{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T07:48:03Z","timestamp":1771573683119,"version":"3.50.1"},"reference-count":195,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,6,29]],"date-time":"2021-06-29T00:00:00Z","timestamp":1624924800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,29]],"date-time":"2021-06-29T00:00:00Z","timestamp":1624924800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s11704-019-9212-z","type":"journal-article","created":{"date-parts":[[2021,6,29]],"date-time":"2021-06-29T16:02:51Z","timestamp":1624982571000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Model learning: a survey of foundations, tools and applications"],"prefix":"10.1007","volume":"15","author":[{"given":"Shahbaz","family":"Ali","sequence":"first","affiliation":[]},{"given":"Hailong","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Yongwang","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,29]]},"reference":[{"key":"9212_CR1","unstructured":"Blair M, Obenski S, Bridickas P. Patriot missile defense: software problem led to system failure at dhahran. Report GAO\/IMTEC-92-26, 1992"},{"key":"9212_CR2","unstructured":"Lions J L. Ariane 5 flight 501 failure. Report by the Inquiry Board, 1996"},{"key":"9212_CR3","volume-title":"Mars Climate Orbiter Mishap Investigation Board Phase I Report","author":"A G Stephenson","year":"1999","unstructured":"Stephenson A G, Mulville D R, Bauer F H, Dukeman G A, Norvig P, LaPiana L S, Rutledge P J, Folta D, Sackheim R. Mars Climate Orbiter Mishap Investigation Board Phase I Report. NASA, Washington, DC, 1999"},{"issue":"7","key":"9212_CR4","first-page":"18","volume":"26","author":"N G Leveson","year":"1993","unstructured":"Leveson N G, Turner C S. An investigation of the therac-25 accidents. Journal of Computer, 1993, 26(7): 18\u201341","journal-title":"Journal of Computer"},{"issue":"4","key":"9212_CR5","first-page":"129","volume":"20","author":"T Coe","year":"1995","unstructured":"Coe T. Inside the pentium FDIV bug. DR Dobbs Journal, 1995, 20(4): 129","journal-title":"DR Dobbs Journal"},{"key":"9212_CR6","unstructured":"Ball T, Rajamani S K. The slam project: debugging system software via static analysis. In: Proceedings of the 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. 2002, 1\u20133"},{"issue":"1","key":"9212_CR7","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/565816.503279","volume":"37","author":"T A Henzinger","year":"2002","unstructured":"Henzinger T A, Jhala R, Majumdar R, Sutre G. Lazy abstraction. Journal of ACM SIGPLAN Notices, 2002, 37(1): 58\u201370","journal-title":"Journal of ACM SIGPLAN Notices"},{"issue":"2","key":"9212_CR8","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1002\/stvr.380","volume":"18","author":"N Walkinshaw","year":"2008","unstructured":"Walkinshaw N, Bogdanov K, Ali S, Holcombe M. Automated discovery of state transitions and their functions in source code. Journal of Software Testing, Verification and Reliability, 2008, 18(2): 99\u2013121","journal-title":"Journal of Software Testing, Verification and Reliability"},{"key":"9212_CR9","doi-asserted-by":"crossref","unstructured":"Walkinshaw N, Bogdanov K, Holcombe M, Salahuddin S. Reverse engineering state machines by interactive grammar inference. In: Proceedings of Working Conference on Reverse Engineering. 2007, 209\u2013218","DOI":"10.1109\/WCRE.2007.45"},{"key":"9212_CR10","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/TSE.1976.233812","volume":"3","author":"A W Biermann","year":"1976","unstructured":"Biermann A W, Krishnaswamy R. Constructing programs from example computations. Journal of IEEE Transactions on Software Engineering, 1976, 3: 141\u2013153","journal-title":"Journal of IEEE Transactions on Software Engineering"},{"key":"9212_CR11","doi-asserted-by":"crossref","unstructured":"Muller-Olm M, Schmidt D A, Steffen B. Model-checking: a tutorial introduction. In: Proceedings of International Static Analysis Symposium. 1999, 330\u2013354","DOI":"10.1007\/3-540-48294-6_22"},{"key":"9212_CR12","unstructured":"Clarke E M, Grumberg O, Peled D. Model Checking. MIT Press, 1999"},{"key":"9212_CR13","unstructured":"Baier C, Katoen J P. Principles of Model Checking. MIT Press, 2008"},{"key":"9212_CR14","doi-asserted-by":"crossref","unstructured":"Broy M, Jonsson B, Katoen J P, Leucker M, Pretschner A. Model-based testing of reactive systems. Lecture Notes in Computer Science, 2005","DOI":"10.1007\/b137241"},{"key":"9212_CR15","unstructured":"Utting M, Legeard B. Practical Model-based Testing: a Tools Approach. Elsevier, 2010"},{"issue":"3","key":"9212_CR16","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1017\/S0960129504004153","volume":"14","author":"F Arbab","year":"2004","unstructured":"Arbab F. Reo: a channel-based coordination model for component composition. Journal of Mathematical Structures in Computer Science, 2004, 14(3): 329\u2013366","journal-title":"Journal of Mathematical Structures in Computer Science"},{"issue":"4","key":"9212_CR17","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/1218063.1217943","volume":"40","author":"T Ball","year":"2006","unstructured":"Ball T, Bounimova E, Cook B, Levin V, Lichtenberg J, McGarvey C, Ondrusek B, Rajamani S K, Ustuner A. Thorough static analysis of device drivers. Journal of ACM SIGOPS Operating Systems Review, 2006, 40(4): 73\u201385","journal-title":"Journal of ACM SIGOPS Operating Systems Review"},{"key":"9212_CR18","doi-asserted-by":"crossref","unstructured":"Hungar H, Niese O, Steffen B. Domain-specific optimization in automata learning. In: Proceedings of International Conference on Computer Aided Verification. 2003, 315\u2013327","DOI":"10.1007\/978-3-540-45069-6_31"},{"key":"9212_CR19","doi-asserted-by":"crossref","unstructured":"Margaria T, Niese O, Raffelt H, Steffen B. Efficient test-based model generation for legacy reactive systems. In: Proceedings of the 9th IEEE International High-Level Design Validation and Test Workshop. 2004, 95\u2013100","DOI":"10.1109\/HLDVT.2004.1431246"},{"key":"9212_CR20","doi-asserted-by":"crossref","unstructured":"Muccini H, Polini A, Ricci F, Bertolino A. Monitoring architectural properties in dynamic component-based systems. In: Proceedings of International Symposium on Component-Based Software Engineering. 2007, 124\u2013139","DOI":"10.1007\/978-3-540-73551-9_9"},{"key":"9212_CR21","unstructured":"Shahbaz M. Reverse engineering enhanced state models of black box software components to support integration testing. Doctoral Dissertation, 2008"},{"key":"9212_CR22","doi-asserted-by":"crossref","unstructured":"Shu G, Lee D. Testing security properties of protocol implementations-a machine learning based approach. In: Proceedings of the 27th International Conference on Distributed Computing Systems. 2007","DOI":"10.1109\/ICDCS.2007.147"},{"key":"9212_CR23","doi-asserted-by":"crossref","unstructured":"Aarts F, Vaandrager F. Learning I\/O automata. In: Proceedings of International Conference on Concurrency Theory. 2010, 71\u201385","DOI":"10.1007\/978-3-642-15375-4_6"},{"key":"9212_CR24","first-page":"129","volume":"34","author":"E F Moore","year":"1956","unstructured":"Moore E F. Gedanken-experiments on sequential machines. Journal of Automata Studies, 1956, 34: 129\u2013153","journal-title":"Journal of Automata Studies"},{"key":"9212_CR25","doi-asserted-by":"crossref","unstructured":"Berg T, Grinchtein O, Jonsson B, Leucker M, Raffelt H, Steffen B. On the correspondence between conformance testing and regular inference. In: Proceedings of International Conference on Fundamental Approaches to Software Engineering. 2005, 175\u2013189","DOI":"10.1007\/978-3-540-31984-9_14"},{"key":"9212_CR26","doi-asserted-by":"crossref","unstructured":"Hagerer A, Hungar H, Niese O, Steffen B. Model generation by moderated regular extrapolation. In: Proceedings of International Conference on Fundamental Approaches to Software Engineering. 2002, 80\u201395","DOI":"10.1007\/3-540-45923-5_6"},{"key":"9212_CR27","unstructured":"Isberner M. Foundations of active automata learning: an algorithmic perspective. Doctoral Dissertation, 2015"},{"key":"9212_CR28","unstructured":"De Ruiter J, Poll E. Protocol state fuzzing of TLS implementations. In: Proceedings of the 24th USENIX Security Symposium. 2015, 193\u2013206"},{"issue":"2","key":"9212_CR29","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/2967606","volume":"60","author":"F Vaandrager","year":"2017","unstructured":"Vaandrager F. Model learning. Journal of Communications of ACM, 2017, 60(2): 86\u201395","journal-title":"Journal of Communications of ACM"},{"issue":"2","key":"9212_CR30","first-page":"225","volume":"7","author":"D Peled","year":"2002","unstructured":"Peled D, Vardi M Y, Yannakakis M. Black box checking. Journal of Automata, Languages and Combinatorics, 2002, 7(2): 225\u2013246","journal-title":"Journal of Automata, Languages and Combinatorics"},{"issue":"1","key":"9212_CR31","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/565816.503275","volume":"37","author":"G Ammons","year":"2002","unstructured":"Ammons G, Bod\u00edk R, Larus J R. Mining specifications. Journal of ACM Sigplan Notices, 2002, 37(1): 4\u201316","journal-title":"Journal of ACM Sigplan Notices"},{"key":"9212_CR32","doi-asserted-by":"crossref","unstructured":"Lo D, Khoo S C. Smartic: towards building an accurate, robust and scalable specification miner. In: Proceedings of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering. 2006, 265\u2013275","DOI":"10.1145\/1181775.1181808"},{"key":"9212_CR33","doi-asserted-by":"crossref","unstructured":"Lorenzoli D, Mariani L, Pezz\u00e8 M. Automatic generation of software behavioral models. In: Proceedings of the 30th International Conference on Software Engineering. 2008, 501\u2013510","DOI":"10.1145\/1368088.1368157"},{"key":"9212_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96562-8","volume-title":"Machine Learning for Dynamic Software Analysis: Potentials and Limits","author":"A Bennaceur","year":"2018","unstructured":"Bennaceur A, Meinke K. Machine learning for software analysis: models, methods, and applications. In: Bennaceur A, H\u00e4hnle R, Meinke K, eds. Machine Learning for Dynamic Software Analysis: Potentials and Limits. Springer, Cham, 2018"},{"key":"9212_CR35","doi-asserted-by":"crossref","unstructured":"Starkie B, Zaanen V M, Estival D. The tenjinno machine translation competition. In: Proceedings of International Colloquium on Grammatical Inference. 2006, 214\u2013226","DOI":"10.1007\/11872436_18"},{"key":"9212_CR36","doi-asserted-by":"crossref","unstructured":"Starkie B, Coste F, Zaanen V M. The omphalos context-free grammar learning competition. In: Proceedings of International Colloquium on Grammatical Inference. 2004, 16\u201327","DOI":"10.1007\/978-3-540-30195-0_3"},{"issue":"4","key":"9212_CR37","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1007\/s10664-012-9210-3","volume":"18","author":"N Walkinshaw","year":"2013","unstructured":"Walkinshaw N, Lambeau B, Damas C, Bogdanov K, Dupont P. Stamina: a competition to encourage the development and assessment of software model inference techniques. Journal of Empirical Software Engineering, 2013, 18(4): 791\u2013824","journal-title":"Journal of Empirical Software Engineering"},{"key":"9212_CR38","doi-asserted-by":"crossref","unstructured":"Combe D, De La Higuera C, Janodet J C. Zulu: an interactive learning competition. In: Proceedings of International Workshop on Finite-State Methods and Natural Language Processing. 2009, 139\u2013146","DOI":"10.1007\/978-3-642-14684-8_15"},{"issue":"2","key":"9212_CR39","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/0890-5401(87)90052-6","volume":"75","author":"D Angluin","year":"1987","unstructured":"Angluin D. Learning regular sets from queries and counterexamples. Journal of Information and Computation, 1987, 75(2): 87\u2013106","journal-title":"Journal of Information and Computation"},{"issue":"5","key":"9212_CR40","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/S0019-9958(67)91165-5","volume":"10","author":"E M Gold","year":"1967","unstructured":"Gold E M. Language identification in the limit. Information and Control, 1967, 10(5): 447\u2013474","journal-title":"Information and Control"},{"issue":"11","key":"9212_CR41","doi-asserted-by":"publisher","first-page":"1134","DOI":"10.1145\/1968.1972","volume":"27","author":"L G Valiant","year":"1984","unstructured":"Valiant L G. A theory of the learnable. Journal of Communications of ACM, 1984, 27(11): 1134\u20131142","journal-title":"Journal of Communications of ACM"},{"issue":"3","key":"9212_CR42","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1145\/356914.356918","volume":"15","author":"D Angluin","year":"1983","unstructured":"Angluin D, Smith C H. Inductive inference: theory and methods. Journal of ACM Computing Surveys (CSUR), 1983, 15(3): 237\u2013269","journal-title":"Journal of ACM Computing Surveys (CSUR)"},{"issue":"3","key":"9212_CR43","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1145\/146637.146670","volume":"39","author":"W I Gasarch","year":"1992","unstructured":"Gasarch W I, Smith C H. Learning via queries. Journal of ACM (JACM), 1992, 39(3): 649\u2013674","journal-title":"Journal of ACM (JACM)"},{"issue":"3","key":"9212_CR44","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/BF01578843","volume":"27","author":"O Watanabe","year":"1994","unstructured":"Watanabe O. A framework for polynomial-time query learnability. Journal of Mathematical Systems Theory, 1994, 27(3): 211\u2013229","journal-title":"Journal of Mathematical Systems Theory"},{"issue":"4","key":"9212_CR45","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1145\/76359.76371","volume":"36","author":"A Blumer","year":"1989","unstructured":"Blumer A, Ehrenfeucht A, Haussler D, Warmuth M K. Learnability and the vapnik-chervonenkis dimension. Journal of ACM (JACM), 1989, 36(4): 929\u2013965","journal-title":"Journal of ACM (JACM)"},{"issue":"4","key":"9212_CR46","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/48014.63140","volume":"35","author":"L Pitt","year":"1988","unstructured":"Pitt L, Valiant L G. Computational limitations on learning from examples. Journal of ACM (JACM), 1988, 35(4): 965\u2013984","journal-title":"Journal of ACM (JACM)"},{"issue":"3","key":"9212_CR47","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1016\/0022-0000(90)90028-J","volume":"41","author":"L Pitt","year":"1990","unstructured":"Pitt L, Warmuth M K. Prediction-preserving reducibility. Journal of Computer and System Sciences, 1990, 41(3): 430\u2013467","journal-title":"Journal of Computer and System Sciences"},{"issue":"2","key":"9212_CR48","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1006\/jcss.1995.1026","volume":"50","author":"D Angluin","year":"1995","unstructured":"Angluin D, Kharitonov M. When won\u2019t membership queries help? Journal of Computer and System Sciences, 1995, 50(2): 336\u2013355","journal-title":"Journal of Computer and System Sciences"},{"key":"9212_CR49","doi-asserted-by":"crossref","unstructured":"Steffen B, Howar F, Merten M. Introduction to active automata learning from a practical perspective. In: Proceedings of International School on Formal Methods for the Design of Computer, Communication and Software Systems. 2012, 256\u2013296","DOI":"10.1007\/978-3-642-21455-4_8"},{"issue":"2","key":"9212_CR50","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1006\/inco.1993.1021","volume":"103","author":"R L Rivest","year":"1993","unstructured":"Rivest R L, Schapire R E. Inference of finite automata using homing sequences. Journal of Information and Computation, 1993, 103(2): 299\u2013347","journal-title":"Journal of Information and Computation"},{"key":"9212_CR51","doi-asserted-by":"crossref","unstructured":"Groz R, Simao A, Petrenko A, Oriat C. Inferring finite state machines without reset using state identification sequences. In: Proceedings of International Conference on Testing Software and Systems. 2015, 161\u2013177","DOI":"10.1007\/978-3-319-25945-1_10"},{"key":"9212_CR52","volume-title":"Machine Learning for Dynamic Software","author":"S A Groz","year":"2018","unstructured":"Groz S AR, Petrenko A, Oriat C. Inferring fsm models of systems without reset. In: Bennaceur A, H\u00e4hnle R, Meinke K, eds. Machine Learning for Dynamic Software. Springer, Cham, 2018"},{"issue":"1","key":"9212_CR53","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/568438.568455","volume":"32","author":"J E Hopcroft","year":"2001","unstructured":"Hopcroft J E, Motwani R, Ullman J D. Introduction to automata theory, languages, and computation. ACM Sigact News, 2001, 32(1): 60\u201365","journal-title":"ACM Sigact News"},{"key":"9212_CR54","unstructured":"Niese O. An integrated approach to testing complex systems. Doctoral Disseration, Technical University of Dortmund, Germany, 2003"},{"key":"9212_CR55","doi-asserted-by":"crossref","unstructured":"Shahbaz M, Groz R. Inferring mealy machines. In: Proceedings of International Symposium on Formal Methods. 2009, 207\u2013222","DOI":"10.1007\/978-3-642-05089-3_14"},{"key":"9212_CR56","doi-asserted-by":"crossref","unstructured":"Shahbaz M, Li K, Groz R. Learning parameterized state machine model for integration testing. In: Proceedings of Computer Software and Applications Conference. 2007, 755\u2013760","DOI":"10.1109\/COMPSAC.2007.134"},{"issue":"1\u20132","key":"9212_CR57","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s10994-013-5405-0","volume":"96","author":"F Aarts","year":"2014","unstructured":"Aarts F, Kuppens H, Tretmans J, Vaandrager F, Verwer S. Improving active mealy machine learning for protocol conformance testing. Journal of Machine Learning, 2014, 96(1\u20132): 189\u2013224","journal-title":"Journal of Machine Learning"},{"key":"9212_CR58","doi-asserted-by":"crossref","unstructured":"Walkinshaw N, Derrick J, Guo Q. Iterative refinement of reverse-engineered models by model-based testing. In: Proceedings of International Symposium on Formal Methods. 2009, 305\u2013320","DOI":"10.1007\/978-3-642-05089-3_20"},{"key":"9212_CR59","volume-title":"Testing of Software and Communicating Systems","author":"R Groz","year":"2008","unstructured":"Groz R, Li K, Petrenko A, Shahbaz M. Modular system verification by inference, testing and reachability analysis. In: Suzuki K, Higashino T, Ulrich A, Hasegawa T, eds. Testing of Software and Communicating Systems. Springer, Berlin, Hedelberg, 2008"},{"key":"9212_CR60","volume-title":"Testing of Software and Communicating Systems","author":"A Huima","year":"2007","unstructured":"Huima A. Implementing conformiq qtronic. In: Petrenko A, Veanes M, Tretmans J, Griekamp W, eds. Testing of Software and Communicating Systems. Springer, Berlin, Hedelberg, 2007"},{"issue":"4","key":"9212_CR61","first-page":"21","volume":"41","author":"R Jhala","year":"2009","unstructured":"Jhala R, Majumdar R. Software model checking. Journal of ACM Computing Surveys (CSUR), 2009, 41(4): 21","journal-title":"Journal of ACM Computing Surveys (CSUR)"},{"key":"9212_CR62","doi-asserted-by":"crossref","unstructured":"Howar F, Steffen B, Jonsson B, Cassel S. Inferring canonical register automata. In: Proceedings of International Workshop on Verification, Model Checking, and Abstract Interpretation. 2012, 251\u2013266","DOI":"10.1007\/978-3-642-27940-9_17"},{"key":"9212_CR63","doi-asserted-by":"crossref","unstructured":"Howar F, Isberner M, Steffen B, Bauer O, Jonsson B. Inferring semantic interfaces of data structures. In: Proceedings of International Symposium on Leveraging Applications of Formal Methods, Verification and Validation. 2012, 554\u2013571","DOI":"10.1007\/978-3-642-34026-0_41"},{"key":"9212_CR64","doi-asserted-by":"crossref","unstructured":"Merten M, Howar F, Steffen B, Cassel S, Jonsson B. Demonstrating learning of register automata. In: Proceedings of International Conference on Tools and Algorithms for the Construction and Analysis of Systems. 2012, 466\u2013471","DOI":"10.1007\/978-3-642-28756-5_32"},{"issue":"1\u20132","key":"9212_CR65","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s10994-013-5419-7","volume":"96","author":"M Isberner","year":"2014","unstructured":"Isberner M, Howar F, Steffen B. Learning register automata: from languages to program structures. Journal of Machine Learning, 2014, 96(1\u20132): 65\u201398","journal-title":"Journal of Machine Learning"},{"issue":"2","key":"9212_CR66","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s00165-016-0355-5","volume":"28","author":"S Cassel","year":"2016","unstructured":"Cassel S, Howar F, Jonsson B, Steffen B. Active learning for extended finite state machines. Journal of Formal Aspects of Computing, 2016, 28(2): 233\u2013263","journal-title":"Journal of Formal Aspects of Computing"},{"key":"9212_CR67","doi-asserted-by":"crossref","unstructured":"Maler O, Mens I E. Learning regular languages over large alphabets. In: Proceedings of International Conference on Tools and Algorithms for the Construction and Analysis of Systems. 2014, 485\u2013499","DOI":"10.1007\/978-3-642-54862-8_41"},{"key":"9212_CR68","doi-asserted-by":"crossref","unstructured":"Argyros G, D\u2019Antoni L. The learnability of symbolic automata. In: Proceedings of International Conference on Computer Aided Verification. 2018, 427\u2013445","DOI":"10.1007\/978-3-319-96145-3_23"},{"key":"9212_CR69","doi-asserted-by":"crossref","unstructured":"Drews S, D\u2019Antoni L. Learning symbolic automata. In: Proceedings of International Conference on Tools and Algorithms for the Construction and Analysis of Systems. 2017, 173\u2013189","DOI":"10.1007\/978-3-662-54577-5_10"},{"key":"9212_CR70","doi-asserted-by":"crossref","unstructured":"Argyros G, Stais I, Kiayias A, Keromytis A D. Back in black: towards formal, black box analysis of sanitizers and filters. In: Proceedings of IEEE Symposium on Security and Privacy. 2016, 91\u2013109","DOI":"10.1109\/SP.2016.14"},{"key":"9212_CR71","doi-asserted-by":"crossref","unstructured":"Veanes M, Hooimeijer P, Livshits B, Molnar D, Bjorner N. Symbolic finite state transducers: algorithms and applications. In: Proceedings of the 39th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. 2012, 137\u2013150","DOI":"10.1145\/2103621.2103674"},{"key":"9212_CR72","doi-asserted-by":"crossref","unstructured":"Veanes M. Applications of symbolic finite automata. In: Proceedings of International Conference on Implementation and Application of Automata. 2013, 16\u201323","DOI":"10.1007\/978-3-642-39274-0_3"},{"key":"9212_CR73","doi-asserted-by":"crossref","unstructured":"Argyros G, Stais I, Jana S, Keromytis A D, Kiayias A. Sfadiff: automated evasion attacks and fingerprinting using black-box differential automata learning. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 2016, 1690\u20131701","DOI":"10.1145\/2976749.2978383"},{"issue":"2","key":"9212_CR74","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/0304-3975(94)90010-8","volume":"126","author":"R Alur","year":"1994","unstructured":"Alur R, Dill D L. A theory of timed automata. Journal of Theoretical Computer Science, 1994, 126(2): 183\u2013235","journal-title":"Journal of Theoretical Computer Science"},{"issue":"47","key":"9212_CR75","doi-asserted-by":"publisher","first-page":"4029","DOI":"10.1016\/j.tcs.2010.07.008","volume":"411","author":"O Grinchtein","year":"2010","unstructured":"Grinchtein O, Jonsson B, Leucker M. Learning of event-recording automata. Journal of Theoretical Computer Science, 2010, 411(47): 4029\u20134054","journal-title":"Journal of Theoretical Computer Science"},{"issue":"May","key":"9212_CR76","first-page":"473","volume":"5","author":"A Clark","year":"2004","unstructured":"Clark A, Thollard F. Pac-learnability of probabilistic deterministic finite state automata. Journal of Machine Learning Research, 2004, 5(May): 473\u2013497","journal-title":"Journal of Machine Learning Research"},{"key":"9212_CR77","doi-asserted-by":"crossref","unstructured":"Castro J, Gavald\u00e0 R. Towards feasible pac-learning of probabilistic deterministic finite automata. In: Proceedings of International Colloquium on Grammatical Inference. 2008, 163\u2013174","DOI":"10.1007\/978-3-540-88009-7_13"},{"key":"9212_CR78","doi-asserted-by":"crossref","unstructured":"Yokomori T. Learning Non-Deterministic Finite Automata From Queries and Counterexamples. Oxford University Press, 1994","DOI":"10.1145\/168304.168338"},{"key":"9212_CR79","doi-asserted-by":"crossref","unstructured":"Denis F, Lemay A, Terlutte A. Learning regular languages using non deterministic finite automata. In: Proceedings of International Colloquium on Grammatical Inference. 2000, 39\u201350","DOI":"10.1007\/978-3-540-45257-7_4"},{"key":"9212_CR80","volume-title":"Hybrid Systems","author":"R Alur","year":"1993","unstructured":"Alur R, Courcoubetis C, Henzinger T A, Ho P H. Hybrid automata: an algorithmic approach to the specification and verification of hybrid systems. In: Grossman R L, Herode A, Ravn A P, eds. Hybrid Systems. Springer, Berlin, Heideberg, 1993"},{"key":"9212_CR81","doi-asserted-by":"crossref","unstructured":"Van Der Aalst W, Adriansyah A, De Medeiros A K A, Arcieri F, Baier T, Blickle T, Bose J C, Brand V. d P, Brandtjen R, Buijs J, et al. Process mining manifesto. In: Proceedings of International Conference on Business Process Management. 2011, 169\u2013194","DOI":"10.1007\/978-3-642-28108-2_19"},{"issue":"2","key":"9212_CR82","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.tcs.2003.11.009","volume":"313","author":"C de la Higuera","year":"2004","unstructured":"de la Higuera C, Janodet J C. Inference of w-languages from prefixes. Theoretical Computer Science, 2004, 313(2): 295\u2013312","journal-title":"Theoretical Computer Science"},{"issue":"1","key":"9212_CR83","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/568438.568455","volume":"32","author":"J E Hopcroft","year":"2001","unstructured":"Hopcroft J E, Motwani R, Ullman J D. Introduction to automata theory, languages, and computation. Journal of ACM Sigact News, 2001, 32(1): 60\u201365","journal-title":"Journal of ACM Sigact News"},{"key":"9212_CR84","unstructured":"Bollig B, Habermehl P, Kern C, Leucker M. Angluin-style learning of NFA. In: Proceedings of International Joint Conference on Artificial Intelligence. 2009, 1004\u20131009"},{"key":"9212_CR85","doi-asserted-by":"crossref","unstructured":"Merten M, Howar F, Steffen B, Margaria T. Automata learning with on-the-fly direct hypothesis construction. In: Leveraging Applications of Formal Methods, Verification, and Validation. Springer, 2012","DOI":"10.1007\/978-3-642-34781-8_19"},{"issue":"2","key":"9212_CR86","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1006\/inco.1995.1070","volume":"118","author":"O Maler","year":"1995","unstructured":"Maler O, Pnueli A. On the learnability of infinitary regular sets. Journal of Information and Computation, 1995, 118(2): 316\u2013326","journal-title":"Journal of Information and Computation"},{"key":"9212_CR87","unstructured":"Irfan M N, Oriat C, Groz R. Model inference and testing. In: Advances in Computers. Elsevier, 2013"},{"key":"9212_CR88","doi-asserted-by":"crossref","unstructured":"Kearns M J, Vazirani U V. An Introduction to Computational Learning Theory. MIT Press, 1994","DOI":"10.7551\/mitpress\/3897.001.0001"},{"key":"9212_CR89","doi-asserted-by":"crossref","unstructured":"Isberner M, Howar F, Steffen B. The TTT algorithm: a redundancy-free approach to active automata learning. In: Proceedings of International Conference on Runtime Verification. 2014, 307\u2013322","DOI":"10.1007\/978-3-319-11164-3_26"},{"issue":"5","key":"9212_CR90","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1093\/jigpal\/jzl007","volume":"14","author":"A Groce","year":"2006","unstructured":"Groce A, Peled D, Yannakakis M. Adaptive model checking. Logic Journal of the IGPL, 2006, 14(5): 729\u2013744","journal-title":"Logic Journal of the IGPL"},{"key":"9212_CR91","doi-asserted-by":"crossref","unstructured":"Smeenk W, Moerman J, Vaandrager F, Jansen D N. Applying automata learning to embedded control software. In: Proceedings of International Conference on Formal Engineering Methods. 2015, 67\u201383","DOI":"10.1007\/978-3-319-25423-4_5"},{"issue":"8","key":"9212_CR92","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.1109\/5.533956","volume":"84","author":"D Lee","year":"1996","unstructured":"Lee D, Yannakakis M. Principles and methods of testing finite state machines-a survey. Proceedings of IEEE, 1996, 84(8): 1090\u20131123","journal-title":"Proceedings of IEEE"},{"key":"9212_CR93","doi-asserted-by":"crossref","unstructured":"Bos V P, Smetsers R, Vaandrager F. Enhancing automata learning by log-based metrics. In: Proceedings of International Conference on Integrated Formal Methods. 2016, 295\u2013310","DOI":"10.1007\/978-3-319-33693-0_19"},{"key":"9212_CR94","doi-asserted-by":"crossref","unstructured":"Chen Y F, Hsieh C, Leng\u00e1l O, Lii T J, Tsai M H, Wang B Y, Wang F. PAC learning-based verification and model synthesis. In: Proceedings of the 38th International Conference on Software Engineering. 2016, 714\u2013724","DOI":"10.1145\/2884781.2884860"},{"key":"9212_CR95","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1109\/TSE.1978.231496","volume":"3","author":"T S Chow","year":"1978","unstructured":"Chow T S. Testing software design modeled by finite-state machines. IEEE Transactions on Software Engineering, 1978, 3: 178\u2013187","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"6","key":"9212_CR96","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1109\/32.87284","volume":"17","author":"S Fujiwara","year":"1991","unstructured":"Fujiwara S, Bochmann G V, Khendek F, Amalou M, Ghedamsi A. Test selection based on finite state models. IEEE Transactions on Software Engineering, 1991, 17(6): 591\u2013603","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"8","key":"9212_CR97","doi-asserted-by":"publisher","first-page":"1282","DOI":"10.1109\/26.156631","volume":"40","author":"Y Shen","year":"1992","unstructured":"Shen Y, Lombardi F, Dahbura A T. Protocol conformance testing using multiple UIO sequences. IEEE Transactions on Communications, 1992, 40(8): 1282\u20131287","journal-title":"IEEE Transactions on Communications"},{"key":"9212_CR98","unstructured":"Vuong S T. The uiov-method for protocol test sequence generation. In: Proceedings of the 2nd IFIP International Workshop on Protocol Test Systems. 1989, 161\u2013175"},{"key":"9212_CR99","doi-asserted-by":"crossref","unstructured":"Aarts F, Jonsson B, Uijen J. Generating models of infinite-state communication protocols using regular inference with abstraction. In: Proceedings of IFIP International Conference on Testing Software and Systems. 2010, 188\u2013204","DOI":"10.1007\/978-3-642-16573-3_14"},{"issue":"1","key":"9212_CR100","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10703-014-0216-x","volume":"46","author":"F Aarts","year":"2015","unstructured":"Aarts F, Jonsson B, Uijen J, Vaandrager F. Generating models of infinite-state communication protocols using regular inference with abstraction. Journal of Formal Methods in System Design, 2015, 46(1): 1\u201341","journal-title":"Journal of Formal Methods in System Design"},{"key":"9212_CR101","doi-asserted-by":"crossref","unstructured":"Cho C Y, Babi\u0107 D, Shin E C R, Song D. Inference and analysis of formal models of botnet command and control protocols. In: Proceedings of the 17th ACM Conference on Computer and Communications Security. 2010, 426\u2013439","DOI":"10.1145\/1866307.1866355"},{"key":"9212_CR102","unstructured":"Chalupar G, Peherstorfer S, Poll E, De Ruiter J. Automated reverse engineering using lego\u00ae. In: Proceedings of the 8th ENIX Workshop on Offensive Technologies ({WOOT} 14). 2014"},{"key":"9212_CR103","doi-asserted-by":"crossref","unstructured":"Vaandrager F. Active learning of extended finite state machines. In: Proceedings of International Conference on Testing Software and Systems. 2012, 5\u20137","DOI":"10.1007\/978-3-642-34691-0_2"},{"key":"9212_CR104","doi-asserted-by":"crossref","unstructured":"Aarts F, Heidarian F, Kuppens H, Olsen P, Vaandrager F. Automata learning through counterexample guided abstraction refinement. In: Proceedings of International Symposium on Formal Methods. 2012, 10\u201327","DOI":"10.1007\/978-3-642-32759-9_4"},{"key":"9212_CR105","doi-asserted-by":"crossref","unstructured":"Aarts F, Heidarian F, Vaandrager F. A theory of history dependent abstractions for learning interface automata. In: Proceedings of International Conference on Concurrency Theory. 2012, 240\u2013255","DOI":"10.1007\/978-3-642-32940-1_18"},{"issue":"3","key":"9212_CR106","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1016\/S0019-9958(78)90562-4","volume":"37","author":"E M Gold","year":"1978","unstructured":"Gold E M. Complexity of automaton identification from given data. Journal of Information and Control, 1978, 37(3): 302\u2013320","journal-title":"Journal of Information and Control"},{"key":"9212_CR107","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-319-23820-3_25","volume-title":"Runtime Verification","author":"M Isberner","year":"2015","unstructured":"Isberner M, Steffen B, Howar F. Learnlib tutorial. In: Bartocci E, Majumdar R, eds. Runtime Verification. Springer, Cham, 2015, 358\u2013377"},{"key":"9212_CR108","unstructured":"Xiao H. Automatic model learning and its applications in malware detection. Doctoral Dissertation, Nanyang Technological University, 2017"},{"key":"9212_CR109","unstructured":"Aarts F D. Tomte: bridging the gap between active learning and real-world systems. Doctoral Dissertation, Radboud University Nijmegen, 2014"},{"key":"9212_CR110","unstructured":"Fiterau-Brostean P. Active model learning for the analysis of network protocols. Doctoral Dissertation, Radboud University, 2018"},{"key":"9212_CR111","volume-title":"Analysis and optimization of software model inference algorithms","author":"M N Irfan","year":"2012","unstructured":"Irfan M N. Analysis and optimization of software model inference algorithms. Universita de Grenoble, Grenoble, France, 2012"},{"key":"9212_CR112","unstructured":"Czerny M X. Learning-based software testing: evaluation of angluin\u2019s L* algorithm and adaptations in practice. Batchelors Thesis, Karlsruhe Institute of Technology, 2014"},{"key":"9212_CR113","unstructured":"Henrix M. Performance improvement in automata learning. Master thesis, Radboud University, 2015"},{"key":"9212_CR114","unstructured":"Uijen J. Learning models of communication protocols using abstraction techniques. Master Thesis, Uppscola University, 2009"},{"key":"9212_CR115","unstructured":"Aarts F. Inference and abstraction of communication protocols. Master Thesis, Uppscola University, 2009"},{"key":"9212_CR116","unstructured":"Bohlin T, Jonsson B. Regular inference for communication protocol entities. Technical Report 2008\u2013024, Uppsala University, Computer Systems, 2008"},{"key":"9212_CR117","unstructured":"Berg T. Regular inference for reactive systems. Doctoral Dissertation, Uppsala Universitet, 2006"},{"key":"9212_CR118","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.entcs.2004.12.015","volume":"118","author":"T Berg","year":"2005","unstructured":"Berg T, Jonsson B, Leucker M, Saksena M. Insights to angluin\u2019s learning. Journal of Electronic Notes in Theoretical Computer Science, 2005, 118: 3\u201318","journal-title":"Journal of Electronic Notes in Theoretical Computer Science"},{"key":"9212_CR119","doi-asserted-by":"crossref","unstructured":"Irfan M N. State machine inference in testing context with long counterexamples. In: Proceedings of International Conference on Software Testing, Verification and Validation. 2010, 508\u2013511","DOI":"10.1109\/ICST.2010.68"},{"issue":"4","key":"9212_CR120","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1109\/32.16602","volume":"15","author":"D P Sidhu","year":"1989","unstructured":"Sidhu D P, Leung T K. Formal methods for protocol testing: a detailed study. IEEE Transactions on Software Engineering, 1989, 15(4): 413\u2013426","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9212_CR121","doi-asserted-by":"crossref","unstructured":"Dorofeeva R, El-Fakih K, Maag S, Cavalli A R, Yevtushenko N. Experimental evaluation of fsm-based testing methods. In: Proceedings of the 3rd IEEE International Conference on Software Engineering and Formal Methods. 2005, 23\u201332","DOI":"10.1109\/SEFM.2005.17"},{"key":"9212_CR122","doi-asserted-by":"crossref","unstructured":"Aarts F, Howar F, Kuppens H, Vaandrager F. Algorithms for inferring register automata. In: Proceedings of International Symposium on Leveraging Applications of Formal Methods, Verification and Validation. 2014, 202\u2013219","DOI":"10.1007\/978-3-662-45234-9_15"},{"key":"9212_CR123","unstructured":"Stevens P, Moller F. The edinburgh concurrency workbench user manual (version 7.1). Laboratory for Foundations of Computer Science, University of Edinburgh, 1999, 7"},{"key":"9212_CR124","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1006\/inco.1995.1070","volume":"118","author":"O Maler","year":"1991","unstructured":"Maler O, Pnueli A. On the learnability of infinitary regular sets. Information and Computation, 1991, 118: 316\u2013326","journal-title":"Information and Computation"},{"key":"9212_CR125","doi-asserted-by":"crossref","unstructured":"Irfan M N, Oriat C, Groz R. Angluin style finite state machine inference with non-optimal counterexamples. In: Proceedings of the 1st International Workshop on Model Inference in Testing. 2010, 11\u201319","DOI":"10.1145\/1868044.1868046"},{"key":"9212_CR126","doi-asserted-by":"crossref","unstructured":"Merten M, Howar F, Steffen B, Margaria T. Automata learning with on-the-fly direct hypothesis construction. In: Proceedings of International Symposium on Leveraging Applications of Formal Methods, Verification and Validation. 2011, 248\u2013260","DOI":"10.1007\/978-3-642-34781-8_19"},{"key":"9212_CR127","unstructured":"Isberner M, Steffen B. An abstract framework for counterexample analysis in active automata learning. In: Proceedings of International Conference on Grammatical Inference. 2014, 79\u201393"},{"key":"9212_CR128","doi-asserted-by":"crossref","unstructured":"Li K, Groz R, Shahbaz M. Integration testing of distributed components based on learning parameterized I\/O models. In: Proceedings of International Conference on Formal Techniques for Networked and Distributed Systems. 2006, 436\u2013450","DOI":"10.1007\/11888116_31"},{"key":"9212_CR129","unstructured":"Howar F. Active Learning of Interface Programs. Doctoral Dissertation, TU Dortmund University, 2012"},{"key":"9212_CR130","doi-asserted-by":"crossref","unstructured":"Cassel S, Howar F, Jonsson B, Steffen B. Learning extended finite state machines. In: Proceedings of International Conference on Software Engineering and Formal Methods. 2014, 250\u2013264","DOI":"10.1007\/978-3-319-10431-7_18"},{"key":"9212_CR131","doi-asserted-by":"crossref","unstructured":"D\u2019Antoni L, Veanes M. The power of symbolic automata and transducers. In: Proceedings of International Conference on Computer Aided Verification. 2017, 47\u201367","DOI":"10.1007\/978-3-319-63387-9_3"},{"key":"9212_CR132","doi-asserted-by":"crossref","unstructured":"Isberner M, Howar F, Steffen B. The open-source learnlib. In: Proceedings of International Conference on Computer Aided Verification. 2015, 487\u2013495","DOI":"10.1007\/978-3-319-21690-4_32"},{"key":"9212_CR133","doi-asserted-by":"crossref","unstructured":"Isberner M, Howar F, Steffen B. The open-source learnlib. In: Proceedings of International Conference on Computer Aided Verification. 2015, 487\u2013495","DOI":"10.1007\/978-3-319-21690-4_32"},{"key":"9212_CR134","doi-asserted-by":"crossref","unstructured":"Raffelt H, Steffen B. LearnLib a library for automata learning and experimentation. In: Proceedings of the 9th International Conference on Fundamental Approaches to Software Engineering. 2006, 377\u2013380","DOI":"10.1007\/11693017_28"},{"key":"9212_CR135","doi-asserted-by":"crossref","unstructured":"Isberner M, Howar F, Steffen B. Inferring automata with state-local alphabet abstractions. In: Proceedings of NASA Formal Methods Symposium. 2013, 124\u2013138","DOI":"10.1007\/978-3-642-38088-4_9"},{"key":"9212_CR136","unstructured":"Hopcroft J E, Karp R M. A linear algorithm for testing equivalence of finite automata. Technical Report, Cornell University, 1971"},{"key":"9212_CR137","doi-asserted-by":"crossref","unstructured":"Giannakopoulou D, Rakamari\u0107 Z, Raman V. Symbolic learning of component interfaces. In: Proceedings of International Static Analysis Symposium. 2012, 248\u2013264","DOI":"10.1007\/978-3-642-33125-1_18"},{"key":"9212_CR138","doi-asserted-by":"crossref","unstructured":"Howar F, Giannakopoulou D, Rakamari\u0107 Z. Hybrid learning: interface generation through static, dynamic, and symbolic analysis. In: Proceedings of the 2013 International Symposium on Software Testing and Analysis. 2013, 268\u2013279","DOI":"10.1145\/2483760.2483783"},{"key":"9212_CR139","doi-asserted-by":"crossref","unstructured":"Bainczyk A, Schieweck A, Isberner M, Margaria T, Neubauer J, Steffen B. Alex: mixed-mode learning of web applications at ease. In: Proceedings of International Symposium on Leveraging Applications of Formal Methods. 2016, 655\u2013671","DOI":"10.1007\/978-3-319-47169-3_51"},{"issue":"1","key":"9212_CR140","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1145\/2480359.2429123","volume":"48","author":"M Botin\u010dan","year":"2013","unstructured":"Botin\u010dan M, Babi\u0107 D. Sigma* symbolic learning of input-output specifications. Journal of ACM SIGPLAN Notices, 2013, 48(1): 443\u2013456","journal-title":"Journal of ACM SIGPLAN Notices"},{"key":"9212_CR141","doi-asserted-by":"crossref","unstructured":"Bollig B, Katoen J P, Kern C, Leucker M, Neider D, Piegdon D R. Libalf: the automata learning framework. In: Proceedings of International Conference on Computer Aided Verification. 2010, 360\u2013364","DOI":"10.1007\/978-3-642-14295-6_32"},{"key":"9212_CR142","doi-asserted-by":"crossref","unstructured":"Merten M, Steffen B, Howar F, Margaria T. Next generation learnlib. In: Proceedings of International Conference on Tools and Algorithms for the Construction and Analysis of Systems. 2011, 220\u2013223","DOI":"10.1007\/978-3-642-19835-9_18"},{"key":"9212_CR143","unstructured":"Cassel S, Howar F, Jonsson B. RAlib: A learnLib extension for inferring EFSMs. DIFTS, 2015"},{"key":"9212_CR144","unstructured":"Khalili A, Tacchella A. Aide: automata-identification engine. see Archive. codeplex Website, 2014"},{"key":"9212_CR145","doi-asserted-by":"crossref","unstructured":"Aarts F, Schmaltz J, Vaandrager F. Inference and abstraction of the biometric passport. In: Proceedings of International Symposium on Leveraging Applications of Formal Methods, Verification and Validation. 2010, 673\u2013686","DOI":"10.1007\/978-3-642-16558-0_54"},{"key":"9212_CR146","doi-asserted-by":"crossref","unstructured":"Aarts F, De Ruiter J, Poll E. Formal models of bank cards for free. In: Proceedings of Software Testing, Verification and Validation Workshops. 2013, 461\u2013468","DOI":"10.1109\/ICSTW.2013.60"},{"key":"9212_CR147","unstructured":"Smeenk W. Applying automata learning to complex industrial software. Master\u2019s Thesis, Radboud University Nijmegen, 2012"},{"key":"9212_CR148","unstructured":"Janssen R, Vaandrager F W, Verwer S. Learning a state diagram of tcp using abstraction. Bachelor Thesis, ICIS, Radboud University Nijmegen, 2013, 12"},{"key":"9212_CR149","doi-asserted-by":"crossref","unstructured":"Fiter\u0103u-Bro\u015ftean P, Janssen R, Vaandrager F. Learning fragments of the tcp network protocol. In: Proceedings of International Workshop on Formal Methods for Industrial Critical Systems. 2014, 78\u201393","DOI":"10.1007\/978-3-319-10702-8_6"},{"key":"9212_CR150","unstructured":"Tijssen M. Automatic modeling of ssh implementations with state machine learning algorithms. Bachelor thesis, Radboud University, Nijmegen, 2014"},{"key":"9212_CR151","doi-asserted-by":"crossref","unstructured":"Fiter T P, Janssen R, Vaandrager F. Combining model learning and model checking to analyze tcp implementations. In: Proceedings of International Conference on Computer Aided Verification. 2016, 454\u2013471","DOI":"10.1007\/978-3-319-41540-6_25"},{"key":"9212_CR152","doi-asserted-by":"crossref","unstructured":"Fiter\u0103u-Bro\u015ftean P, Lenaerts T, Poll E, Ruiter d J, Vaandrager F, Verleg P. Model learning and model checking of SSH implementations. In: Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software. 2017, 142\u2013151","DOI":"10.1145\/3092282.3092289"},{"key":"9212_CR153","doi-asserted-by":"crossref","unstructured":"Schuts M, Hooman J, Vaandrager F. Refactoring of legacy software using model learning and equivalence checking: an industrial experience report. In: Proceedings of International Conference on Integrated Formal Methods. 2016, 311\u2013325","DOI":"10.1007\/978-3-319-33693-0_20"},{"key":"9212_CR154","doi-asserted-by":"crossref","unstructured":"Neubauer J, Steffen B, Bauer O, Windm\u00fcller S, Merten M, Margaria T, Howar F. Automated continuous quality assurance. In: Proceedings of International Workshop on Formal Methods in Software Engineering: Rigorous and Agile Approaches. 2012, 37\u201343","DOI":"10.1109\/FormSERA.2012.6229787"},{"key":"9212_CR155","doi-asserted-by":"crossref","unstructured":"Windm\u00fcller S, Neubauer J, Steffen B, Howar F, Bauer O. Active continuous quality control. In: Proceedings of the 16th International ACM Sigsoft Symposium on Component-based Software Engineering. 2013, 111\u2013120","DOI":"10.1145\/2465449.2465469"},{"key":"9212_CR156","unstructured":"Verleg P, Poll E, Vaandrager F. Inferring SSH state machines using protocol state fuzzing. Masters Thesis, Radboud University, 2016"},{"key":"9212_CR157","doi-asserted-by":"crossref","unstructured":"Groce A, Peled D, Yannakakis M. Adaptive model checking. In: Proceedings of International Conference on Tools and Algorithms for the Construction and Analysis of Systems, 2002, 269\u2013301","DOI":"10.1007\/3-540-46002-0_25"},{"key":"9212_CR158","unstructured":"Li K, Groz R, Shahbaz M. Integration testing of components guided by incremental state machine learning. In: Proceedings of the Testing: Academic and Industrial Conference on Practice and Research Techniques. 2006, 59\u201370"},{"issue":"4","key":"9212_CR159","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1002\/stvr.1491","volume":"24","author":"M Shahbaz","year":"2014","unstructured":"Shahbaz M, Groz R. Analysis and testing of black-box component-based systems by inferring partial models. Journal of Software Testing, Verification and Reliability, 2014, 24(4): 253\u2013288","journal-title":"Journal of Software Testing, Verification and Reliability"},{"key":"9212_CR160","volume-title":"Testing of Software and Communicating Systems","author":"M Shahbaz","year":"2007","unstructured":"Shahbaz M, Li K, Groz R. Learning and integration of parameterized components through testing. In: Petrenko A, Veanes M, Tretmans J, Grieskamp W, eds. Testing of Software and Communicating Systems. Springer, Berlin, Hedelberg, 2007"},{"key":"9212_CR161","unstructured":"Shahbaz M, Parreaux B, Klay F. Model inference approach for detecting feature interactions in integrated systems. In: Proceedings of International Conference on Feature Interactions in Software and Communication Systems. 2007, 161\u2013171"},{"key":"9212_CR162","doi-asserted-by":"crossref","unstructured":"Walkinshaw N, Bogdanov K, Derrick J, Paris J. Increasing functional coverage by inductive testing: a case study. In: Proceedings of International Conference on Testing Software and Systems. 2010, 126\u2013141","DOI":"10.1007\/978-3-642-16573-3_10"},{"key":"9212_CR163","doi-asserted-by":"crossref","unstructured":"Cobleigh J M, Giannakopoulou D, Pasareanu C S. Learning assumptions for compositional verification. In: Proceedings of International Conference on Tools and Algorithms for the Construction and Analysis of Systems. 2003,331\u2013346","DOI":"10.1007\/3-540-36577-X_24"},{"issue":"3","key":"9212_CR164","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s10703-008-0049-6","volume":"32","author":"S C P\u0103s\u0103reanu","year":"2008","unstructured":"P\u0103s\u0103reanu S C, Giannakopoulou D, Bobaru M G, Cobleigh J M, Barringer H. Learning to divide and conquer: applying the L* algorithm to automate assume-guarantee reasoning. Formal Methods in System Design, 2008, 32(3): 175\u2013205","journal-title":"Formal Methods in System Design"},{"key":"9212_CR165","doi-asserted-by":"crossref","unstructured":"He F, Mao S, Wang B Y. Learning-based assume-guarantee regression verification. In: Proceedings of International Conference on Computer Aided Verification. 2016, 310\u2013328","DOI":"10.1007\/978-3-319-41528-4_17"},{"key":"9212_CR166","doi-asserted-by":"crossref","unstructured":"Chen Y F, Clarke E M, Farzan A, He F, Tsai M H, Tsay Y K, Wang B Y, Zhu L. Comparing learning algorithms in automated assume-guarantee reasoning. In: Proceedings of International Symposium on Leveraging Applications of Formal Methods, Verification and Validation. 2010, 643\u2013657","DOI":"10.1007\/978-3-642-16558-0_52"},{"key":"9212_CR167","doi-asserted-by":"crossref","unstructured":"Chen Y F, Clarke E M, Farzan A, Tsai M H, Tsay Y K, Wang B Y. Automated assume-guarantee reasoning through implicit learning. In: Proceedings of International Conference on Computer Aided Verification. 2010, 511\u2013526","DOI":"10.1007\/978-3-642-14295-6_44"},{"key":"9212_CR168","doi-asserted-by":"crossref","unstructured":"He F, Wang B Y, Yin L, Zhu L. Symbolic assume-guarantee reasoning through BDD learning. In: Proceedings of the 36th International Conference on Software Engineering. 2014, 1071\u20131082","DOI":"10.1145\/2568225.2568253"},{"key":"9212_CR169","doi-asserted-by":"crossref","unstructured":"Lin S W, Hsiung P A. Compositional synthesis of concurrent systems through causal model checking and learning. In: Proceedings of International Symposium on Formal Methods. 2014, 416\u2013431","DOI":"10.1007\/978-3-319-06410-9_29"},{"key":"9212_CR170","doi-asserted-by":"crossref","unstructured":"Neider D, Topcu U. An automaton learning approach to solving safety games over infinite graphs. In: Proceedings of International Conference on Tools and Algorithms for the Construction and Analysis of Systems. 2016, 204\u2013221","DOI":"10.1007\/978-3-662-49674-9_12"},{"key":"9212_CR171","unstructured":"Margaria T, Niese O, Steffen B, Erochok A. System level testing of virtual switch (re-) configuration over IP. In: Proceedings of the 7th IEEE European Test Workshop. 2002, 67\u201372"},{"key":"9212_CR172","doi-asserted-by":"crossref","unstructured":"Niese O, Steffen B, Margaria T, Hagerer A, Brune G, Ide H D. Library-based design and consistency checking of system-level industrial test cases. In: Proceedings of International Conference on Fundamental Approaches to Software Engineering, 2001, 233\u2013248","DOI":"10.1007\/3-540-45314-8_17"},{"key":"9212_CR173","doi-asserted-by":"crossref","unstructured":"Feng L, Lundmark S, Meinke K, Niu F, Sindhu M A, Wong P Y. Case studies in learning-based testing. In: Proceedings of International Conference on Testing Software and Systems. 2013, 164\u2013179","DOI":"10.1007\/978-3-642-41707-8_11"},{"issue":"1\u20132","key":"9212_CR174","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1023\/A:1010828029885","volume":"44","author":"A L Oliveira","year":"2001","unstructured":"Oliveira A L, Silva J P. Efficient algorithms for the inference of minimum size dfas. Journal of Machine Learning, 2001, 44(1\u20132): 93\u2013119","journal-title":"Journal of Machine Learning"},{"issue":"10","key":"9212_CR175","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1145\/2544173.2509552","volume":"48","author":"W Choi","year":"2013","unstructured":"Choi W, Necula G, Sen K. Guided gui testing of android apps with minimal restart and approximate learning. ACM SIGPLAN Notices, 2013, 48(10): 623\u2013640","journal-title":"ACM SIGPLAN Notices"},{"issue":"1","key":"9212_CR176","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1145\/1047659.1040314","volume":"40","author":"R Alur","year":"2005","unstructured":"Alur R, \u010cern\u00fd P, Madhusudan P, Nam W. Synthesis of interface specifications for java classes. ACM SIGPLAN Notices, 2005, 40(1): 98\u2013109","journal-title":"ACM SIGPLAN Notices"},{"key":"9212_CR177","doi-asserted-by":"crossref","unstructured":"Xiao H, Sun J, Liu Y, Lin S W, Sun C. Tzuyu: learning stateful type-states. In: Proceedings of the 28th International Automated Software Engineering. 2013, 432\u2013442","DOI":"10.1109\/ASE.2013.6693101"},{"key":"9212_CR178","doi-asserted-by":"crossref","unstructured":"Raffelt H, Steffen B, Margaria T. Dynamic testing via automata learning. In: Proceedings of Haifa Verification Conference. 2007, 136\u2013152","DOI":"10.1007\/978-3-540-77966-7_13"},{"key":"9212_CR179","unstructured":"Clarke E, Long D, McMillan K. Compositional model checking. In: Proceedings of the 4th Annual Symposium on Logic in Computer Science. 1989"},{"key":"9212_CR180","unstructured":"Smeenk W, Vaandrager F W. Applying automata learning to complex industrial software. Master\u2019s Thesis, Radboud University Nijmegen, 2012"},{"key":"9212_CR181","doi-asserted-by":"crossref","unstructured":"Tappler M, Aichernig B K, Bloem R. Model-based testing IoT communication via active automata learning. In: Proceedings of IEEE International Conference on Software Testing, Verification and Validation. 2017, 276\u2013287","DOI":"10.1109\/ICST.2017.32"},{"key":"9212_CR182","doi-asserted-by":"crossref","unstructured":"Aarts F, Fiterau-Brostean P, Kuppens H, Vaandrager F. Learning register automata with fresh value generation. In: Proceedings of International Colloquium on Theoretical Aspects of Computing. 2015, 165\u2013183","DOI":"10.1007\/978-3-319-25150-9_11"},{"key":"9212_CR183","doi-asserted-by":"crossref","unstructured":"Meinke K, Sindhu M A. Incremental learning-based testing for reactive systems. In: Proceedings of International Conference on Tests and Proofs. 2011, 134\u2013151","DOI":"10.1007\/978-3-642-21768-5_11"},{"key":"9212_CR184","doi-asserted-by":"crossref","unstructured":"Volpato M, Tretmans J. Active learning of nondeterministic systems from an ioco perspective. In: Proceedings of International Symposium on Leveraging Applications of Formal Methods, Verification and Validation. 2014, 220\u2013235","DOI":"10.1007\/978-3-662-45234-9_16"},{"key":"9212_CR185","doi-asserted-by":"crossref","unstructured":"Groz R, Irfan M N, Oriat C. Algorithmic improvements on regular inference of software models and perspectives for security testing. In: Proceedings of International Symposium on Leveraging Applications of Formal Methods, Verification and Validation. 2012, 444\u2013457","DOI":"10.1007\/978-3-642-34026-0_33"},{"issue":"1\u20133","key":"9212_CR186","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.scico.2007.01.015","volume":"69","author":"M D Ernst","year":"2007","unstructured":"Ernst M D, Perkins J H, Guo P J, McCamant S, Pacheco C, Tschantz M S, Xiao C. The daikon system for dynamic detection of likely invariants. Journal of Science of Computer Programming, 2007, 69(1\u20133): 35\u201345","journal-title":"Journal of Science of Computer Programming"},{"issue":"4","key":"9212_CR187","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/1013886.1007520","volume":"29","author":"L Nachmanson","year":"2004","unstructured":"Nachmanson L, Veanes M, Schulte W, Tillmann N, Grieskamp W. Optimal strategies for testing nondeterministic systems. ACM SIGSOFT Software Engineering Notes, 2004, 29(4): 55\u201364","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"9212_CR188","unstructured":"Volpato M, Tretmans J. Approximate active learning of nondeterministic input output transition systems. Electronic Communications of the EASST, 2015, 72"},{"key":"9212_CR189","unstructured":"Khalili A, Tacchella A. Learning nondeterministic mealy machines. In: Proceedings of International Conference on Grammatical Inference. 2014, 109\u2013123"},{"key":"9212_CR190","unstructured":"El-Fakih K, Groz R, Irfan M N, Shahbaz M. Learning finite state models of observable nondeterministic systems in a testing context. In: Proceedings of International Conference on Testing Software and Systems. 2010, 97\u2013102"},{"key":"9212_CR191","unstructured":"Dallmeier V. Mining and checking object behavior. Doctoral Dissertation, 2010"},{"issue":"1","key":"9212_CR192","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s10270-008-0106-z","volume":"9","author":"W M P Van der Aalst","year":"2010","unstructured":"Van der Aalst W M P, Rubin V, Verbeek H M W, Dongen V B F, Kindler E, G\u00fcnther C W. Process mining: a two-step approach to balance between underfitting and overfitting. Journal of Software & Systems Modeling, 2010, 9(1): 87","journal-title":"Journal of Software & Systems Modeling"},{"key":"9212_CR193","doi-asserted-by":"crossref","unstructured":"Meinke K. CGE: a sequential learning algorithm for mealy automata. In: Proceedings of International Colloquium on Grammatical Inference. 2010, 148\u2013162","DOI":"10.1007\/978-3-642-15488-1_13"},{"key":"9212_CR194","volume-title":"Formal Methods for Protocol Engineering and Distributed Systems","author":"D Peled","year":"1999","unstructured":"Peled D, Vardi M Y, Yannakakis M. Black box checking. In: Wu J, Chanson S T, Gao Q, eds. Formal Methods for Protocol Engineering and Distributed Systems. Springer, Boston, MA, 1999"},{"key":"9212_CR195","doi-asserted-by":"crossref","unstructured":"Cassel S, Howar F, Jonsson B, Merten M, Steffen B. A succinct canonical register automaton model. In: Proceedings of International Symposium on Automated Technology for Verification and Analysis. 2011, 366\u2013380","DOI":"10.1007\/978-3-642-24372-1_26"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-019-9212-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-019-9212-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-019-9212-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,19]],"date-time":"2022-11-19T22:25:07Z","timestamp":1668896707000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-019-9212-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,29]]},"references-count":195,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["9212"],"URL":"https:\/\/doi.org\/10.1007\/s11704-019-9212-z","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,29]]},"assertion":[{"value":"11 June 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 October 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 June 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"155210"}}