{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T15:17:28Z","timestamp":1777043848559,"version":"3.51.4"},"reference-count":21,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Vellore Institute of Technology, India"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3618281","type":"journal-article","created":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T17:37:47Z","timestamp":1759772267000},"page":"176010-176023","source":"Crossref","is-referenced-by-count":1,"title":["An Integrated UTM Solution for Modern Cybersecurity: Combining Deep Inspection, ML, and Policy Automation"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-1723-2385","authenticated-orcid":false,"given":"Shreyash","family":"Hatkar","sequence":"first","affiliation":[{"name":"1School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8637-0147","authenticated-orcid":false,"given":"Kreet","family":"Rout","sequence":"additional","affiliation":[{"name":"1School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0707-126X","authenticated-orcid":false,"given":"Aayush","family":"Lad","sequence":"additional","affiliation":[{"name":"1School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1238-7671","authenticated-orcid":false,"given":"O. V. Gnana","family":"Swathika","sequence":"additional","affiliation":[{"name":"2Centre for Smart Grid Technologies, Vellore Institute of Technology, Chennai, Tamil Nadu, India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3386723.3387847"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.02.005"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICAI50593.2020.9311369"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0146-3_13"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2023.100520"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-018-0080-0"},{"issue":"6","key":"ref7","first-page":"290","article-title":"Survey on integrated threat man-agement (ITM)","volume":"2","author":"Nimbalkar","year":"2013","journal-title":"Int. J. Eng. Res. Technol."},{"issue":"3","key":"ref8","first-page":"123","article-title":"A review of unified threat management (UTM) systems","volume":"1","author":"Zhang","year":"2019","journal-title":"J. Cybersecur. Priv."},{"key":"ref9","first-page":"177","article-title":"Evaluation of unified threat manage- ment (UTM) systems against advanced persistent threats","volume":"83","author":"Lau","year":"2019","journal-title":"Comput. Secur."},{"issue":"5","key":"ref10","first-page":"409","article-title":"Comparative analysis of UTM systems for small and medium-sized enterprises","volume":"11","author":"Zhang","year":"2020","journal-title":"J. Inf. Secur."},{"issue":"5","key":"ref11","first-page":"18","article-title":"Performance optimization in UTM systems","volume":"182","author":"Bilgin","year":"2020","journal-title":"Int. J. Comput. Appl."},{"key":"ref12","article-title":"FIREMAN: A toolkit for firewall modeling and analysis","volume-title":"Proc. IEEE Symp. Secur. Privacy (S&P)","author":"Yuan"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.46647\/ijetms.2023.v07i06.029"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1057\/s41288-022-00266-6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2024.2439609"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.29"},{"issue":"9","key":"ref17","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1109\/TC.2006.138","article-title":"Combining Crypto with Biometrics Effectively","volume":"55","author":"Hao","year":"2006","journal-title":"IEEE Trans. Comput."},{"key":"ref18","volume-title":"AV-Comparatives UTM Test Reports","year":"2022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2024.3443256"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3410111"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3382470"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11194128.pdf?arnumber=11194128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T17:42:10Z","timestamp":1760722930000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11194128\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3618281","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}