{"id":"https://openalex.org/W2968879062","doi":"https://doi.org/10.5220/0007929900370047","title":"Using Network Traces to Generate Models for Automatic Network Application Protocols Diagnostics","display_name":"Using Network Traces to Generate Models for Automatic Network Application Protocols Diagnostics","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2968879062","doi":"https://doi.org/10.5220/0007929900370047","mag":"2968879062"},"language":"en","primary_location":{"id":"doi:10.5220/0007929900370047","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007929900370047","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Joint Conference on e-Business and Telecommunications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0007929900370047","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076270697","display_name":"Martin Holkovi\u010d","orcid":null},"institutions":[{"id":"https://openalex.org/I54634078","display_name":"Czech Education and Scientific Network","ror":"https://ror.org/050dkka69","country_code":"CZ","type":"other","lineage":["https://openalex.org/I54634078"]}],"countries":["CZ"],"is_corresponding":true,"raw_author_name":"Martin Holkovi\u010d","raw_affiliation_strings":["CESNET a.l.e., Zikova 1903/4, 160 00 Prague and Czech Republic, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"CESNET a.l.e., Zikova 1903/4, 160 00 Prague and Czech Republic, --- Select a Country ---","institution_ids":["https://openalex.org/I54634078"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001527809","display_name":"Ond\u0159ej Ry\u0161av\u00fd","orcid":"https://orcid.org/0000-0001-9652-6418"},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Ond\u0159ej Ry\u0161av\u00fd","raw_affiliation_strings":["Faculty of Information Technology, Brno University of Technology, Bozetechova 1/2, 612 66 Brno and Czech Republic, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Brno University of Technology, Bozetechova 1/2, 612 66 Brno and Czech Republic, --- Select a Country ---","institution_ids":["https://openalex.org/I60587646"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085271907","display_name":"Libor Pol\u010d\u00e1k","orcid":"https://orcid.org/0000-0001-9177-3073"},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Libor Pol\u010d\u00e1k","raw_affiliation_strings":["Faculty of Information Technology, Brno University of Technology, Bozetechova 1/2, 612 66 Brno and Czech Republic, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Brno University of Technology, Bozetechova 1/2, 612 66 Brno and Czech Republic, --- Select a Country ---","institution_ids":["https://openalex.org/I60587646"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5076270697"],"corresponding_institution_ids":["https://openalex.org/I54634078"],"apc_list":null,"apc_paid":null,"fwci":0.3537,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.62913763,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"37","last_page":"47"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.824902355670929},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6675500869750977},{"id":"https://openalex.org/keywords/automaton","display_name":"Automaton","score":0.6454986333847046},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6383010745048523},{"id":"https://openalex.org/keywords/communications-protocol","display_name":"Communications protocol","score":0.62282794713974},{"id":"https://openalex.org/keywords/network-monitoring","display_name":"Network monitoring","score":0.5027382373809814},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.49366864562034607},{"id":"https://openalex.org/keywords/network-administrator","display_name":"Network administrator","score":0.4891844093799591},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.46468544006347656},{"id":"https://openalex.org/keywords/finite-state-machine","display_name":"Finite-state machine","score":0.4369432330131531},{"id":"https://openalex.org/keywords/network-simulation","display_name":"Network simulation","score":0.4297247529029846},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3297581672668457},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3209778070449829},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.29942336678504944},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.23186415433883667},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.21623647212982178}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.824902355670929},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6675500869750977},{"id":"https://openalex.org/C112505250","wikidata":"https://www.wikidata.org/wiki/Q787116","display_name":"Automaton","level":2,"score":0.6454986333847046},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6383010745048523},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.62282794713974},{"id":"https://openalex.org/C81877898","wikidata":"https://www.wikidata.org/wiki/Q1965787","display_name":"Network monitoring","level":2,"score":0.5027382373809814},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.49366864562034607},{"id":"https://openalex.org/C2779173999","wikidata":"https://www.wikidata.org/wiki/Q680296","display_name":"Network administrator","level":2,"score":0.4891844093799591},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.46468544006347656},{"id":"https://openalex.org/C167822520","wikidata":"https://www.wikidata.org/wiki/Q176452","display_name":"Finite-state machine","level":2,"score":0.4369432330131531},{"id":"https://openalex.org/C139940560","wikidata":"https://www.wikidata.org/wiki/Q290036","display_name":"Network simulation","level":2,"score":0.4297247529029846},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3297581672668457},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3209778070449829},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.29942336678504944},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.23186415433883667},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.21623647212982178},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0007929900370047","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007929900370047","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Joint Conference on e-Business and Telecommunications","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0007929900370047","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007929900370047","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Joint Conference on e-Business and Telecommunications","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2360330114","https://openalex.org/W3139002588","https://openalex.org/W3112536095","https://openalex.org/W2553802035","https://openalex.org/W4309460389","https://openalex.org/W2377235011","https://openalex.org/W2770733137","https://openalex.org/W2359696011","https://openalex.org/W4388491859","https://openalex.org/W4388190366"],"abstract_inverted_index":{"Network":[0],"diagnostics":[1],"is":[2,80],"a":[3,68,98],"time-consuming":[4],"activity":[5],"that":[6],"requires":[7],"an":[8,42],"administrator":[9],"with":[10],"good":[11],"knowledge":[12],"of":[13,49,77,105],"network\r\nprinciples":[14],"and":[15,52,86,91],"technologies.":[16],"Even":[17],"if":[18],"some":[19],"network":[20,50],"errors":[21,35],"have":[22,95],"been":[23],"resolved":[24],"in":[25],"the":[26,28,46,62,84,102],"past,":[27],"administrator\r\nmust":[29],"spend":[30],"considerable":[31],"time":[32],"removing":[33],"these":[34],"when":[36],"they":[37],"reoccur.":[38],"This":[39],"article":[40],"presents":[41,67],"automated\r\ntool":[43],"to":[44,60],"learn":[45],"expected":[47],"behavior":[48],"protocols":[51],"possible":[53],"variations.":[54],"The":[55,65],"created":[56,97],"model":[57,66],"can":[58],"be\r\nused":[59],"automate":[61],"diagnostic":[63],"process.":[64],"finite":[69],"automaton":[70],"containing":[71],"protocol":[72],"behavior\r\nfor":[73],"different":[74],"situations.":[75],"Diagnostics":[76],"unknown":[78],"communication":[79],"performed":[81],"by":[82],"checking":[83],"created\r\nmodel":[85],"searching":[87],"for":[88],"error":[89],"states":[90],"their":[92],"descriptions.":[93],"We":[94],"also":[96],"proof-of-concept":[99],"tool":[100],"that\r\ndemonstrates":[101],"practical":[103],"potential":[104],"this":[106],"approach.":[107]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
