{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T15:58:25Z","timestamp":1746806305743,"version":"3.40.5"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642405518"},{"type":"electronic","value":"9783642405525"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40552-5_13","type":"book-chapter","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T01:21:28Z","timestamp":1377652888000},"page":"136-147","source":"Crossref","is-referenced-by-count":15,"title":["Design and Evaluation of HTTP Protocol Parsers for IPFIX Measurement"],"prefix":"10.1007","author":[{"given":"Petr","family":"Velan","sequence":"first","affiliation":[]},{"given":"Tom\u00e1\u0161","family":"Jirs\u00edk","sequence":"additional","affiliation":[]},{"given":"Pavel","family":"\u010celeda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"PCRE - Perl Compatible Regular Expressions (November 2012), \n                    \n                      http:\/\/www.pcre.org\/"},{"key":"13_CR2","unstructured":"The GNU C Library (glibc) (December 2012), \n                    \n                      http:\/\/www.gnu.org\/software\/libc\/"},{"key":"13_CR3","unstructured":"Bittel, J.: httpry - HTTP logging and information retrieval tool (April 2013), \n                    \n                      http:\/\/github.com\/jbittel\/httpry"},{"key":"13_CR4","unstructured":"Cisco Systems, Inc.: Application Visibility and Control (April 2013), \n                    \n                      http:\/\/www.cisco.com\/go\/avc"},{"key":"13_CR5","unstructured":"Deri, L.: nProbe: an Open Source NetFlow probe for Gigabit Networks. In: In Proc. of Terena TNC 2003 (2003)"},{"key":"13_CR6","unstructured":"Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee, T.: Hypertext Transfer Protocol \u2013 HTTP\/1.1. RFC 2616 (Draft Standard) (June 1999), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc2616.txt\n                    \n                    \n                  , updated by RFCs 2817, 5785, 6266, 6585"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-642-28534-9_2","volume-title":"Traffic Monitoring and Analysis","author":"V. Gehlen","year":"2012","unstructured":"Gehlen, V., Finamore, A., Mellia, M., Munaf\u00f2, M.M.: Uncovering the big players of the web. In: Pescap\u00e8, A., Salgarelli, L., Dimitropoulos, X. (eds.) TMA 2012. LNCS, vol.\u00a07189, pp. 15\u201328. Springer, Heidelberg (2012), \n                    \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-28534-9_2"},{"key":"13_CR8","first-page":"1","volume-title":"Proceedings of the 24th International Conference on Large Installation System Administration, LISA 2010","author":"C.M. Inacio","year":"2010","unstructured":"Inacio, C.M., Trammell, B.: YAF: Yet Another Flowmeter. In: Proceedings of the 24th International Conference on Large Installation System Administration, LISA 2010, pp. 1\u201316. USENIX Association, Berkeley (2010), \n                    \n                      http:\/\/dl.acm.org\/citation.cfm?id=1924976.1924987"},{"key":"13_CR9","unstructured":"INVEA-TECH: FlowMon Exporter \u2013 Community Program (April 2013), \n                    \n                      http:\/\/www.invea-tech.com"},{"key":"13_CR10","unstructured":"Lesk, M.E., Schmidt, E.: Lex \u2013 a Lexical Analyzer Generator. Tech. rep., Bell Laboratories. Computing Science Technical Report No. 39 (1975)"},{"key":"13_CR11","unstructured":"Levine, J., John, L.: Flex & Bison, 1st edn. O\u2019Reilly Media, Inc. (2009)"},{"issue":"11","key":"13_CR12","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1016\/j.peva.2011.07.016","volume":"68","author":"A. Mahanti","year":"2011","unstructured":"Mahanti, A., Williamson, C., Carlsson, N., Arlitt, M., Mahanti, A.: Characterizing the file hosting ecosystem: A view from the edge. Perform. Eval.\u00a068(11), 1085\u20131102 (2011), \n                    \n                      http:\/\/dx.doi.org\/10.1016\/j.peva.2011.07.016","journal-title":"Perform. Eval."},{"issue":"1","key":"13_CR13","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TEC.1960.5221603","volume":"EC-9","author":"R. McNaughton","year":"1960","unstructured":"McNaughton, R., Yamada, H.: Regular Expressions and State Graphs for Automata. IRE Transactions on Electronic Computers,\u00a0EC-9(1), 39\u201347 (1960)","journal-title":"IRE Transactions on Electronic Computers,"},{"key":"13_CR14","unstructured":"Open Information Security Foundation: Suricata \u2013 network IDS, IPS and network security monitoring engine (April 2013), \n                    \n                      http:\/\/www.suricata-ids.org"},{"key":"13_CR15","first-page":"289","volume-title":"Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC 2006","author":"R. Pang","year":"2006","unstructured":"Pang, R., Paxson, V., Sommer, R., Peterson, L.: Binpac: A yacc for Writing Application Protocol Parsers. In: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC 2006, pp. 289\u2013300. ACM, New York (2006), \n                    \n                      http:\/\/doi.acm.org\/10.1145\/1177080.1177119"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Paxson, V.: Bro: A system for detecting network intruders in real-time. Comput. Netw. 31(23-24), 2435\u20132463 (1999), http:\/\/dx.doi.org\/10.1016\/S1389-1286(99)00112-7","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"13_CR17","unstructured":"Qualys, Inc.: LibHTP \u2013 security-aware parser for the HTTP protocol (April 2013), \n                    \n                      http:\/\/github.com\/ironbee\/libhtp"},{"key":"13_CR18","first-page":"229","volume-title":"Proceedings of the 13th USENIX Conference on System Administration, LISA 1999","author":"M. Roesch","year":"1999","unstructured":"Roesch, M.: Snort - Lightweight Intrusion Detection for Networks. In: Proceedings of the 13th USENIX Conference on System Administration, LISA 1999, pp. 229\u2013238. USENIX Association, Berkeley (1999), \n                    \n                      http:\/\/dl.acm.org\/citation.cfm?id=1039834.1039864"},{"key":"13_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-79232-1_4","volume-title":"Passive and Active Network Measurement","author":"F. Schneider","year":"2008","unstructured":"Schneider, F., Agarwal, S., Alpcan, T., Feldmann, A.: The new web: Characterizing AJAX traffic. In: Claypool, M., Uhlig, S. (eds.) PAM 2008. LNCS, vol.\u00a04979, pp. 31\u201340. Springer, Heidelberg (2008), \n                    \n                      http:\/\/dl.acm.org\/citation.cfm?id=1791949.1791955"},{"key":"13_CR20","unstructured":"\u0160\u00edma T., Velan P., \u010celeda P.: FlowMon - Plugins for HTTP Monitoring (April 2013), \n                    \n                      http:\/\/dior.ics.muni.cz\/~velan\/flowmon-input-http\/"},{"key":"13_CR21","unstructured":"Torres, L., Magana, E., Izal, M., Morato, D.: Identifying sessions to websites as an aggregation of related flows. In: 2012 XVth International Telecommunications Network Strategy and Planning Symposium (NETWORKS), pp. 1\u20136 (2012)"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Torres, L.M., Magana, E., Izal, M., Morato, D.: Strategies for automatic labelling of web traffic traces. In: 37th Annual IEEE Conference on Local Computer Networks, pp. 196\u2013199 (2012)","DOI":"10.1109\/LCN.2012.6423605"}],"container-title":["Lecture Notes in Computer Science","Advances in Communication Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40552-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T19:24:56Z","timestamp":1558034696000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40552-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642405518","9783642405525"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40552-5_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}