},{"given":"Malcolm I.","family":"Heywood","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Caballero, J., Yin, H., Liang, Z., Song, D.: Polyglot: Automatic extraction of protocol message format using dynamic binary analysis. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, p. 329. ACM (2007)","DOI":"10.1145\/1315245.1315286"},{"key":"2_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-642-12148-7_5","volume-title":"Genetic Programming","author":"J. Doucette","year":"2010","unstructured":"Doucette, J., Heywood, M.I.: Novelty-Based Fitness: An Evaluation under the Santa Fe Trail. In: Esparcia-Alc\u00e1zar, A.I., Ek\u00e1rt, A., Silva, S., Dignum, S., Uyar, A.\u015e. (eds.) EuroGP 2010. LNCS, vol.\u00a06021, pp. 50\u201361. Springer, Heidelberg (2010)"},{"key":"2_CR3","unstructured":"Froese, T.: Steps toward the evolution of communication in a multi-agent system. In: Symposium for Cybernetics Annual Research Projects, SCARP 2003. Citeseer (2003)"},{"issue":"3","key":"2_CR4","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1109\/TSMCB.2002.999814","volume":"32","author":"M.I. Heywood","year":"2002","unstructured":"Heywood, M.I., Nur Zincir-Heywood, A.: Dynamic page based crossover in linear genetic programming. IEEE Transactions on Systems, Man, and Cybernetics: Part B - Cybernetics\u00a032(3), 380\u2013388 (2002)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Part B - Cybernetics"},{"key":"2_CR5","first-page":"315","volume-title":"Proceedings of the First Annual Conference on Genetic Programming 1996","author":"L. Huelsbergen","year":"1996","unstructured":"Huelsbergen, L.: Toward simulated evolution of machine language iteration. In: Koza, J.R., Goldberg, D.E., Fogel, D.B., Riolo, R.L. (eds.) Proceedings of the First Annual Conference on Genetic Programming 1996, July 28-31, pp. 315\u2013320. Stanford University, MIT Press, CA, USA (1996)"},{"key":"2_CR6","unstructured":"Kaksonen, R., Laasko, M., Takanen, A.: Vulnerability analysis of software through syntax testing. University of Oulu, Finland, Tech. Rep. (2000)"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/978-3-540-71805-5_2","volume-title":"Applications of Evolutionary Computing","author":"H. Gunes Kayacik","year":"2007","unstructured":"Gunes Kayacik, H., Heywood, M.I., Nur Zincir-Heywood, A.: Evolving Buffer Overflow Attacks with Detector Feedback. In: Giacobini, M. (ed.) EvoWorkshops 2007. LNCS, vol.\u00a04448, pp. 11\u201320. Springer, Heidelberg (2007)"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Gunes Kayacyk, H., Nur Zincir-Heywood, A., Heywood, M.: Evolving successful stack overflow attacks for vulnerability testing. In: 21st Annual Computer Security Applications Conference, ACSAC 2005, pp. 225\u2013234. IEEE Computer Society (December 2005)","DOI":"10.1109\/CSAC.2005.23"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Khasteh, S.H., Shouraki, S.B., Halavati, R., Khameneh, E.: Evolution of a communication protocol between a group of intelligent agents. In: World Automation Congress, WAC 2006, pp. 1\u20136. Citeseer (2006)","DOI":"10.1109\/WAC.2006.375958"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Khasteh, S.H., Shouraki, S.B., Halavati, R., Lesani, M.: Communication Protocol Evolution by Natural Selection. In: 2006 and International Conference on Intelligent Agents, Web Technologies and Internet Commerce, Computational Intelligence for Modelling, Control and Automation, p. 152 (2006)","DOI":"10.1109\/CIMCA.2006.71"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"LaRoche, P., Nur Zincir-Heywood, A., Heywood, M.I.: Evolving tcp\/ip packets: A case study of port scans. In: CDROM: IEEE Symposium on Computational Intelligence for Security and Defense Applications (2009)","DOI":"10.1109\/CISDA.2009.5356541"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-642-12242-2_11","volume-title":"Applications of Evolutionary Computation","author":"P. LaRoche","year":"2010","unstructured":"LaRoche, P., Nur Zincir-Heywood, A., Heywood, M.I.: Using Code Bloat to Obfuscate Evolved Network Traffic. In: Di Chio, C., Brabazon, A., Di Caro, G.A., Ebner, M., Farooq, M., Fink, A., Grahl, J., Greenfield, G., Machado, P., O\u2019Neill, M., Tarantino, E., Urquhart, N. (eds.) EvoApplications 2010. LNCS, vol.\u00a06025, pp. 101\u2013110. Springer, Heidelberg (2010)"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"LaRoche, P., Nur Zincir-Heywood, A., Heywood, M.I.: Exploring the state space of an application protocol: A case study of smtp. In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2011), pp. 152\u2013159 (April 2011)","DOI":"10.1109\/CICYBS.2011.5949387"},{"key":"2_CR14","unstructured":"Marquis, S., Dean, T.R., Knight, S.: Scl: a language for security testing of network applications. In: CASCON 2005: Proceedings of the 2005 Conference of the Centre for Advanced Studies on Collaborative Research, pp. 155\u2013164. IBM Press (2005)"},{"key":"2_CR15","unstructured":"Nordin, P.: A compiling genetic programming system that directly manipulates the machine code. In: Kinnear Jr., K.E. (ed.) Advances in Genetic Programming, ch. 14, pp. 311\u2013331. MIT Press (1994)"},{"key":"2_CR16","unstructured":"Postel, J., Reynolds, J.: File Transfer Protocol. RFC 959 (Standard), Updated by RFCs 2228, 2640, 2773, 3659, 5797 (October 1985)"},{"key":"2_CR17","unstructured":"Tal, O., Knight, S., Dean, T.: Syntax-based vulnerability testing of frame-based network protocols. In: Proc. 2nd Annual Conference on Privacy, Security and Trust (2004)"},{"key":"2_CR18","unstructured":"Wondracek, G., Comparetti, P.M., Kruegel, C., Kirda, E., Anna, S.S.S.: Automatic network protocol analysis. In: Proceedings of the 15th Annual Network and Distributed System Security Symposium, NDSS 2008. Citeseer (2008)"},{"key":"2_CR19","unstructured":"Xiao, S., Deng, L., Li, S., Wang, X.: Integrated tcp\/ip protocol software testing for vulnerability detection. In: 2003 International Conference on Computer Networks and Mobile Computing, ICCNMC 2003, pp. 311\u2013319. IEEE (2003)"}],"container-title":["Lecture Notes in Computer Science","Applications of Evolutionary Computation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29178-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T23:13:16Z","timestamp":1742771596000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29178-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642291777","9783642291784"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29178-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}