{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:25:22Z","timestamp":1740101122605,"version":"3.37.3"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T00:00:00Z","timestamp":1664755200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T00:00:00Z","timestamp":1664755200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,3]]},"DOI":"10.1109\/cns56114.2022.9947242","type":"proceedings-article","created":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T20:49:54Z","timestamp":1668804594000},"page":"281-289","source":"Crossref","is-referenced-by-count":3,"title":["Refining Network Message Segmentation with Principal Component Analysis"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9836-4897","authenticated-orcid":false,"given":"Stephan","family":"Kleber","sequence":"first","affiliation":[{"name":"Institute of Distributed Systems Ulm University,Ulm,Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3800-8369","authenticated-orcid":false,"given":"Frank","family":"Kargl","sequence":"additional","affiliation":[{"name":"Institute of Distributed Systems Ulm University,Ulm,Germany"}]}],"member":"263","reference":[{"key":"ref10","article-title":"NEMESYS: Network Message Syntax Reverse En-gineering by Analysis of the Intrinsic Structure of Individual Messages","author":"kleber","year":"2018","journal-title":"WOOT"},{"key":"ref11","article-title":"Sur-vey of Protocol Reverse Engineering Algorithms: De-composition of Tools for Static Traffic Analysis","volume":"21 1","author":"kleber","year":"2019","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"ref12","article-title":"Network Message Field Type Classification and Recognition for Unknown Binary Protocols","author":"kleber","year":"2022","journal-title":"DCDS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88418-5_7"},{"key":"ref14","article-title":"Computer Programs for Hierarchical Polythetic Clas-sification (&#x201C;Similarity Analyses","volume":"9 1","author":"godfrey","year":"1966","journal-title":"The Computer Journal"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.49"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.01.013"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857746"},{"key":"ref18","article-title":"A Survey of Automatic Protocol Reverse Engi-neering Tools","volume":"48 3","author":"narayan","year":"2015","journal-title":"ACM Computing Surveys"},{"key":"ref19","article-title":"Universal Radio Hacker: A Suite for Analyzing and Attacking Stateful Wireless Protocols","author":"pohl","year":"2018","journal-title":"WOOT"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866355"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2012.6459963"},{"key":"ref3","article-title":"Towards Automated Protocol Reverse Engineering U sing Semantic Information","author":"bossert","year":"2014","journal-title":"ASIACCS"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356565"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-016-0289-8"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0186188"},{"key":"ref5","article-title":"Discoverer: Automatic Protocol Reverse Engi-neering from Network Traces","author":"cui","year":"2007","journal-title":"Usenix Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28865-9_18"},{"key":"ref7","article-title":"A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise","author":"ester","year":"1996","journal-title":"KDD"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1016\/j.comcom.2016.02.015","article-title":"Towards Automatic Protocol Field Inference","volume":"84","author":"bermudez","year":"2016","journal-title":"Computer Communications"},{"journal-title":"Google Project Zero An iOS Zero-Click Radio Proximity Exploit Odyssey","year":"2020","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155275"},{"key":"ref20","article-title":"Understanding and Exploiting Implanted Medical Devices","author":"rios","year":"2018","journal-title":"Black Hat USA Las Vegas"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2011.20"},{"key":"ref21","article-title":"Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study","author":"rouf","year":"2010","journal-title":"Usenix Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2836(81)90087-5"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8370341"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.06.013"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241566"}],"event":{"name":"2022 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2022,10,3]]},"location":"Austin, TX, USA","end":{"date-parts":[[2022,10,5]]}},"container-title":["2022 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9947203\/9947223\/09947242.pdf?arnumber=9947242","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:57:04Z","timestamp":1670875024000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9947242\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,3]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/cns56114.2022.9947242","relation":{},"subject":[],"published":{"date-parts":[[2022,10,3]]}}}