{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:36:26Z","timestamp":1725701786326},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642328077"},{"type":"electronic","value":"9783642328084"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32808-4_29","type":"book-chapter","created":{"date-parts":[[2012,9,4]],"date-time":"2012-09-04T19:11:33Z","timestamp":1346785893000},"page":"321-327","source":"Crossref","is-referenced-by-count":2,"title":["Finding Typical Internet User Behaviors"],"prefix":"10.1007","author":[{"given":"P\u00e9ter","family":"Megyesi","sequence":"first","affiliation":[]},{"given":"S\u00e1ndor","family":"Moln\u00e1r","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","volume-title":"Scientific Students\u2019 Associations Conference, Faculty of Electrical Engineering and Informatics","author":"P. Megyesi","year":"2011","unstructured":"Megyesi, P.: Matching Algorithm for Network Traffic Descriptive Strings. In: Scientific Students\u2019 Associations Conference, Faculty of Electrical Engineering and Informatics, Budapest University of Technology and Economics, Budapest (2011), \n                    \n                      http:\/\/tdk.aut.bme.hu\/Conf\/TDK2011\/halozattervezes\/Halozati-Forgalmat-Leiro"},{"key":"29_CR2","unstructured":"Schulz, H., Mochalski, K.: Internet Study 2008\/2009, Ipoque, Leipzig, Germany (2009)"},{"key":"29_CR3","unstructured":"Open source Deep Packet Inspection projects, \n                    \n                      https:\/\/www.dpacket.org\/group-posts\/open-source-software-general-discussion\/open-source-software-related-deep-packet-inspect"},{"key":"29_CR4","unstructured":"OpenDPI, \n                    \n                      http:\/\/www.opendpi.org\/"},{"key":"29_CR5","unstructured":"OpenDPI manual, \n                    \n                      http:\/\/opendpi.googlecode.com\/files\/OpenDPI-Manual.pdf"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Szab\u00f3, G., Tur\u00e1nyi, Z., Toka, L., Moln\u00e1r, S., Santos, A.: Automatic Protocol Signature Generation Framework for Deep Packet Inspection. In: VALUETOOLS 2011, ENS, Cachan, France (2011)","DOI":"10.4108\/icst.valuetools.2011.245606"},{"key":"29_CR7","unstructured":"Glam2 manual, \n                    \n                      http:\/\/meme.sdsc.edu\/meme\/doc\/glam2_man.html"},{"key":"29_CR8","unstructured":"Glam2Scan manual, \n                    \n                      http:\/\/meme.sdsc.edu\/meme\/doc\/glam2scan_man.html"},{"key":"29_CR9","unstructured":"Dynamic Programming, \n                    \n                      http:\/\/www.cs.berkeley.edu\/~vazirani\/algorithms\/chap6.pdf"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32808-4_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T23:16:35Z","timestamp":1557184595000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32808-4_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642328077","9783642328084"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32808-4_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}