{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:11:39Z","timestamp":1771657899277,"version":"3.50.1"},"reference-count":42,"publisher":"Zhejiang University Press","issue":"12","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front Inform Technol Electron Eng"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1631\/fitee.2400487","type":"journal-article","created":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T23:38:13Z","timestamp":1765582693000},"page":"2529-2549","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Active inference of protocol state machines from incomplete message domains"],"prefix":"10.1631","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7990-4165","authenticated-orcid":false,"given":"Maohua","family":"Guo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9559-8783","authenticated-orcid":false,"given":"Yuefei","family":"Zhu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8499-9402","authenticated-orcid":false,"given":"Jinlong","family":"Fei","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2025,12,12]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00682-2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(87)90052-6"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241275"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/wcre.2011.28"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.02.015"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590346"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.001"},{"key":"ref8","article-title":"Poster: a Monte Carlo ensemble approach to automatically identifying keywords in binary message formats","author":"Chandler","year":"2023","journal-title":"Proc Network and Distributed System Security Symp"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23131"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866355"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/infocom.2017.8057064"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3488028"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/32.87284"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/s0019-9958(67)91165-5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.11.009"},{"key":"ref16","article-title":"NEMESYS: network message syntax reverse engineering by analysis of the intrinsic structure of individual messages","volume-title":"Proc 12th USENIX Workshop on Offensive Technologies","author":"Kleber","year":"2018"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/dsn-w54100.2022.00023"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.110114"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99828-2_11"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/csac.2005.49"},{"issue":"1","key":"ref21","first-page":"167","article-title":"Private protocol reverse engineering based on network traffic: a survey","volume":"60","author":"Li","year":"2023","journal-title":"J Comput Res Dev"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102819"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.2000709"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-022-00449-3"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-022-10233-3"},{"issue":"2","key":"ref26","first-page":"81","article-title":"Progressive active inference method of protocol state machine","volume":"9","author":"Pan","year":"2023","journal-title":"Chin J Netw Inform Secur"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/icst46399.2020.00062"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107231"},{"key":"ref29","volume-title":"Reverse Engineering Enhanced State Models of Black Box Software Components to Support Integration Testing","author":"Shahbaz","year":"2008"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/wcre.2007.6"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.06.013"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103249"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14232\/actacyb.288213"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109797"},{"issue":"12","key":"ref35","first-page":"233","article-title":"Domain-specific algorithm of protocol state machine active inference","volume":"42","author":"Wang","year":"2015","journal-title":"Comput Sci"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1080\/17445760.2019.1655740"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21554-4_1"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/icnp.2012.6459963"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2022.3149933"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16161-2_24"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24531"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.042361"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2400487.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1631\/FITEE.2400487","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2400487.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:40:54Z","timestamp":1771656054000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1631\/FITEE.2400487"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":42,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["2131"],"URL":"https:\/\/doi.org\/10.1631\/fitee.2400487","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"6 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"All the authors declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}