{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:27:27Z","timestamp":1725769647803},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.23919\/inm.2017.7987363","type":"proceedings-article","created":{"date-parts":[[2017,7,24]],"date-time":"2017-07-24T20:32:03Z","timestamp":1500928323000},"page":"708-713","source":"Crossref","is-referenced-by-count":2,"title":["On the impact of TCP segmentation: Experience in VoIP monitoring"],"prefix":"10.23919","author":[{"given":"David","family":"Muelas","sequence":"first","affiliation":[]},{"given":"Jorge E.","family":"Lopez de Vergara","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Ramos","sequence":"additional","affiliation":[]},{"given":"Jose Luis","family":"Garcia-Dorado","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Aracil","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"RFC 793 Transmission Control Protocol","year":"1981","author":"postel","key":"ref10"},{"journal-title":"RFC 1122 - Requirements for Internet Hosts","year":"1989","author":"braden","key":"ref11"},{"key":"ref12","first-page":"1","article-title":"We need to talk about NICs","author":"shinde","year":"2013","journal-title":"Proceedings of the 13th USENIX Conference on Hot Topics in Operating Systems Ser HotOS'13"},{"journal-title":"Understanding Linux Network Internals","year":"2006","author":"benvenuti","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2093548.2093565"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIWDC.2013.6664194"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2424887"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HPCS.2010.5547144"},{"journal-title":"TShark-The Wireshark Network Analyser","year":"0","author":"combs","key":"ref18"},{"journal-title":"TCP\/IP Illustrated Volume 1 The Protocols","year":"2011","author":"fall","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/FGCN.2008.118"},{"key":"ref3","first-page":"65","article-title":"Robust TCP stream reassembly in the presence of adversaries","author":"dharmapurikar","year":"2005","journal-title":"Proceedings of the Conference on USENIX Security Symposium-Volume 14 ser SSYM"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25512-5_6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ECTICon.2012.6254336"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068834"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1858"},{"journal-title":"Source-fire Incorporated","article-title":"Target-based TCP stream reassembly","year":"2007","author":"novak","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.1999.830048"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1861"}],"event":{"name":"2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM)","start":{"date-parts":[[2017,5,8]]},"location":"Lisbon","end":{"date-parts":[[2017,5,12]]}},"container-title":["2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7976714\/7987228\/07987363.pdf?arnumber=7987363","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,24]],"date-time":"2020-04-24T00:30:40Z","timestamp":1587688240000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7987363\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":19,"URL":"https:\/\/doi.org\/10.23919\/inm.2017.7987363","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}