1. The complexity of probabilistic versus deterministic finite automata;Ambainis,1996
2. Learning regular sets from queries and counterexamples;Angluin;Inf. Comput.,1987
3. Reverse engineering of protocols from network traces;Antunes,2011
4. Scapy: Explore the Net with New Eyes, Technical Report, Technical Report;Biondi,2005
5. Security evaluation of communication protocols in common criteria;Bossert,2012