{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T01:38:54Z","timestamp":1725759534562},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/reconfig.2016.7857172","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T17:20:29Z","timestamp":1487265629000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["FPGA-based encrypted network traffic identification at 100 Gbit\/s"],"prefix":"10.1109","author":[{"given":"Mario","family":"Ruiz","sequence":"first","affiliation":[]},{"given":"Gustavo","family":"Sutter","sequence":"additional","affiliation":[]},{"given":"Sergio","family":"Lopez-Buedo","sequence":"additional","affiliation":[]},{"given":"Jorge E.","family":"Lopez de Vergara","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1872007.1872010"},{"journal-title":"Encrypted-traffic discrimination device and encrypted-traffic discrimination system","year":"2015","author":"ata","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17172-2_1"},{"journal-title":"Sandvine","article-title":"Global Internet Phenomena Spotlight: Encrypted Internet Traffic","year":"2015","key":"ref13"},{"journal-title":"Xilinx Inc Vivado High-Level Synthesis (Vivado-HLS)","year":"0","key":"ref14"},{"key":"ref15","first-page":"45","article-title":"Protocol-Processing System Thrive with Vivado HLS","author":"karras","year":"2014","journal-title":"Xcell Journal vol Third Quarter 2014"},{"journal-title":"Designing Protocol Processing Systems with Vivado High-Level Synthesis","year":"2014","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/EUROCON.2015.7313700"},{"journal-title":"Xilinx","article-title":"VCU108 Evaluation Board, User Guide UG1066 Tech. Rep","year":"2016","key":"ref18"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7263355"},{"journal-title":"Xilinx","article-title":"UltraScale Architecture Integrated Block for 100G Ethernet vl.10","year":"2016","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71617-4_17"},{"key":"ref5","first-page":"164","article-title":"Entropy Estimation for Real-Time Encrypted Traffic Identification","author":"dorfinger","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54999-1_1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2013.6645557"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6915434"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2559198"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683649"}],"event":{"name":"2016 International Conference on Reconfigurable Computing and FPGAs (ReConFig)","start":{"date-parts":[[2016,11,30]]},"location":"Cancun","end":{"date-parts":[[2016,12,2]]}},"container-title":["2016 International Conference on ReConFigurable Computing and FPGAs (ReConFig)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7838017\/7856931\/07857172.pdf?arnumber=7857172","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,27]],"date-time":"2020-04-27T21:17:21Z","timestamp":1588022241000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7857172\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/reconfig.2016.7857172","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}