{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:00:09Z","timestamp":1729663209459,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/cicybs.2011.5949387","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T11:55:21Z","timestamp":1310558121000},"page":"152-159","source":"Crossref","is-referenced-by-count":2,"title":["Exploring the state space of an application protocol: A case study of SMTP"],"prefix":"10.1109","author":[{"given":"Patrick","family":"LaRoche","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]},{"given":"Malcolm I.","family":"Heywood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Automatic network protocol analysis","author":"wondracek","year":"2008","journal-title":"Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS'08)"},{"key":"ref11","article-title":"Syntax-based vulnerability testing of frame-based network protocols","author":"tal","year":"2004","journal-title":"Proc 2nd Annual Conference on Privacy Security and Trust"},{"key":"ref12","article-title":"Vulnerability analysis of software through syntax testing","author":"kaksonen","year":"2000","journal-title":"University of Oulu Finland Tech Rep"},{"key":"ref13","first-page":"155","article-title":"Scl: a language for security testing of network applications","author":"marquis","year":"2005","journal-title":"CASCON '05 Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNMC.2003.1243061"},{"key":"ref15","article-title":"Simple Mail Transfer Protocol","author":"postel","year":"1982","journal-title":"obsoleted by RFC 2821"},{"key":"ref16","article-title":"Simple Mail Transfer Protocol","author":"klensin","year":"2001","journal-title":"obsoleted by RFC 5321 updated by RFC 5336"},{"key":"ref17","article-title":"SMTP Extension for Internationalized Email Addresses","author":"yao","year":"2008","journal-title":"RFC 5336 (Experimental) Internet Engineering Task Force"},{"key":"ref18","article-title":"Simple Mail Transfer Protocol","author":"klensin","year":"2008","journal-title":"RFC 5321 (Draft Standard) Internet Engineering Task Force"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1143997.1144271"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356541"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71805-5_2"},{"key":"ref6","article-title":"Steps toward the evolution of communication in a multi-agent system","author":"froese","year":"2003","journal-title":"Symposium for Cybernetics Annual Research Projects SCARP'03 Citeseer"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1007\/978-3-642-12148-7_5","article-title":"Novelty-based fitness: An evaluation under the santa fe trail","volume":"6021","author":"doucette","year":"2010","journal-title":"Genetic Programming Ser Lecture Notes in Computer Science"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CIMCA.2006.71"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WAC.2006.375958"},{"key":"ref2","first-page":"311","article-title":"A compiling genetic programming system that directly manipulates the machine code","author":"nordin","year":"1994","journal-title":"Advances in Genetic Programming"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2002.999814"},{"key":"ref9","first-page":"329","article-title":"Polyglot: Automatic extraction of protocol message format using dynamic binary analysis","author":"caballero","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12242-2_11"},{"key":"ref22","first-page":"1077","article-title":"The evolution of genetic code in genetic programming","volume":"2","author":"keller","year":"1999","journal-title":"Proceedings of the Genetic and Evolutionary Computation Conference"},{"key":"ref21","first-page":"28","article-title":"Toward simulated evolution of machine language iteration","author":"huelsbergen","year":"1996","journal-title":"Genetic Programming 1996 Proceedings of the First Annual Conference"}],"event":{"name":"2011 IEEE Symposium On Computational Intelligence In Cyber Security - Part Of 17273 - 2011 Ssci","start":{"date-parts":[[2011,4,11]]},"location":"Paris, France","end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5937004\/5949383\/05949387.pdf?arnumber=5949387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T23:10:51Z","timestamp":1497913851000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5949387\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/cicybs.2011.5949387","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}