{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T08:32:08Z","timestamp":1725784328566},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/iccomm.2016.7528337","type":"proceedings-article","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T18:27:58Z","timestamp":1470421678000},"page":"153-158","source":"Crossref","is-referenced-by-count":2,"title":["Solutions for deep packet inspection in industrial communications"],"prefix":"10.1109","author":[{"given":"S.","family":"Zamfir","sequence":"first","affiliation":[]},{"given":"T.","family":"Balan","sequence":"additional","affiliation":[]},{"given":"F.","family":"Sandu","sequence":"additional","affiliation":[]},{"given":"C.","family":"Costache","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Data-Plane Development Kit","year":"0","key":"ref10"},{"journal-title":"Ntop Deep Packet Inspection","year":"0","key":"ref11"},{"journal-title":"Message Queuing Telemetry Transport","year":"0","key":"ref12"},{"journal-title":"Constrained Application Protocol","year":"0","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2014.6906427"},{"journal-title":"Eclipse Ponte project","year":"0","key":"ref15"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988742"},{"key":"ref3","article-title":"Application detection using DPI","author":"baek","year":"2010","journal-title":"Technical Paper"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24668-8_21"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FPGA.2003.1227239"},{"journal-title":"AdvancedTCA","year":"0","key":"ref8"},{"key":"ref7","first-page":"373","article-title":"Real time Classification for Encrypted Traffic","author":"bar-yanai","year":"2010","journal-title":"SEAA 2010"},{"journal-title":"Internet Assigned Numbers Authority","year":"0","key":"ref2"},{"journal-title":"Visual Networking Index","year":"0","key":"ref1"},{"year":"0","key":"ref9","article-title":"6.4 Billion Connected &#x2018;Things&#x2019; Will Be in Use in 2016"}],"event":{"name":"2016 International Conference on Communications (COMM)","start":{"date-parts":[[2016,6,9]]},"location":"Bucharest, Romania","end":{"date-parts":[[2016,6,10]]}},"container-title":["2016 International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7522608\/7528195\/07528337.pdf?arnumber=7528337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,26]],"date-time":"2016-09-26T01:51:17Z","timestamp":1474854677000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7528337\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iccomm.2016.7528337","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}