{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:21:59Z","timestamp":1743124919183,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319271606"},{"type":"electronic","value":"9783319271613"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27161-3_73","type":"book-chapter","created":{"date-parts":[[2015,11,17]],"date-time":"2015-11-17T23:38:40Z","timestamp":1447803520000},"page":"800-809","source":"Crossref","is-referenced-by-count":2,"title":["Unknown Bit Stream Protocol Message Discovery with Zero Knowledge"],"prefix":"10.1007","author":[{"given":"Fengli","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Junjiao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hongchuan","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,29]]},"reference":[{"unstructured":"I. netflow statistics. \n                      http:\/\/netflow.internet2.edu","key":"73_CR1"},{"doi-asserted-by":"crossref","unstructured":"Caballero, J., et al.: Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. In: ACM CCS (2009)","key":"73_CR2","DOI":"10.1145\/1653662.1653737"},{"issue":"5","key":"73_CR3","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/505672.505678","volume":"30","author":"JVD Merwe","year":"2005","unstructured":"Merwe, J.V.D., Caceres, R., Chu, Y.H., et al.: mmdump: a tool for monitoring internet multimedia traffic. ACM SIGCOMM Comput. Commun. Rev. 30(5), 48\u201359 (2005)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"doi-asserted-by":"crossref","unstructured":"Long, W., Xin, Y., Yang Y.: An application-level signatures extracting algorithm based on offset constraint. In: International Symposium on Intelligent Information Technology Application Workshops: IITAW 2008. IEEE (2008)","key":"73_CR4","DOI":"10.1109\/IITA.Workshops.2008.152"},{"key":"73_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-53917-6_40","volume-title":"Advanced Data Mining and Applications","author":"Y Wang","year":"2013","unstructured":"Wang, Y., Zhang, N., Wu, Y., Su, B.: Protocol specification inference based on keywords identification. In: Motoda, H., Wu, Z., Cao, L., Zaiane, O., Yao, M., Wang, W. (eds.) ADMA 2013, Part II. LNCS, vol. 8347, pp. 443\u2013454. Springer, Heidelberg (2013)"},{"issue":"3","key":"73_CR6","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1016\/j.comnet.2012.10.002","volume":"57","author":"A Jamdagni","year":"2013","unstructured":"Jamdagni, A., Tan, Z., He, X., Nanda, P., Liu, R.P.: RePIDS: a multitier real-time payload-based intrusion detection system. Comput. Netw. 57(3), 811\u2013824 (2013)","journal-title":"Comput. Netw."},{"key":"73_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-21554-4_1","volume-title":"Applied Cryptography and Network Security","author":"Y Wang","year":"2011","unstructured":"Wang, Y., Zhang, Z., Yao, D.D., Qu, B., Guo, L.: Inferring protocol state machine from network traces: a probabilistic approach. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 1\u201318. Springer, Heidelberg (2011)"},{"issue":"10","key":"73_CR8","doi-asserted-by":"publisher","first-page":"1894","DOI":"10.1109\/JSAC.2014.2358857","volume":"32","author":"Z Zhang","year":"2014","unstructured":"Zhang, Z., Zhang, Z., Lee, P.P.C., et al.: Toward unsupervised protocol feature word extraction. IEEE J. Sel. Areas Commun. 32(10), 1894\u20131906 (2014)","journal-title":"IEEE J. Sel. Areas Commun."},{"unstructured":"Cai, X., Zhang, R., Wang, B.: Machine learning and keyword-matching integrated protocol identification. In: 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT 2010). IEEE (2010)","key":"73_CR9"},{"unstructured":"IANA. \n                      www.iana.org\/assignments\/portnumbers","key":"73_CR10"},{"unstructured":"Cui, W., Kannan, J., Wang, H.J.: Discoverer: automatic protocol reverse engineering from network traces. In: SS 2007: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (2007)","key":"73_CR11"},{"unstructured":"Macqueen, J., et al.: Some methods for classification and analysis of multivariate observations. In: Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability (1967)","key":"73_CR12"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27161-3_73","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T11:44:34Z","timestamp":1559303074000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27161-3_73"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271606","9783319271613"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27161-3_73","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}