{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:46:20Z","timestamp":1772041580790,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T00:00:00Z","timestamp":1747958400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T00:00:00Z","timestamp":1747958400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,23]]},"DOI":"10.1109\/cniot65435.2025.11070881","type":"proceedings-article","created":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T17:41:09Z","timestamp":1752514869000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["Fault Tolerance Identification of Application Layer Protocols Based on Protocol Natural Redundancy Decoding"],"prefix":"10.1109","author":[{"given":"Guoxian","family":"Yu","sequence":"first","affiliation":[{"name":"Information Engineering University,Information Engineering College,Zhengzhou,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaomin","family":"Ran","sequence":"additional","affiliation":[{"name":"Information Engineering University,Information Engineering College,Zhengzhou,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hongyi","family":"Yu","sequence":"additional","affiliation":[{"name":"Information Engineering University,Information Engineering College,Zhengzhou,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yongbin","family":"Li","sequence":"additional","affiliation":[{"name":"Information Engineering University,Information Engineering College,Zhengzhou,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Renpeng","family":"Zha","sequence":"additional","affiliation":[{"name":"Information Engineering University,Information Engineering College,Zhengzhou,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yueran","family":"Ma","sequence":"additional","affiliation":[{"name":"Information Engineering University,Information Engineering College,Zhengzhou,China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6135854"},{"key":"ref2","article-title":"Research and design of deep packet inspection technology","volume-title":"Ph.D. dissertation","author":"Liu","year":"2009"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2006.6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544023"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004872"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512217"},{"key":"ref10","article-title":"Netgpt: Generative pretrained transformer for network traffic","volume":"abs\/2304.09513","author":"Meng","year":"2023","journal-title":"ArXiv"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1961.287814"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1071"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013676531988"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.1984.1146084"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2771559"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2699359"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2025.11026844"},{"key":"ref18","article-title":"IEC\/IEEE 60802 (D1.1) Time-Sensitive Networking Profile for Industrial Automation","year":"2019","journal-title":"IEEE and IEC Std."},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3279331"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.07.090238"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.071312.100551"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2006.873062"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2010.03.080303"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2012.2203803"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.0709"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3328998"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2024.3434377"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref29","volume-title":"Channel Coding: Classical and Modern","author":"Ryan","year":"2017"}],"event":{"name":"2025 6th International Conference on Computing, Networks and Internet of Things (CNIOT)","location":"Shanghai, China","start":{"date-parts":[[2025,5,23]]},"end":{"date-parts":[[2025,5,25]]}},"container-title":["2025 6th International Conference on Computing, Networks and Internet of Things (CNIOT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11069441\/11069432\/11070881.pdf?arnumber=11070881","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T05:59:19Z","timestamp":1752559159000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11070881\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,23]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/cniot65435.2025.11070881","relation":{},"subject":[],"published":{"date-parts":[[2025,5,23]]}}}