{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:30:30Z","timestamp":1755999030712,"version":"3.37.3"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"19","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61732022","U1836203"],"award-info":[{"award-number":["61732022","U1836203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shaanxi Innovation Team Project","award":["2018TD-007"],"award-info":[{"award-number":["2018TD-007"]}]},{"DOI":"10.13039\/501100013314","name":"Higher Education Discipline Innovation 111 Project","doi-asserted-by":"publisher","award":["B16037"],"award-info":[{"award-number":["B16037"]}],"id":[{"id":"10.13039\/501100013314","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,10,1]]},"DOI":"10.1109\/jiot.2022.3160296","type":"journal-article","created":{"date-parts":[[2022,3,17]],"date-time":"2022-03-17T20:34:02Z","timestamp":1647549242000},"page":"18333-18345","source":"Crossref","is-referenced-by-count":3,"title":["<i>MARS<\/i>: Automated Protocol Analysis Framework for Internet of Things"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1784-6091","authenticated-orcid":false,"given":"Haonan","family":"Yan","sequence":"first","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1839-1607","authenticated-orcid":false,"given":"Xiaoguang","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"}]},{"given":"Rui","family":"Dai","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8310-7169","authenticated-orcid":false,"given":"Hui","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"}]},{"given":"Xingwen","family":"Zhao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"}]},{"given":"Fenghua","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref2","first-page":"1","article-title":"Network neutrality and quality of service: What a nondiscrimination rule should look like","volume":"67","author":"Van Schewick","year":"2015","journal-title":"Stanford Law Rev."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.36"},{"key":"ref5","first-page":"2289","article-title":"ParmeSan: Sanitizer-guided greybox fuzzing","volume-title":"Proc. 29th USENIX Security Symp. (USENIX Security)","author":"\u00d6sterlund"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.09.024"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.015172"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013941"},{"issue":"1","key":"ref9","first-page":"1235","article-title":"MLlib: Machine learning in apache spark","volume":"17","author":"Meng","year":"2016","journal-title":"J. Mach. Learn. Res."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2016.7590446"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2013.022713.120250"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921180"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2007.06.014"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028805"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40367-0_33"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223675"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2017.8322736"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1557"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523670"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.380"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00086"},{"key":"ref24","first-page":"1","article-title":"Discoverer: Automatic protocol reverse engineering from network traces","volume-title":"Proc. USENIX Security Symp.","author":"Cui"},{"key":"ref25","first-page":"1","article-title":"Automatic protocol format reverse engineering through context-aware monitored execution","volume-title":"Proc. NDSS","volume":"8","author":"Lin"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455820"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2381896.2381904"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2012.6459963"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/9161723"},{"key":"ref30","first-page":"1","volume-title":"The Needleman-Wunsch Algorithm for Sequence Alignment","author":"Likic","year":"2008"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.28"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.01.013"},{"key":"ref33","first-page":"8","article-title":"NEMESYS: Network message syntax reverse engineering by analysis of the intrinsic structure of individual messages","volume-title":"Proc. 12th USENIX Workshop Offensive Technol.","author":"Kleber"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24531"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00009"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2007.6"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356565"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21554-4_1"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-169294"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3209914.3209937"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590346"},{"issue":"8","key":"ref42","first-page":"239","article-title":"AutoFuzz: Automated network protocol fuzzing framework","volume":"10","author":"Gorbunov","year":"2010","journal-title":"Int. J. Comput. Sci. Netw. Security"},{"key":"ref43","first-page":"161","article-title":"N-gram-based text categorization","volume-title":"Proc. 3rd Annu. Symp. Document Anal. Inf. Retrieval (SDAIR)","volume":"161175","author":"Cavnar"},{"volume-title":"Public PCAP Files for Download","year":"2021","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3165809"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.08.080"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16161-2_24"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-016-0344-y"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363261"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9899827\/09737300.pdf?arnumber=9737300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T00:43:17Z","timestamp":1705538597000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9737300\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,1]]},"references-count":49,"journal-issue":{"issue":"19"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2022.3160296","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2022,10,1]]}}}