{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:17:56Z","timestamp":1761401876951,"version":"3.37.3"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology (MOST), Taiwan","doi-asserted-by":"publisher","award":["102-2221-E-006-112-MY3","105-2628-E-006-007-MY3"],"award-info":[{"award-number":["102-2221-E-006-112-MY3","105-2628-E-006-007-MY3"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Veh. Technol."],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/tvt.2017.2675454","type":"journal-article","created":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T19:18:57Z","timestamp":1488395937000},"page":"8385-8397","source":"Crossref","is-referenced-by-count":16,"title":["Random Packet Inspection Scheme for Network Intrusion Prevention in LTE Core Networks"],"prefix":"10.1109","volume":"66","author":[{"given":"Sok-Ian","family":"Sou","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chuan-Sheng","family":"Lin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"year":"2014","author":"ross","journal-title":"Introduction to Probability Models","key":"ref33"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/TMC.2009.104"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1016\/j.comnet.2011.07.025"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/ICC.2012.6364750"},{"year":"1976","author":"kleinrock","journal-title":"Queueing Systems Volume I&#x2014 Theory","key":"ref34"},{"year":"2011","journal-title":"DPI Appliance Vendors Face an Off-the-Shelf Challenge","key":"ref10"},{"year":"2013","author":"luna","journal-title":"TDF in LTE The Next-Generation Pricing Model Are Here","key":"ref11"},{"year":"2013","article-title":"Advantages of pure-play versus embedded TDF for LTE networks","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/FCCM.2005.7"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/11856214_16"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/1872007.1872033"},{"key":"ref16","first-page":"229","article-title":"Snort&#x2013;Lightweight intrusion detection for networks","author":"roesch","year":"0","journal-title":"Proc USENIX System Administration Conf"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1016\/S1389-1286(99)00112-7"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/s10922-010-9181-x"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/1752046.1752049"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/PST.2015.7232968"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/1653662.1653690"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/SURV.2013.100613.00161"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/2810103.2813718"},{"year":"2015","journal-title":"3rd generation partnership project technical specification group services and system aspects policy and charging control architecture (Release 13)","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1016\/j.telpol.2012.04.003"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.4304\/jnw.6.5.823-830"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1016\/j.comnet.2015.08.017"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TVT.2013.2255899"},{"year":"2015","article-title":"Cisco visual networking index: Global mobile data traffic forecast update\n 2014&#x2013;2019","key":"ref2"},{"year":"2011","author":"finnie","journal-title":"The New DPI Challenges & Opportunities in the LTE Era","key":"ref9"},{"year":"2015","article-title":"GSA evolution to LTE report evolution to LTE","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/AINA.2014.19"},{"key":"ref22","first-page":"50","article-title":"Get off of my market: Detecting\n malicious apps in official and alternative Android markets","author":"zhou","year":"0","journal-title":"Proc Symp Netw Distrib Syst Security"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/SP.2012.16"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.4108\/icst.simutools.2011.245519"},{"key":"ref23","first-page":"1","article-title":"The core of the matter: Analyzing malicious\n traffic in cellular carriers","author":"lever","year":"0","journal-title":"Proc Symp Netw Distrib Syst Security"},{"year":"2013","author":"parsons","journal-title":"Deep Packet Inspection and Its Predecessors","key":"ref26"},{"year":"2007","article-title":"Digging deeper into deep packet inspection (DPI)","key":"ref25"}],"container-title":["IEEE Transactions on Vehicular Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/25\/8039128\/07866014.pdf?arnumber=7866014","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:03:54Z","timestamp":1642003434000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7866014\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":34,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tvt.2017.2675454","relation":{},"ISSN":["0018-9545","1939-9359"],"issn-type":[{"type":"print","value":"0018-9545"},{"type":"electronic","value":"1939-9359"}],"subject":[],"published":{"date-parts":[[2017,9]]}}}