Iot security attacks using reverse engineering methods on wsn applications, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), pp.182-187, 2016. ,
DOI : 10.1109/wf-iot.2016.7845429
Opening pandora's box: Effective techniques for reverse engineering iot devices, pp.1-21, 2018. ,
DOI : 10.1007/978-3-319-75208-2_1
Learning regular sets from queries and counterexamples, Information and Computation, vol.75, issue.2, pp.87-106, 1987. ,
DOI : 10.1016/0890-5401(87)90052-6
URL : https://doi.org/10.1016/0890-5401(87)90052-6
On the synthesis of finite-state machines from samples of their behavior, IEEE Transactions on, issue.6, pp.592-597, 1972. ,
Dynamically discovering likely program invariants to support program evolution, Proceedings of the 21st International Conference on Software Engineering, ser. ICSE '99, pp.213-224, 1999. ,
DOI : 10.1145/302405.302467
Incremental learning-based testing for reactive systems, Tests and Proofs, ser. Lecture Notes in Computer, vol.6706, pp.134-151, 2011. ,
DOI : 10.1007/978-3-642-21768-5_11
URL : http://www.csc.kth.se/tcs/publications/2011/tap2011.pdf
Automatic generation of software behavioral models, Proceedings of the 30th International Conference on Software Engineering, ser. ICSE'08, pp.501-510, 2008. ,
DOI : 10.1145/1368088.1368157
Behavioral resource-aware model inference, Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering, ser. ASE '14, pp.19-30, 2014. ,
DOI : 10.1145/2642937.2642988
URL : http://people.cs.umass.edu/~brun/pubs/pubs/Ohmann14ase.pdf
Timed k-tail: Automatic inference of timed automata, 2017 IEEE International Conference on Software Testing, Verification and Validation, pp.401-411, 2017. ,
, Behavioral Modeling for Embedded Systems and Technologies: Applications for Design and Implementation, 2009.
Designing software components for real-time applications, Proceedings of Embedded System Conference, 2000. ,
Compositional testing with ioco, Formal Approaches to Software Testing, pp.86-100, 2004. ,