{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:29Z","timestamp":1740099149227,"version":"3.37.3"},"publisher-location":"Cham","reference-count":7,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000622"},{"type":"electronic","value":"9783030000639"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00063-9_37","type":"book-chapter","created":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T05:39:46Z","timestamp":1535607586000},"page":"402-412","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Payload-Based Packet Classification and Its Applications in Packet Forwarding Pipeline"],"prefix":"10.1007","author":[{"given":"Mohammed Fekhreddine","family":"Seridi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,31]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Bosshart, P., et al.: P4: programming protocol-independent packet processors. SIGCOMM CCR 44(3), 87\u201395 (2014)","DOI":"10.1145\/2656877.2656890"},{"key":"37_CR2","unstructured":"P4 Consortium. www.p4.org"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Ando, S., Nakao, A.: L7 packet switch: packet switch applying regular expression to packet payload. In: 2014 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR)","DOI":"10.1109\/CQR.2014.7152449"},{"issue":"10","key":"37_CR4","first-page":"1907","volume":"32","author":"B Hull\u00e1r","year":"2014","unstructured":"Hull\u00e1r, B., Laki, S., Gy\u00f6rgy, A.: Efficient methods for early protocol identification. IEEE J. Sel. Areas Commun. 32(10), 1907\u20131918 (2014)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"37_CR5","unstructured":"Wang, Y., Yun, X., Zhang, Y., Chen, L., Zang, T.: Rethinking robust and accurate application protocol identification. Comput. Netw. 129, 64\u201378 (2017)"},{"key":"37_CR6","unstructured":"Wireshark. https:\/\/www.wireshark.org\/"},{"key":"37_CR7","doi-asserted-by":"publisher","unstructured":"Sija, B.D., Goo, Y.-H., Shim, K.-S., Hasanova, H., Kim, M.-S.: A survey of automatic protocol reverse engineering approaches, methods, and tools on the inputs and outputs view. Secur. Commun. Netw. 2018, 17 pages (2018). Article ID 8370341. https:\/\/doi.org\/10.1155\/2018\/8370341","DOI":"10.1155\/2018\/8370341"}],"container-title":["Communications in Computer and Information Science","New Trends in Databases and Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00063-9_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T02:59:25Z","timestamp":1571799565000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00063-9_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000622","9783030000639"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00063-9_37","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}