{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:30:00Z","timestamp":1742970600751,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319165486"},{"type":"electronic","value":"9783319165493"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16549-3_6","type":"book-chapter","created":{"date-parts":[[2015,3,16]],"date-time":"2015-03-16T05:30:34Z","timestamp":1426483834000},"page":"67-78","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Fast FPGA-Based Classification of Application Protocols Optimized Using Cartesian GP"],"prefix":"10.1007","author":[{"given":"David","family":"Grochol","sequence":"first","affiliation":[]},{"given":"Lukas","family":"Sekanina","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Zadnik","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Korenek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,17]]},"reference":[{"key":"6_CR1","unstructured":"Karagiannis, T., Broido, A., Brownlee, N., Claffy, K., Faloutsos, M.: Is P2P dying or just hiding? In: Global Internet and Next Generation Networks, Dallas, Texas, Globecom 2004, December 2004"},{"issue":"4","key":"6_CR2","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1145\/1090191.1080119","volume":"35","author":"T Karagiannis","year":"2005","unstructured":"Karagiannis, T., Papagiannaki, K., Faloutsos, M.: BLINC: multilevel traffic classification in the dark. SIGCOMM Comput. Commun. Rev. 35(4), 229\u2013240 (2005)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-04492-2_3","volume-title":"Management Enabling the Future Internet for Changing Business and New Computing Services","author":"S-H Yoon","year":"2009","unstructured":"Yoon, S.-H., Park, J.-W., Park, J.-S., Oh, Y.-S., Kim, M.-S.: Internet application traffic classification using fixed IP-Port. In: Hong, C.S., Tonouchi, T., Ma, Y., Chao, C.-S. (eds.) APNOMS 2009. LNCS, vol. 5787, pp. 21\u201330. Springer, Heidelberg (2009)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Moore, A.W., Zuev, D.: Internet traffic classification using bayesian analysis techniques. In: Proceedings of the 2005 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS 2005, pp. 50\u201360. ACM (2005)","DOI":"10.1145\/1064212.1064220"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Sen, S., Spatscheck, O., Wang, D.: Accurate, scalable in-network identification of P2P traffic using application signatures. In: Proceedings of the 13th International Conference on World Wide Web, pp. 512\u2013521. ACM (2004)","DOI":"10.1145\/988672.988742"},{"key":"6_CR6","unstructured":"Tongaonkar, A., Keralapura, R., Nucci, A.: Challenges in network application identification. In: Presented as part of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, Berkeley, CA, USENIX (2012)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Bernaille, L., Teixeira, R., Salamatian, K.: Early application identification. In: Proceedings of the 2006 ACM CoNEXT Conference, pp. 6:1\u20136:12. ACM, New York (2006)","DOI":"10.1145\/1368436.1368445"},{"issue":"5","key":"6_CR8","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MM.2014.61","volume":"34","author":"N Zilberman","year":"2014","unstructured":"Zilberman, N., Audzevich, Y., Covington, G., Moore, A.: NetFPGA sume: toward 100 Gbps as research commodity. Micro, IEEE 34(5), 32\u201341 (2014)","journal-title":"Micro, IEEE"},{"key":"6_CR9","unstructured":"Friedl, S., Pus, V., Matousek, J., Spinler, M.: Designing a card for 100 Gb\/s network monitoring. Technical report, CESNET (2013)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Park, B.C., Won, Y., Kim, M.S., Hong, J.: Towards automated application signature generation for traffic identification. In: Network Operations and Management Symposium, 2008, NOMS 2008, pp. 160\u2013167. IEEE, April 2008","DOI":"10.1109\/NOMS.2008.4575130"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Kekely, L., Pus, V., Korenek, J.: Software defined monitoring of application protocols. In: Proceedings of the IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, pp. 1725\u20131733 (2014)","DOI":"10.1109\/INFOCOM.2014.6848110"},{"key":"6_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17310-3","volume-title":"Cartesian Genetic Programming","author":"JF Miller","year":"2011","unstructured":"Miller, J.F.: Cartesian Genetic Programming. Springer, Heidelberg (2011)"},{"key":"6_CR13","unstructured":"L7filter: Application layer packet classifier for linux (l7-filter) (2009)"},{"issue":"5","key":"6_CR14","doi-asserted-by":"publisher","first-page":"1024","DOI":"10.1109\/TSMCB.2006.872259","volume":"36","author":"E Stomeo","year":"2006","unstructured":"Stomeo, E., Kalganova, T., Lambert, C.: Generalized disjunction decomposition for evolvable hardware. IEEE Trans. Syst. Man Cybern. Part B 36(5), 1024\u20131043 (2006)","journal-title":"IEEE Trans. Syst. Man Cybern. Part B"},{"issue":"2","key":"6_CR15","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.asoc.2008.08.004","volume":"9","author":"AP Shanthi","year":"2009","unstructured":"Shanthi, A.P., Parthasarathi, R.: Practical and scalable evolution of digital circuits. Appl. Soft Comput. 9(2), 618\u2013624 (2009)","journal-title":"Appl. Soft Comput."}],"container-title":["Lecture Notes in Computer Science","Applications of Evolutionary Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16549-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T06:31:40Z","timestamp":1676442700000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16549-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319165486","9783319165493"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16549-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}