{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:43:55Z","timestamp":1759092235623,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/csc.2011.6138545","type":"proceedings-article","created":{"date-parts":[[2012,1,31]],"date-time":"2012-01-31T16:47:02Z","timestamp":1328028422000},"page":"342-347","source":"Crossref","is-referenced-by-count":8,"title":["Intrusion analysis with deep packet inspection: Increasing efficiency of packet based investigations"],"prefix":"10.1109","author":[{"given":"Daniel","family":"Smallwood","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Vance","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Fast anomoly detection in large data centers","author":"li","year":"2010","journal-title":"Proc of the 2010 IEEE Global Commuincations Conference (GLOBECOM'10)"},{"key":"ref11","article-title":"Stateful Intrusion Detection for High-Speed Networks","author":"kruegel","year":"2005","journal-title":"Proceedings of the IEEE Symposium on Security and Privacy S&P"},{"key":"ref12","article-title":"Deep Packet Inspection Technologies","author":"tipton","year":"2009","journal-title":"Information Systems Security"},{"key":"ref13","article-title":"Intrusion Prevention and Active Response: Deploying Network and Host IPS","author":"rash","year":"2005","journal-title":"Syngress"},{"key":"ref14","article-title":"The BSD Packet Filter: A New Architecture for User-level Packet Capture","author":"mccanne","year":"1993","journal-title":"Winter USENIX"},{"year":"0","key":"ref15","article-title":"Network packet analyzer"},{"year":"0","key":"ref16","article-title":"Security Information Manager"},{"year":"0","key":"ref17","article-title":"Network packet analyzer"},{"year":"0","key":"ref18","article-title":"Network Protocol Analyzer"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1496091.1496100"},{"key":"ref4","article-title":"IT Risks &#x2014; Present and future","volume":"4","author":"singleton","year":"2011","journal-title":"ISACA Journal"},{"key":"ref3","article-title":"Cloud computing risk assessment","volume":"4","author":"gadia","year":"2011","journal-title":"ISACA Journal"},{"key":"ref6","article-title":"The cloud is changing everything: It's not just for scaling your business, but protecting it too","author":"chasin","year":"2011","journal-title":"McAfee Editorial Brief"},{"key":"ref5","article-title":"Cloud computing security forecast: Clear skies","author":"mills","year":"2009","journal-title":"CNET"},{"key":"ref8","article-title":"High-Performance stateful intrusion detection system","author":"yoon","year":"2007","journal-title":"International Conference on Computational Intelligence and Security"},{"key":"ref7","article-title":"10 technologies to watch in 2010: Deep packet inspection adds a layer of defense","author":"yasin","year":"2010","journal-title":"Government Computer News"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.45"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2009.89"},{"key":"ref9","first-page":"25","article-title":"Deep packet inspection for intrusion detection systems: A survey","volume":"24","author":"abuhmed","year":"2007","journal-title":"Magazine of Korea Telecommunication Society"},{"key":"ref20","article-title":"Deep Security: DISA beefs up network security with deep packet inspection of IP transmissions","volume":"12","author":"gerber","year":"2008","journal-title":"Military Information Technology"}],"event":{"name":"2011 International Conference on Cloud and Service Computing (CSC)","start":{"date-parts":[[2011,12,12]]},"location":"Hong Kong, China","end":{"date-parts":[[2011,12,14]]}},"container-title":["2011 International Conference on Cloud and Service Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6132470\/6138497\/06138545.pdf?arnumber=6138545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T10:03:29Z","timestamp":1490090609000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6138545\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/csc.2011.6138545","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}