{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T05:59:55Z","timestamp":1721195995010},"reference-count":38,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["LP150100892"],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004676","name":"CA Technologies","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004676","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Network and Computer Applications"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1016\/j.jnca.2021.103247","type":"journal-article","created":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T06:45:03Z","timestamp":1634625903000},"page":"103247","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["R-gram: Inferring message formats of service protocols with relative positional n-grams"],"prefix":"10.1016","volume":"196","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-7307-8114","authenticated-orcid":false,"given":"Jiaojiao","family":"Jiang","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9827-5496","authenticated-orcid":false,"given":"Jean-Guy","family":"Schneider","sequence":"additional","affiliation":[]},{"given":"Steve","family":"Versteeg","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Han","sequence":"additional","affiliation":[]},{"given":"MD Arafat","family":"Hossain","sequence":"additional","affiliation":[]},{"given":"Chengfei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jnca.2021.103247_b1","series-title":"Frequent Pattern Mining","author":"Aggarwal","year":"2014"},{"key":"10.1016\/j.jnca.2021.103247_b2","unstructured":"Agrawal, R., Srikant, R., et al., 1994. Fast algorithms for mining association rules. In: Proc. 20th Int. Conf. Very Large Data Bases, VLDB. Vol. 1215, pp. 487\u2013499."},{"issue":"5","key":"10.1016\/j.jnca.2021.103247_b3","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1109\/34.494647","article-title":"Weighted parzen windows for pattern classification","volume":"18","author":"Babich","year":"1996","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.jnca.2021.103247_b4","series-title":"Automatic storage of persistent asn.1 objects in a relational schema","author":"Bapat","year":"1994"},{"issue":"Jan","key":"10.1016\/j.jnca.2021.103247_b5","first-page":"993","article-title":"Latent dirichlet allocation","volume":"3","author":"Blei","year":"2003","journal-title":"J. Mach. Learn. Res."},{"key":"10.1016\/j.jnca.2021.103247_b6","series-title":"14th ACM Conference on Computer and Communications Security","first-page":"317","article-title":"Polyglot: Automatic extraction of protocol message format using dynamic binary analysis","author":"Caballero","year":"2007"},{"key":"10.1016\/j.jnca.2021.103247_b7","series-title":"Wireshark","author":"Combs","year":"2007"},{"key":"10.1016\/j.jnca.2021.103247_b8","series-title":"Security and Privacy, 2009 30th IEEE Symposium on","first-page":"110","article-title":"Prospex: Protocol specification extraction","author":"Comparetti","year":"2009"},{"key":"10.1016\/j.jnca.2021.103247_b9","unstructured":"Cui, W., Kannan, J., Wang, H.J., 2007. Discoverer: Automatic protocol reverse engineering from network traces. In: USENIX Security Symposium, pp. 1\u201314."},{"issue":"1","key":"10.1016\/j.jnca.2021.103247_b10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2693208.2693221","article-title":"Interaction traces mining for efficient system responses generation","volume":"40","author":"Du","year":"2015","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"key":"10.1016\/j.jnca.2021.103247_b11","series-title":"The websocket protocol","author":"Fette","year":"2011"},{"key":"10.1016\/j.jnca.2021.103247_b12","series-title":"Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering","first-page":"720","article-title":"Mining input grammars from dynamic taints","author":"H\u00f6schele","year":"2016"},{"key":"10.1016\/j.jnca.2021.103247_b13","series-title":"2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)","first-page":"266","article-title":"Mining accurate message formats for service APIs","author":"Hossain","year":"2018"},{"key":"10.1016\/j.jnca.2021.103247_b14","series-title":"Twitter REST API","author":"Inc.","year":"2014"},{"key":"10.1016\/j.jnca.2021.103247_b15","unstructured":"Jiang, J., Versteeg, S., Han, J., Hossain, M.A., Schneider, J.-G., A positional keyword-based approach to inferring fine-grained message formats, Future Gener. Comput. Syst."},{"key":"10.1016\/j.jnca.2021.103247_b16","doi-asserted-by":"crossref","first-page":"88504","DOI":"10.1109\/ACCESS.2019.2924928","article-title":"P-gram: Positional N-gram for the clustering of machine-generated messages","volume":"7","author":"Jiang","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.jnca.2021.103247_b17","series-title":"Communications (ICC), 2010 IEEE International Conference on","first-page":"1","article-title":"Stochastic packet inspection for TCP traffic","author":"La\u00a0Mantia","year":"2010"},{"issue":"7","key":"10.1016\/j.jnca.2021.103247_b18","first-page":"1337","article-title":"Keyword mining for private protocols tunneled over websocket","volume":"20","author":"Li","year":"2016","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.jnca.2021.103247_b19","series-title":"Reverse Engineering, 2006. WCRE\u201906. 13th Working Conference on","first-page":"167","article-title":"Extracting output formats from executables","author":"Lim","year":"2006"},{"key":"10.1016\/j.jnca.2021.103247_b20","series-title":"NDSS","first-page":"1","article-title":"Automatic protocol format reverse engineering through context-aware monitored execution.","volume":"Vol. 8","author":"Lin","year":"2008"},{"issue":"3","key":"10.1016\/j.jnca.2021.103247_b21","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1016\/j.jnca.2013.01.013","article-title":"Position-based automatic reverse engineering of network protocols","volume":"36","author":"Luo","year":"2013","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.jnca.2021.103247_b22","series-title":"Ninth International Conference on Digital Information Management. ICDIM 2014","first-page":"33","article-title":"A modelling approach for monitoring sequence activities in diverse environments","author":"M\u00e4\u00e4tt\u00e4","year":"2014"},{"key":"10.1016\/j.jnca.2021.103247_b23","series-title":"Introduction to information retrieval","first-page":"151","author":"Manning","year":"2008"},{"key":"10.1016\/j.jnca.2021.103247_b24","series-title":"Analyzing Microarray Gene Expression Data","first-page":"213","author":"McLachlan","year":"2004"},{"issue":"3","key":"10.1016\/j.jnca.2021.103247_b25","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1016\/0022-2836(70)90057-4","article-title":"A general method applicable to the search for similarities in the amino acid sequence of two proteins","volume":"48","author":"Needleman","year":"1970","journal-title":"J. Molecular Biol."},{"key":"10.1016\/j.jnca.2021.103247_b26","series-title":"Software Engineering Conference (ASWEC), 2015 24th Australasian","first-page":"48","article-title":"Generalized suffix tree based multiple sequence alignment for service virtualization","author":"Schneider","year":"2015"},{"key":"10.1016\/j.jnca.2021.103247_b27","unstructured":"Tishby, N., 1999. The information bottleneck method. In: 37th Annual Allerton Conference on Communications, Control and Computing, pp. 368\u2013377."},{"key":"10.1016\/j.jnca.2021.103247_b28","series-title":"IFIP Networking Conference, 2013","first-page":"1","article-title":"Santaclass: A self adaptive network traffic classification system","author":"Tongaonkar","year":"2013"},{"key":"10.1016\/j.jnca.2021.103247_b29","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.comcom.2014.03.026","article-title":"Towards self adaptive network traffic classification","volume":"56","author":"Tongaonkar","year":"2015","journal-title":"Comput. Commun."},{"key":"10.1016\/j.jnca.2021.103247_b30","series-title":"Proceedings of the 38th International Conference on Software Engineering Companion","first-page":"202","article-title":"Opaque service virtualisation: a practical tool for emulating endpoint systems","author":"Versteeg","year":"2016"},{"key":"10.1016\/j.jnca.2021.103247_b31","series-title":"12th Int. Conf. Para. and Dist. Comp., Appl. and Tech.","first-page":"179","article-title":"Biprominer: Automatic mining of binary protocol features","author":"Wang","year":"2011"},{"key":"10.1016\/j.jnca.2021.103247_b32","doi-asserted-by":"crossref","unstructured":"Wang, Y., Yun, X., Shafiq, M.Z., Wang, L., Liu, A.X., Zhang, Z., Yao, D., Zhang, Y., Guo, L., 2012. A semantics aware approach to automated reverse engineering unknown protocols. In: 20th IEEE International Conference on, Network Protocols, pp. 1\u201310.","DOI":"10.1109\/ICNP.2012.6459963"},{"key":"10.1016\/j.jnca.2021.103247_b33","series-title":"Advanced Data Mining and Applications. ADMA 2013. LNCS","first-page":"443","article-title":"Protocol specification inference based on keywords identification","volume":"Vol. 8347","author":"Wang","year":"2013"},{"key":"10.1016\/j.jnca.2021.103247_b34","series-title":"International Conference on Applied Cryptography and Network Security","first-page":"1","article-title":"Inferring protocol state machine from network traces: a probabilistic approach","author":"Wang","year":"2011"},{"issue":"10","key":"10.1016\/j.jnca.2021.103247_b35","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0186188","article-title":"Protocol vulnerability detection based on network traffic analysis and binary reverse engineering","volume":"12","author":"Wen","year":"2017","journal-title":"PLoS One"},{"key":"10.1016\/j.jnca.2021.103247_b36","series-title":"Lightweight directory access protocol","author":"Yeong","year":"1995"},{"key":"10.1016\/j.jnca.2021.103247_b37","series-title":"First IEEE International Symposium on Information Technologies and Applications in Education. ISITAE\u201907","first-page":"535","article-title":"Extracting information from unknown protocols on CampusNet","author":"Yu","year":"2007"},{"issue":"1","key":"10.1016\/j.jnca.2021.103247_b38","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1109\/TNET.2014.2381230","article-title":"A semantics-aware approach to the automated network protocol identification","volume":"24","author":"Yun","year":"2016","journal-title":"IEEE\/ACM Trans. Netw."}],"container-title":["Journal of Network and Computer Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1084804521002459?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1084804521002459?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T20:06:47Z","timestamp":1679947607000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1084804521002459"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":38,"alternative-id":["S1084804521002459"],"URL":"https:\/\/doi.org\/10.1016\/j.jnca.2021.103247","relation":{},"ISSN":["1084-8045"],"issn-type":[{"value":"1084-8045","type":"print"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"R-gram: Inferring message formats of service protocols with relative positional n-grams","name":"articletitle","label":"Article Title"},{"value":"Journal of Network and Computer Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jnca.2021.103247","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103247"}}