{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:40:12Z","timestamp":1742917212267,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030061609"},{"type":"electronic","value":"9783030061616"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-06161-6_59","type":"book-chapter","created":{"date-parts":[[2019,1,14]],"date-time":"2019-01-14T19:47:15Z","timestamp":1547495235000},"page":"604-614","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Hybrid Deep Neural Network - Hidden Markov Model Based Network Traffic Classification"],"prefix":"10.1007","author":[{"given":"Xincheng","family":"Tan","sequence":"first","affiliation":[]},{"given":"Yi","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,15]]},"reference":[{"key":"59_CR1","unstructured":"Alberto, D., Antonio, P., Pierluigi, S., et al.: An hmm approach to internet traffic modeling. In: proceeding of IEEE GLOBECOM (2006)"},{"key":"59_CR2","doi-asserted-by":"publisher","unstructured":"Chen, Z., He, K., Li, J., Geng, Y.: Seq2img: A sequence-to-image based approach towards ip traffic classification using convolutional neural networks. 2017 IEEE International Conference on Big Data (Big Data), pp. 1271\u20131276. IEEE (2017). \n                    https:\/\/doi.org\/10.1109\/bigdata.2017.8258054","DOI":"10.1109\/bigdata.2017.8258054"},{"key":"59_CR3","doi-asserted-by":"publisher","unstructured":"Dainotti, A., De Donato, W., Pescape, A., Rossi, P.S.: Classification of network traffic via packet-level hidden markov models. In: Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE. pp. 1\u20135. IEEE (2008). \n                    https:\/\/doi.org\/10.1109\/glocom.2008.ecp.412","DOI":"10.1109\/glocom.2008.ecp.412"},{"issue":"2","key":"59_CR4","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1109\/surv.2013.100613.00161","volume":"16","author":"M Finsterbusch","year":"2014","unstructured":"Finsterbusch, M., Richter, C., Rocha, E., Muller, J.A., Hanssgen, K.: A survey of payload-based traffic classification approaches. IEEE Commun. Surv. Tutor. 16(2), 1135\u20131156 (2014). \n                    https:\/\/doi.org\/10.1109\/surv.2013.100613.00161","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"7553","key":"59_CR5","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436 (2015). \n                    https:\/\/doi.org\/10.1038\/nature14539","journal-title":"Nature"},{"key":"59_CR6","unstructured":"Li, W., Moore, A.W., Canini, M.: Classifying http traffic in the new age. In: ACM SIGCOMM 2008 Conference (2008)"},{"key":"59_CR7","doi-asserted-by":"publisher","unstructured":"Madhukar, A., Williamson, C.: A longitudinal study of p2p traffic classification. In: IEEE International Symposium on Modeling, Analysis, and Simulation. pp. 179\u2013188 (2006). \n                    https:\/\/doi.org\/10.1109\/mascots.2006.6","DOI":"10.1109\/mascots.2006.6"},{"key":"59_CR8","doi-asserted-by":"crossref","unstructured":"Mu, X., Wu, W.: A parallelized network traffic classification based on hidden markov model. In: 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 107\u2013112. IEEE (2011)","DOI":"10.1109\/CyberC.2011.27"},{"key":"59_CR9","doi-asserted-by":"crossref","unstructured":"Nguyen, T.T.T., Armitage, G.: A survey of techniques for internet traffic classification using machine learning. IEEE Press (2008)","DOI":"10.1109\/SURV.2008.080406"},{"key":"59_CR10","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/978-3-319-70087-8_47","volume-title":"Neural Information Processing","author":"Pramitha Perera","year":"2017","unstructured":"Perera, P., Tian, Y.C., Fidge, C., Kelly, W.: A comparison of supervised machine learning algorithms for classification of communications network traffic. In: International Conference on Neural Information Processing, pp. 445\u2013454. Springer, Berlin (2017). \n                    https:\/\/doi.org\/10.1007\/978-3-319-70087-8_47"},{"issue":"2","key":"59_CR11","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"LR Rabiner","year":"1989","unstructured":"Rabiner, L.R.: A tutorial on hidden markov models and selected applications in speech recognition. Proc. IEEE 77(2), 257\u2013286 (1989). \n                    https:\/\/doi.org\/10.1109\/5.18626","journal-title":"Proc. IEEE"},{"issue":"6","key":"59_CR12","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1109\/JCN.2013.000112","volume":"15","author":"TC Thang","year":"2013","unstructured":"Thang, T.C., Le, H.T., Nguyen, H.X., Pham, A.T., Kang, J.W., Ro, Y.M.: Adaptive video streaming over http with dynamic resource estimation. J. Commun. Netw. 15(6), 635\u2013644 (2013)","journal-title":"J. Commun. Netw."},{"key":"59_CR13","doi-asserted-by":"publisher","unstructured":"Wang, W., Zhu, M., Wang, J., Zeng, X., Yang, Z.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 43\u201348. IEEE (2017). \n                    https:\/\/doi.org\/10.1109\/isi.2017.8004872","DOI":"10.1109\/isi.2017.8004872"},{"key":"59_CR14","unstructured":"Wang, Z.: The applications of deep learning on traffic identification. BlackHat USA (2015)"},{"key":"59_CR15","doi-asserted-by":"publisher","unstructured":"Wright, C., Monrose, F., Masson, G.M.: Hmm profiles for network traffic classification. In: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security. pp. 9\u201315. ACM (2004). \n                    https:\/\/doi.org\/10.1145\/1029208.1029211","DOI":"10.1145\/1029208.1029211"},{"key":"59_CR16","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-1-4471-5779-3_6","volume-title":"Automatic Speech Recognition","author":"Dong Yu","year":"2014","unstructured":"Yu, D., Deng, L.: Deep neural network-hidden markov model hybrid systems. In: Automatic Speech Recognition, pp. 99\u2013116. Springer, Berlin (2015). \n                    https:\/\/doi.org\/10.1007\/978-1-4471-5779-3_6"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-06161-6_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T01:15:14Z","timestamp":1558401314000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-06161-6_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030061609","9783030061616"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-06161-6_59","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ChinaCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Communications and Networking in China","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chengdu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"chinacom2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/chinacom.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}