{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T06:36:42Z","timestamp":1764225402214,"version":"3.41.0"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T00:00:00Z","timestamp":1502323200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100007136","name":"Secretar\u00eda de Estado de Investigaci\u00f3n, Desarrollo e Innovaci\u00f3n","doi-asserted-by":"publisher","award":["TIN2015-65845-C3-1-R"],"award-info":[{"award-number":["TIN2015-65845-C3-1-R"]}],"id":[{"id":"10.13039\/501100007136","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012818","name":"Comunidad de Madrid","doi-asserted-by":"crossref","award":["S2013\/ICE-3006"],"award-info":[{"award-number":["S2013\/ICE-3006"]}],"id":[{"id":"10.13039\/100012818","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Distrib. Comput."],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s00446-017-0308-0","type":"journal-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T19:24:35Z","timestamp":1502393075000},"page":"327-342","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Passive testing with asynchronous communications and timestamps"],"prefix":"10.1007","volume":"31","author":[{"given":"Mercedes G.","family":"Merayo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Robert M.","family":"Hierons","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9808-6401","authenticated-orcid":false,"given":"M.","family":"N\u00fa\u00f1ez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,8,10]]},"reference":[{"issue":"2","key":"308_CR1","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1504\/IJSSC.2015.069204","volume":"5","author":"FB Abreu","year":"2015","unstructured":"Abreu, F.B., Morais, A.N.P., Cavalli, A.R., Wehbi, B., Montes de Oca, E., Mallouli, W.: An effective attack detection approach in wireless mesh networks. Int. J. Space Based Situated Comput. 5(2), 89\u201399 (2015)","journal-title":"Int. J. Space Based Situated Comput."},{"key":"308_CR2","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/0304-3975(94)90010-8","volume":"126","author":"R Alur","year":"1994","unstructured":"Alur, R., Dill, D.: A theory of timed automata. Theoret. Comput. Sci. 126, 183\u2013235 (1994)","journal-title":"Theoret. Comput. Sci."},{"issue":"6","key":"308_CR3","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1002\/stvr.1464","volume":"22","author":"C Andr\u00e9s","year":"2012","unstructured":"Andr\u00e9s, C., Merayo, M.G., N\u00fa\u00f1ez, M.: Formal passive testing of timed systems: theory and tools. Softw. Test. Verif. Reliab. 22(6), 365\u2013405 (2012)","journal-title":"Softw. Test. Verif. Reliab."},{"issue":"2","key":"308_CR4","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/j.comnet.2004.09.009","volume":"48","author":"E Bayse","year":"2005","unstructured":"Bayse, E., Cavalli, A., N\u00fa\u00f1ez, M., Za\u00efdi, F.: A passive testing approach based on invariants: application to the WAP. Comput. Netw. 48(2), 247\u2013266 (2005)","journal-title":"Comput. Netw."},{"issue":"3","key":"308_CR5","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/0304-3975(86)90088-5","volume":"48","author":"G Berry","year":"1986","unstructured":"Berry, G., Sethi, R.: From regular expressions to deterministic automata. Theoret. Comput. Sci. 48(3), 117\u2013126 (1986)","journal-title":"Theoret. Comput. Sci."},{"key":"308_CR6","doi-asserted-by":"crossref","unstructured":"Camacho, M.A., Merayo, M.G., Medina-Bulo, I.: PTTAC: passive testing tool for asynchronous systems. In: 10th International Conference on Signal-Image Technology & Internet-Based Systems, SITIS\u201914, pp. 223\u2013229. IEEE Computer Society (2014)","DOI":"10.1109\/SITIS.2014.83"},{"issue":"12","key":"308_CR7","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1016\/S0950-5849(03)00063-6","volume":"45","author":"A Cavalli","year":"2003","unstructured":"Cavalli, A., Gervy, C., Prokopenko, S.: New approaches for passive testing using an extended finite state machine specification. Inf. Softw. Technol. 45(12), 837\u2013852 (2003)","journal-title":"Inf. Softw. Technol."},{"issue":"3\u20134","key":"308_CR8","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/s12243-015-0457-8","volume":"70","author":"AR Cavalli","year":"2015","unstructured":"Cavalli, A.R., Higashino, T., N\u00fa\u00f1ez, M.: A survey on formal active and passive testing with applications to the cloud. Ann. Telecommun. 70(3\u20134), 85\u201393 (2015)","journal-title":"Ann. Telecommun."},{"key":"308_CR9","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.comcom.2014.06.001","volume":"51","author":"X Che","year":"2014","unstructured":"Che, X., Maag, S.: Passive performance testing of network protocols. Comput. Commun. 51, 36\u201347 (2014)","journal-title":"Comput. Commun."},{"issue":"3","key":"308_CR10","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/s10703-012-0142-8","volume":"41","author":"C Colombo","year":"2012","unstructured":"Colombo, C., Pace, G.J., Abela, P.: Safer asynchronous runtime monitoring using compensations. Form. Methods Syst. Des. 41(3), 269\u2013294 (2012)","journal-title":"Form. Methods Syst. Des."},{"issue":"1","key":"308_CR11","doi-asserted-by":"crossref","first-page":"161","DOI":"10.2307\/1969503","volume":"51","author":"RP Dilworth","year":"1950","unstructured":"Dilworth, R.P.: A decomposition theorem for partially ordered sets. Ann. Math. 51(1), 161\u2013166 (1950)","journal-title":"Ann. Math."},{"key":"308_CR12","doi-asserted-by":"crossref","unstructured":"Gaudel, M.C.: Testing can be formal, too! In: 6th International Joint Conference CAAP\/FASE, Theory and Practice of Software Development, TAPSOFT\u201995. LNCS 915, pp. 82\u201396. Springer (1995)","DOI":"10.1007\/3-540-59293-8_188"},{"issue":"1","key":"308_CR13","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1002\/stvr.427","volume":"21","author":"W Grieskamp","year":"2011","unstructured":"Grieskamp, W., Kicillof, N., Stobie, K., Braberman, V.: Model-based quality assurance of protocol documentation: tools and methodology. Softw. Test. Verif. Reliab. 21(1), 55\u201371 (2011)","journal-title":"Softw. Test. Verif. Reliab."},{"issue":"4","key":"308_CR14","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1051\/ita:2000116","volume":"34","author":"C Hagenah","year":"2000","unstructured":"Hagenah, C., Muscholl, A.: Computing epsilon-free NFA from regular expressions in $$O(n\\cdot \\log (n)^2)$$ O ( n \u00b7 log ( n ) 2 ) time. Inform. Th\u00e9or. Appl. 34(4), 257\u2013278 (2000)","journal-title":"Inform. Th\u00e9or. Appl."},{"key":"308_CR15","doi-asserted-by":"crossref","unstructured":"Hennie, F.C.: Fault-detecting experiments for sequential circuits. In: 5th Annual Symposium on Switching Circuit Theory and Logical Design, pp. 95\u2013110. IEEE Computer Society (1964)","DOI":"10.1109\/SWCT.1964.8"},{"key":"308_CR16","doi-asserted-by":"crossref","unstructured":"Henniger, O.: On test case generation from asynchronously communicating state machines. In: 10th International Workshop on Testing of Communicating Systems, IWTCS\u201997, pp. 255\u2013271. Chapman & Hall (1997)","DOI":"10.1007\/978-0-387-35198-8_16"},{"key":"308_CR17","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.tcs.2012.05.038","volume":"451","author":"RM Hierons","year":"2012","unstructured":"Hierons, R.M.: The complexity of asynchronous model based testing. Theoret. Comput. Sci. 451, 70\u201382 (2012)","journal-title":"Theoret. Comput. Sci."},{"issue":"11","key":"308_CR18","doi-asserted-by":"crossref","first-page":"1305","DOI":"10.1093\/comjnl\/bxs107","volume":"56","author":"RM Hierons","year":"2013","unstructured":"Hierons, R.M.: Implementation relations for testing through asynchronous channels. Comput. J. 56(11), 1305\u20131319 (2013)","journal-title":"Comput. J."},{"key":"308_CR19","doi-asserted-by":"crossref","unstructured":"Hierons, R.M., Bogdanov, K., Bowen, J., Cleaveland, R., Derrick, J., Dick, J., Gheorghe, M., Harman, M., Kapoor, K., Krause, P., Luettgen, G., Simons, A., Vilkomir, S., Woodward, M., Zedan, H.: Using formal specifications to support testing. ACM Comput. Surv. 41(2), 9 (2009)","DOI":"10.1145\/1459352.1459354"},{"key":"308_CR20","doi-asserted-by":"crossref","unstructured":"Hierons, R.M., Bowen, J., Harman, M. (eds.): Formal Methods and Testing. LNCS 4949. Springer (2008)","DOI":"10.1007\/978-3-540-78917-8"},{"issue":"2","key":"308_CR21","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.jlap.2008.06.001","volume":"78","author":"RM Hierons","year":"2009","unstructured":"Hierons, R.M., Merayo, M.G., N\u00fa\u00f1ez, M.: Testing from a stochastic timed system with a fault model. J. Log. Algebr. Program. 78(2), 98\u2013115 (2009)","journal-title":"J. Log. Algebr. Program."},{"key":"308_CR22","doi-asserted-by":"crossref","unstructured":"Hierons, R.M., Merayo, M.G., N\u00fa\u00f1ez, M.: Passive testing with asynchronous communications. In: IFIP 33rd International Conference on Formal Techniques for Distributed Systems, FMOODS\/FORTE\u201913. LNCS 7892, pp. 99\u2013113. Springer (2013)","DOI":"10.1007\/978-3-642-38592-6_8"},{"issue":"3","key":"308_CR23","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s00446-014-0208-5","volume":"27","author":"RM Hierons","year":"2014","unstructured":"Hierons, R.M., Merayo, M.G., N\u00fa\u00f1ez, M.: Timed implementation relations for the distributed test architecture. Distrib. Comput. 27(3), 181\u2013201 (2014)","journal-title":"Distrib. Comput."},{"key":"308_CR24","volume-title":"Introduction to Automata Theory, Languages, and Computation","author":"J Hopcroft","year":"2006","unstructured":"Hopcroft, J., Motwani, R., Ullman, J.: Introduction to Automata Theory, Languages, and Computation, 3rd edn. Addison-Wesley, Boston (2006)","edition":"3"},{"issue":"4","key":"308_CR25","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1006\/jcss.2001.1748","volume":"62","author":"J Hromkovic","year":"2001","unstructured":"Hromkovic, J., Seibert, S., Wilke, T.: Translating regular expressions into small $$\\epsilon $$ \u03f5 -free nondeterministic finite automata. J. Comput. Syst. Sci. 62(4), 565\u2013588 (2001)","journal-title":"J. Comput. Syst. Sci."},{"key":"308_CR26","doi-asserted-by":"crossref","unstructured":"Huo, J., Petrenko, A.: On testing partially specified IOTS through lossless queues. In: 16th International Conference on Testing Communicating Systems, TestCom\u201904. LNCS 2978, pp. 76\u201394. Springer (2004)","DOI":"10.1007\/978-3-540-24704-3_6"},{"issue":"1","key":"308_CR27","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1002\/stvr.396","volume":"19","author":"J Huo","year":"2009","unstructured":"Huo, J., Petrenko, A.: Transition covering tests for systems with queues. Softw. Test. Verif. Reliab. 19(1), 55\u201383 (2009)","journal-title":"Softw. Test. Verif. Reliab."},{"key":"308_CR28","doi-asserted-by":"crossref","unstructured":"Jard, C., J\u00e9ron, T., Tanguy, L., Viho, C.: Remote testing can be as powerful as local testing. In: 19th Joint International Conference on Protocol Specification, Testing, and Verification and Formal Description Techniques, FORTE\/PSTV\u201999, pp. 25\u201340. Kluwer Academic Publishers (1999)","DOI":"10.1007\/978-0-387-35578-8_2"},{"issue":"3","key":"308_CR29","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1007\/s10703-009-0065-1","volume":"34","author":"M Krichen","year":"2009","unstructured":"Krichen, M., Tripakis, S.: Conformance testing for real-time systems. Form. Methods Syst. Des. 34(3), 238\u2013304 (2009)","journal-title":"Form. Methods Syst. Des."},{"issue":"3","key":"308_CR30","doi-asserted-by":"crossref","first-page":"788","DOI":"10.1109\/TNET.2012.2210443","volume":"21","author":"F Lalanne","year":"2013","unstructured":"Lalanne, F., Maag, S.: A formal data-centric approach for passive testing of communication protocols. IEEE\/ACM Trans. Netw. 21(3), 788\u2013801 (2013)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"308_CR31","doi-asserted-by":"crossref","unstructured":"Laurent, O.: Using formal methods and testability concepts in the avionics systems validation and verification (V&V) process. In: 3rd International Conference on Software Testing, Verification, and Validation, ICST\u201910, pp. 1\u201310. IEEE Computer Society (2010)","DOI":"10.1109\/ICST.2010.38"},{"key":"308_CR32","doi-asserted-by":"crossref","unstructured":"Lee, D., Chen, D., Hao, R., Miller, R., Wu, J., Yin, X.: A formal approach for passive testing of protocol data portions. In: 10th IEEE International Conference on Network Protocols, ICNP\u201902, pp. 122\u2013131. IEEE Computer Society (2002)","DOI":"10.1109\/ICNP.2002.1181393"},{"key":"308_CR33","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1109\/TNET.2006.872572","volume":"14","author":"D Lee","year":"2006","unstructured":"Lee, D., Chen, D., Hao, R., Miller, R., Wu, J., Yin, X.: Network protocol system monitoring: a formal approach with passive testing. IEEE\/ACM Trans. Netw. 14, 424\u2013437 (2006)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"308_CR34","doi-asserted-by":"crossref","unstructured":"Lee, D., Netravali, A., Sabnani, K., Sugla, B., John, A.: Passive testing and applications to network management. In: 5th IEEE International Conference on Network Protocols, ICNP\u201997, pp. 113\u2013122. IEEE Computer Society (1997)","DOI":"10.1109\/ICNP.1997.643699"},{"issue":"5","key":"308_CR35","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/j.jlap.2008.08.004","volume":"78","author":"M Leucker","year":"2009","unstructured":"Leucker, M., Schallhart, C.: A brief account of runtime verification. J. Log. Algebr. Program. 78(5), 293\u2013303 (2009)","journal-title":"J. Log. Algebr. Program."},{"key":"308_CR36","doi-asserted-by":"crossref","unstructured":"Mammar, A., Cavalli, A.R., Jimenez, W., Mallouli, W., Montes de Oca, E.: Using testing techniques for vulnerability detection in C programs. In: 23rd International Conference on Testing Software and Systems, ICTSS\u201911. LNCS 7019, pp. 80\u201396. Springer (2011)","DOI":"10.1007\/978-3-642-24580-0_7"},{"key":"308_CR37","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/bs.adcom.2015.03.003","volume":"98","author":"R Marinescu","year":"2015","unstructured":"Marinescu, R., Seceleanu, C., Guen, H.L., Pettersson, P.: A research overview of tool-supported model-based testing of requirements-based designs. Adv. Comput. 98, 89\u2013140 (2015)","journal-title":"Adv. Comput."},{"key":"308_CR38","doi-asserted-by":"crossref","first-page":"1045","DOI":"10.1002\/j.1538-7305.1955.tb03788.x","volume":"34","author":"G Mealy","year":"1955","unstructured":"Mealy, G.: A method for synthesizing sequential circuits. Bell Syst. Tech. J. 34, 1045\u20131079 (1955)","journal-title":"Bell Syst. Tech. J."},{"key":"308_CR39","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.infsof.2015.03.009","volume":"64","author":"MG Merayo","year":"2015","unstructured":"Merayo, M.G., N\u00fa\u00f1ez, A.: Passive testing of communicating systems with timeouts. Inf. Softw. Technol. 64, 19\u201335 (2015)","journal-title":"Inf. Softw. Technol."},{"issue":"2","key":"308_CR40","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s10270-009-0126-3","volume":"10","author":"MG Merayo","year":"2011","unstructured":"Merayo, M.G., N\u00fa\u00f1ez, M., Hierons, R.M.: Testing timed systems modeled by stream X-machines. Softw. Syst. Model. 10(2), 201\u2013217 (2011)","journal-title":"Softw. Syst. Model."},{"issue":"2","key":"308_CR41","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1016\/j.comnet.2007.10.002","volume":"52","author":"MG Merayo","year":"2008","unstructured":"Merayo, M.G., N\u00fa\u00f1ez, M., Rodr\u00edguez, I.: Formal testing from timed finite state machines. Comput. Netw. 52(2), 432\u2013460 (2008)","journal-title":"Comput. Netw."},{"key":"308_CR42","doi-asserted-by":"crossref","unstructured":"Morales, G., Maag, S., Cavalli, A.R., Mallouli, W., Montes de Oca, E., Wehbi, B.: Timed extended invariants for the passive testing of web services. In: 8th IEEE International Conference on Web Services, ICWS\u201910, pp. 592\u2013599. IEEE Computer Society (2010)","DOI":"10.1109\/ICWS.2010.17"},{"issue":"15","key":"308_CR43","doi-asserted-by":"crossref","first-page":"2992","DOI":"10.1016\/j.comnet.2013.06.019","volume":"57","author":"P Mouttappa","year":"2013","unstructured":"Mouttappa, P., Maag, S., Cavalli, A.R.: Using passive testing based on symbolic execution and slicing techniques: application to the validation of communication protocols. Comput. Netw. 57(15), 2992\u20133008 (2013)","journal-title":"Comput. Netw."},{"key":"308_CR44","volume-title":"The Art of Software Testing","author":"GJ Myers","year":"2004","unstructured":"Myers, G.J.: The Art of Software Testing, 2nd edn. Wiley, Hoboken (2004)","edition":"2"},{"key":"308_CR45","doi-asserted-by":"crossref","unstructured":"Nguyen, H.N., Poizat, P., Za\u00efdi, F.: Online verification of value-passing choreographies through property-oriented passive testing. In: 14th International Symposium on High-Assurance Systems Engineering, HASE\u201912, pp. 106\u2013113. IEEE Computer Society (2012)","DOI":"10.1109\/HASE.2012.15"},{"key":"308_CR46","doi-asserted-by":"crossref","unstructured":"Nguyen, H.N., Za\u00efdi, F., Cavalli, A.R.: A framework for distributed testing of timed composite systems. In: 21st Asia-Pacific Software Engineering Conference, APSEC\u201914, pp. 47\u201354. IEEE Computer Society (2014)","DOI":"10.1109\/APSEC.2014.16"},{"key":"308_CR47","unstructured":"Noroozi, N., Khosravi, R., Mousavi, M.R., Willemse, T.A.C.: Synchrony and asynchrony in conformance testing. Softw. Syst. Model. 14(1), 149\u2013172 (2015)"},{"key":"308_CR48","doi-asserted-by":"crossref","unstructured":"Shu, G., Lee, D.: Message confidentiality testing of security protocols\u2014passive monitoring and active checking. In: 18th International Conference on Testing Communicating Systems, TestCom\u201906. LNCS 3964, pp. 357\u2013372. Springer (2006)","DOI":"10.1007\/11754008_23"},{"issue":"11","key":"308_CR49","doi-asserted-by":"crossref","first-page":"1252","DOI":"10.1016\/j.infsof.2011.06.006","volume":"53","author":"A Sim\u00e3o","year":"2011","unstructured":"Sim\u00e3o, A., Petrenko, A.: Generating asynchronous test cases from test purposes. Inf. Softw. Technol. 53(11), 1252\u20131262 (2011)","journal-title":"Inf. Softw. Technol."},{"issue":"1\u20132","key":"308_CR50","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/S0304-3975(99)00134-6","volume":"254","author":"J Springintveld","year":"2001","unstructured":"Springintveld, J., Vaandrager, F., D\u2019Argenio, P.: Testing timed automata. Theoret. Comput. Sci. 254(1\u20132), 225\u2013257 (2001). Previously appeared as Technical Report\u00a0CTIT-97-17, University of Twente, 1997","journal-title":"Theoret. Comput. Sci."}],"container-title":["Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00446-017-0308-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00446-017-0308-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00446-017-0308-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T21:49:11Z","timestamp":1750801751000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00446-017-0308-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,10]]},"references-count":50,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["308"],"URL":"https:\/\/doi.org\/10.1007\/s00446-017-0308-0","relation":{},"ISSN":["0178-2770","1432-0452"],"issn-type":[{"type":"print","value":"0178-2770"},{"type":"electronic","value":"1432-0452"}],"subject":[],"published":{"date-parts":[[2017,8,10]]}}}