{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:07:03Z","timestamp":1742911623442,"version":"3.40.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319638584"},{"type":"electronic","value":"9783319638591"}],"license":[{"start":{"date-parts":[[2017,7,18]],"date-time":"2017-07-18T00:00:00Z","timestamp":1500336000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-63859-1_39","type":"book-chapter","created":{"date-parts":[[2017,7,17]],"date-time":"2017-07-17T03:54:54Z","timestamp":1500263694000},"page":"318-326","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Preamble Mining Algorithm Oriented to Binary Protocol Using Random Probes"],"prefix":"10.1007","author":[{"given":"Tingyue","family":"Yu","sequence":"first","affiliation":[]},{"given":"Shen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiangzhan","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,18]]},"reference":[{"issue":"3","key":"39_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2840724","volume":"48","author":"J Narayan","year":"2015","unstructured":"Narayan, J., Shukla, S.K.: A survey of automatic protocol reverse engineering tools. ACM Comput. Surv. 48(3), 1\u201326 (2015)","journal-title":"ACM Comput. Surv."},{"key":"39_CR2","unstructured":"Marshall, A.: Beddoe: Network Protocol Analysis using Bioinformatics Algorithms (2004)"},{"key":"39_CR3","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1016\/j.jnca.2013.01.013","volume":"36","author":"J-Z Luo","year":"2013","unstructured":"Luo, J.-Z., Shun-Zheng, Yu.: Position-based automatic reverse engineering of network protocols. J. Netw. Comput. Appl. 36, 1070\u20131077 (2013)","journal-title":"J. Netw. Comput. Appl."},{"issue":"10","key":"39_CR4","doi-asserted-by":"publisher","first-page":"1894","DOI":"10.1109\/JSAC.2014.2358857","volume":"32","author":"Z Zhang","year":"2014","unstructured":"Zhang, Z., Zhang, Z.: Toward unsupervised protocol feature word extraction. IEEE J. Sel. Areas Commun. 32(10), 1894\u20131906 (2014)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"6","key":"39_CR5","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1145\/360825.360855","volume":"18","author":"AV Aho","year":"1975","unstructured":"Aho, A.V., Corasick, M.J.: Efficient string matching: an aid to bibliographic search. Commun. ACM 18(6), 333\u2013340 (1975)","journal-title":"Commun. ACM"},{"key":"39_CR6","unstructured":"Ling, J.: Study on bit stream oriented unknown frame head. A Dissertation Submitted to Shanghai Jiao Tong University for the Master Degree of Engineering, January 2011"},{"issue":"7","key":"39_CR7","first-page":"554","volume":"43","author":"W Hezhou","year":"2013","unstructured":"Hezhou, W., Kaiping, X.: An unknown link Protocol bit stream segmentation Algorithm based on frequent statistics and association rules. J. Univ. Sci. Technol. China 43(7), 554\u2013560 (2013)","journal-title":"J. Univ. Sci. Technol. China"},{"key":"39_CR8","unstructured":"Aixia, W.: The technology research of feature selection for unknown protocol in the form of bit stream. A Master Thesis Submitted to University of Electronic Science and Technology of China, May 2015"},{"issue":"2","key":"39_CR9","first-page":"440","volume":"37","author":"L Dong","year":"2017","unstructured":"Dong, L., Tao, W.: Unknown protocol frame segmentation algorithm based on preamble. J. Comput. Appl. 37(2), 440\u2013444 (2017)","journal-title":"J. Comput. Appl."}],"container-title":["Smart Innovation, Systems and Technologies","Advances in Intelligent Information Hiding and Multimedia Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-63859-1_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T07:59:29Z","timestamp":1557993569000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-63859-1_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,18]]},"ISBN":["9783319638584","9783319638591"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-63859-1_39","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2017,7,18]]},"assertion":[{"value":"18 July 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IIH-MSP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Information Hiding and Multimedia Signal Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Matsue","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 August 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iih2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/bit.kuas.edu.tw\/~iihmsp17\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}