{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:33:33Z","timestamp":1729665213304,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/icc.2011.5963095","type":"proceedings-article","created":{"date-parts":[[2011,8,3]],"date-time":"2011-08-03T21:44:20Z","timestamp":1312407860000},"page":"1-5","source":"Crossref","is-referenced-by-count":6,"title":["An Approach for Unifying Rule Based Deep Packet Inspection"],"prefix":"10.1109","author":[{"given":"A.","family":"Munoz","sequence":"first","affiliation":[]},{"given":"S.","family":"Sezer","sequence":"additional","affiliation":[]},{"given":"D.","family":"Burns","sequence":"additional","affiliation":[]},{"given":"G.","family":"Douglas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948145"},{"journal-title":"Cisco Visual Networking Index Global Forecast survey","year":"2010","key":"ref3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1993.287646"},{"journal-title":"International Computer Science Institute","article-title":"Bro Development Team, Bro official reference manual","year":"0","key":"ref6"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"37","DOI":"10.3233\/JCS-1999-7103","article-title":"NetSTAT: A Network-based Intrusion Detection System","volume":"7","author":"vignaand","year":"1999","journal-title":"Journal of Computer Security"},{"key":"ref5","article-title":"Bro: A System for Detecting Network Intruders in Real-Time","author":"paxson","year":"1998","journal-title":"Usenix Security"},{"key":"ref12","article-title":"Fast packet classification for Snort by native compilation of rules","author":"tongaonkar","year":"0","journal-title":"LISA'08"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821508"},{"key":"ref7","article-title":"Translating Snort rules to STATL scenarios","author":"eckmann","year":"2001","journal-title":"Proc Recent Advances in Intrusion Detection"},{"year":"0","key":"ref2"},{"key":"ref1","article-title":"Snort?Lightweight Intrusion Detection for Networks","author":"roesch","year":"1999","journal-title":"USENIX conference on System administration"},{"key":"ref9","article-title":"STATL: An attack language for state-based intrusion detection","author":"eckmann","year":"2000","journal-title":"Proceedings of WIDS(held in conjunction with ACMCCS 2000)"}],"event":{"name":"ICC 2011 - 2011 IEEE International Conference on Communications","start":{"date-parts":[[2011,6,5]]},"location":"Kyoto, Japan","end":{"date-parts":[[2011,6,9]]}},"container-title":["2011 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5962386\/5962409\/05963095.pdf?arnumber=5963095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T15:02:07Z","timestamp":1560438127000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5963095\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icc.2011.5963095","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}