{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T14:04:57Z","timestamp":1770818697385,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2021,4,8]],"date-time":"2021-04-08T00:00:00Z","timestamp":1617840000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,8]],"date-time":"2021-04-08T00:00:00Z","timestamp":1617840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Sign Process Syst"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11265-021-01657-z","type":"journal-article","created":{"date-parts":[[2021,4,8]],"date-time":"2021-04-08T17:02:53Z","timestamp":1617901373000},"page":"769-777","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A Data-driven Approach for Reverse Engineering Electric Power Protocols"],"prefix":"10.1007","volume":"93","author":[{"given":"Ouyang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Bin","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Feipeng","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Zhonghe","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Xiaowei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,8]]},"reference":[{"key":"1657_CR1","doi-asserted-by":"publisher","unstructured":"Antunes, J., Neves, N., & Verissimo, P. (2011). Reverse engineering of protocols from network traces. In 2011 18th Working Conference on Reverse Engineering, Limerick. https:\/\/doi.org\/10.1109\/WCRE.2011.28 (pp. 169\u2013178).","DOI":"10.1109\/WCRE.2011.28"},{"key":"1657_CR2","unstructured":"Beddoe, M.A. (2004). Network protocol analysis using bioinformatics algorithms."},{"key":"1657_CR3","doi-asserted-by":"publisher","unstructured":"Bermudez, I., Tongaonkar, A., Iliofotou, M., Mellia, M., & Munaf\u00f2, M.M. (2015). Automatic protocol field inference for deeper protocol understanding. In 2015 IFIP Networking Conference (IFIP Networking), Toulouse. https:\/\/doi.org\/10.1109\/IFIPNetworking.2015.7145307 (pp. 1\u20139).","DOI":"10.1109\/IFIPNetworking.2015.7145307"},{"issue":"Jan","key":"1657_CR4","first-page":"993","volume":"3","author":"MB David","year":"2003","unstructured":"David, M.B., Andrew, Y.N., & Michael, I.J. (2003). Latent Dirichlet allocation. Journal of Machine Learning Research, 3(Jan), 993\u20131022.","journal-title":"Journal of Machine Learning Research"},{"key":"1657_CR5","doi-asserted-by":"crossref","unstructured":"Caballero, J., Yin, H., Liang, Z.K., & Song, D. (2007). Polyglot: automatic extraction of protocol message format using dynamic binary analysis. In Proceedings of the 14th ACM conference on Computer and communications security (CCS \u201907). Association for Computing Machinery, New York, NY, USA (pp. 317\u2013329).","DOI":"10.1145\/1315245.1315286"},{"issue":"6","key":"1657_CR6","doi-asserted-by":"publisher","first-page":"607","DOI":"10.3233\/IDA-2007-11603","volume":"11","author":"P Cohen","year":"2007","unstructured":"Cohen, P., Adams, N., & Heeringa, B. (2007). Voting Experts: An unsupervised algorithm for segmenting sequences. Intelligent Data Analysis, 11(6), 607\u2013625.","journal-title":"Intelligent Data Analysis"},{"key":"1657_CR7","unstructured":"Cui, W. D., Kannan, J., & Wang, H. J. (2007). Discoverer: Automatic protocol reverse engineering from network traces. In USENIX Security Symposium. 2007 (pp. 1\u201314)."},{"key":"1657_CR8","doi-asserted-by":"crossref","unstructured":"Cui, W.D., Peinado, M., Chen, K., Wang, H.J., & Irun-Briz, L. (2008). Tupni: Automatic reverse engineering of input formats. In Proceedings of the 15th ACM conference on Computer and communications security (pp. 391\u2013402): ACM.","DOI":"10.1145\/1455770.1455820"},{"key":"1657_CR9","doi-asserted-by":"crossref","unstructured":"Gascon, H., Wressnegger, C., Yamaguchi, F., Arp, D., & Rieck, K. (2015). Pulsar: Stateful Black-Box fuzzing of proprietary network protocols. In Thuraisingham, B., Wang, X., & Yegneswaran, V. (Eds.) Security and Privacy in Communication Networks. SecureComm 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 164. Cham: Springer.","DOI":"10.1007\/978-3-319-28865-9_18"},{"key":"1657_CR10","unstructured":"Kleber, S., Kopp, H., & Kargl, F. (2018). NEMESYS: Network message syntax reverse engineering by analysis of the intrinsic structure of individual messages. In 12th USENIX Workshop on Offensive Technologies (WOOT 18)."},{"key":"1657_CR11","doi-asserted-by":"crossref","unstructured":"Krueger, T., Gascon, H., Kr\u00e4mer, N., & Rieck, K. (2012). Learning stateful models for network honeypots. In Proceedings of the 5th ACM workshop on Security and artificial intelligence (AISec \u201912). Association for Computing Machinery, New York, NY, USA (pp. 37\u201348).","DOI":"10.1145\/2381896.2381904"},{"key":"1657_CR12","doi-asserted-by":"crossref","unstructured":"Krueger, T., Kr\u00e4mer, N., & Rieck, K. (2011). ASAP: Automatic Semantics-Aware analysis of network payloads. In Dimitrakakis, C., Gkoulalas-Divanis, A., Mitrokotsa, A., Verykios, V.S., & Saygin, Y (Eds.) Privacy and security issues in data mining and machine learning. PSDML 2010. Lecture notes in computer science, Vol. 6549. Berlin: Springer.","DOI":"10.1007\/978-3-642-19896-0_5"},{"key":"1657_CR13","unstructured":"Lin, Z.Q., Jiang, X.X., Xu, D.Y., & Zhang, X.Y. (2008). Automatic protocol format reverse engineering through context-aware monitored execution. In NDSS, (Vol. 8 pp. 1\u201315)."},{"key":"1657_CR14","doi-asserted-by":"publisher","unstructured":"Wang, Y., Yun, X., Shafiq, M.Z., Wang, L., & Li, G. (2012). A semantics aware approach to automated reverse engineering unknown protocols. In 2012 20th IEEE International Conference on Network Protocols (ICNP), Austin, TX. https:\/\/doi.org\/10.1109\/ICNP.2012.6459963 (pp. 1\u201310).","DOI":"10.1109\/ICNP.2012.6459963"},{"key":"1657_CR15","doi-asserted-by":"crossref","unstructured":"Wang, Y., Zhang, Z., Yao, D., Qu, B., & Guo, L. (2011). Inferring protocol state machine from network traces: A probabilistic approach. In Lopez, J., & Tsudik, G. (Eds.) Applied Cryptography and Network Security. ACNS 2011. Lecture Notes in Computer Science, Vol. 6715. Berlin: Springer.","DOI":"10.1007\/978-3-642-21554-4_1"},{"key":"1657_CR16","doi-asserted-by":"crossref","unstructured":"Wang, Z., Jiang, X., Cui, W., Wang, X., & Grace, M. (2009). ReFormat: Automatic reverse engineering of encrypted messages. In Backes, M., & Ning, P. (Eds.) Computer Security \u2013 ESORICS 2009. ESORICS 2009. Lecture Notes in Computer Science, Vol. 5789. Berlin: Springer.","DOI":"10.1007\/978-3-642-04444-1_13"},{"issue":"10","key":"1657_CR17","doi-asserted-by":"publisher","first-page":"1894","DOI":"10.1109\/JSAC.2014.2358857","volume":"32","author":"Z Zhang","year":"2014","unstructured":"Zhang, Z., Zhang, Z., Lee, P.P.C., Liu, Y., & Xie, G. (2014). Toward unsupervised protocol feature word extraction . IEEE Journal on Selected Areas in Communications, 32(10), 1894\u20131906.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"3","key":"1657_CR18","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/MCOM.2018.1700274","volume":"56","author":"M Chen","year":"2018","unstructured":"Chen, M., Zhang, Y., Qiu, M., & Guizani, N. (2018). Hao y.,2018 SPHA: smart personal health advisor based on deep analytics. Communications Magazine, 56(3), 164\u2013169.","journal-title":"Communications Magazine"},{"issue":"12","key":"1657_CR19","doi-asserted-by":"publisher","first-page":"3344","DOI":"10.1109\/TITS.2016.2543263","volume":"17","author":"Z Ming","year":"2016","unstructured":"Ming, Z., Liu, X.Y., Tang, F., Qiu, M., Shen, R., Shu, W., & Wu, M.Y. (2016). Public vehicles for future urban transportation. IEEE Transactions on Intelligent Transportation Systems, 17 (12), 3344\u20133353.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"11","key":"1657_CR20","doi-asserted-by":"publisher","first-page":"382132","DOI":"10.1155\/2013\/382132","volume":"9","author":"Q Zhang","year":"2013","unstructured":"Zhang, Q., Huang, T., Zhu, Y., & Qiu, M. (2013). A case study of sensor data collection and analysis in smart city: provenance in smart food supply chain. International Journal of Distributed Sensor Networks, 9(11), 382132.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"2","key":"1657_CR21","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/TSUSC.2017.2723954","volume":"3","author":"K Gai","year":"2018","unstructured":"Gai, K., Qiu, M., Zhao, H., & Sun, X. (2018). Resource management in sustainable cyber-physical systems using heterogeneous cloud computing. IEEE Transactions on Sustainable Computing, 3(2), 60\u201372. 1.","journal-title":"IEEE Transactions on Sustainable Computing"},{"key":"1657_CR22","unstructured":"Qiu, M., Zhang, K., & Huang, M. (2004). An empirical study of web interface design on small display devices . In IEEE\/WIC\/ACM International Conference on Web Intelligence (WI\u201904), Beijing, China (pp. 29\u201335)."}],"container-title":["Journal of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-021-01657-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11265-021-01657-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-021-01657-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,14]],"date-time":"2021-06-14T17:09:46Z","timestamp":1623690586000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11265-021-01657-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,8]]},"references-count":22,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["1657"],"URL":"https:\/\/doi.org\/10.1007\/s11265-021-01657-z","relation":{},"ISSN":["1939-8018","1939-8115"],"issn-type":[{"value":"1939-8018","type":"print"},{"value":"1939-8115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,8]]},"assertion":[{"value":"23 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 March 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}