{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:19:33Z","timestamp":1742977173584,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031324420"},{"type":"electronic","value":"9783031324437"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-32443-7_30","type":"book-chapter","created":{"date-parts":[[2023,5,27]],"date-time":"2023-05-27T20:30:19Z","timestamp":1685219419000},"page":"413-422","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Anomaly Detection with\u00a0Ensemble Empirical Mode Decomposition for\u00a0Secure QUIC Communications: A Simple Use Case"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7912-2702","authenticated-orcid":false,"given":"Keyang","family":"Gu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5332-2359","authenticated-orcid":false,"given":"Junyi","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0803-7505","authenticated-orcid":false,"given":"Fan","family":"Jiang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2664-1637","authenticated-orcid":false,"given":"Ruiwen","family":"Ji","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9488-8527","authenticated-orcid":false,"given":"Lejun","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Lei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,28]]},"reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Iyengar, J., Thomson, M.: QUIC: A UDP-based multiplexed and secure transport. Internet Engineering Task Force, Internet-Draft draft-ietf-quic-transport-27 (2020)","DOI":"10.17487\/RFC9000"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Nithya, B., Prakash. L.M., Kishore, J.N., Akash, M.N.: Performance analysis of pluggable congestion control in QUIC protocol. In: AIP Conference Proceedings, p. 02003. AIP Publishing LLC (2022)","DOI":"10.1063\/5.0076775"},{"key":"30_CR3","unstructured":"De Quentin, C., Bonaventure, O.: Multipath QUIC: design and evaluation. In: Proceedings of the 13th International Conference on Emerging Networking Experiments and Technologies, pp. 160\u2013166 (2017)"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Viernickel, T., Froemmgen, A., Rizk, A., Koldehofe, B., Steinmetz, R.: Multipath QUIC: a deployable multipath transport protocol. In: 2018 IEEE International Conference on Communications (ICC), pp. 1\u20137. IEEE (2018)","DOI":"10.1109\/ICC.2018.8422951"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Han, Y., Zuo, M., Yuan, H., Zhong, Y., Yuan, Z., Bi, T.: A QoS-based fairness-aware BBR congestion control algorithm using QUIC. Wirele. Commun. Mob. Comput. (2022)","DOI":"10.1155\/2022\/7222030"},{"issue":"4","key":"30_CR6","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MCOM.001.2000876","volume":"59","author":"F Chiariotti","year":"2021","unstructured":"Chiariotti, F., Deshpande, A.A., Giordani, M., Antonakoglou, K., Mahmoodi, T., Zanella, A.: QUIC-EST: a QUIC-enabled scheduling and transmission scheme to maximize VoI with correlated data flows. IEEE Commun. Mag. 59(4), 30\u201336 (2021)","journal-title":"IEEE Commun. Mag."},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Shi, X., Wang, L., Zhang, F., Zhou, B., Liu, Z.: PStream: priority-based stream scheduling for heterogeneous paths in multipath-QUIC. In: 29th International Conference on Computer Communications and Networks, pp. 1\u20138. IEEE (2020)","DOI":"10.1109\/ICCCN49398.2020.9209682"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Shi, X., Zhang, F., Liu, Z.: PriorityBucket: a multipath-QUIC scheduler on accelerating first rendering time in page loading. In: Proceedings of the Eleventh ACM International Conference on Future Energy Systems, pp. 572\u2013577 (2020)","DOI":"10.1145\/3396851.3402923"},{"issue":"1","key":"30_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/90.282603","volume":"2","author":"WE Leland","year":"1994","unstructured":"Leland, W.E., Taqqu, M.S., Willinger, W., Wilson, D.V.: On the self-similar nature of Ethernet traffic (extended version). IEEE\/ACM Trans. Netw. 2(1), 1\u201315 (1994)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"8","key":"30_CR10","doi-asserted-by":"publisher","first-page":"1642","DOI":"10.1109\/TIM.2008.925730","volume":"57","author":"G Giorgi","year":"2008","unstructured":"Giorgi, G., Narduzzi, C.: A study of measurement-based traffic models for network diagnostics. IEEE Trans. Instrum. Meas. 57(8), 1642\u20131650 (2008)","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"30_CR11","series-title":"Lecture Notes on Data Engineering and Communications Technologies","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1007\/978-3-030-43070-2_33","volume-title":"Data-Centric Business and Applications","author":"O Lemeshko","year":"2021","unstructured":"Lemeshko, O., Mersni, A., Nevzorova, O.: Analysis of influence of network architecture nonuniformity and traffic self-similarity properties to load balancing and average end-to-end delay. In: Radivilova, T., Ageyev, D., Kryvinska, N. (eds.) Data-Centric Business and Applications. LNDECT, vol. 48, pp. 767\u2013787. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-43070-2_33"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Barford, P., Plonka, D.: Characteristics of network traffic flow anomalies. In: Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, pp. 69\u201373 (2001)","DOI":"10.1145\/505202.505211"},{"key":"30_CR13","doi-asserted-by":"publisher","first-page":"108906","DOI":"10.1016\/j.comnet.2022.108906","volume":"209","author":"J Pei","year":"2022","unstructured":"Pei, J., Zhong, K., Jan, M.A., Li, J.: Personalized federated learning framework for network traffic anomaly detection. Comput. Netw. 209, 108906 (2022)","journal-title":"Comput. Netw."},{"issue":"3","key":"30_CR14","doi-asserted-by":"publisher","first-page":"e260","DOI":"10.1002\/itl2.260","volume":"4","author":"Y Pan","year":"2021","unstructured":"Pan, Y.: Network security and user abnormal behavior detection by using deep neural network. Internet Technol. Lett. 4(3), e260 (2021)","journal-title":"Internet Technol. Lett."},{"key":"30_CR15","first-page":"1","volume":"12","author":"Z Hu","year":"2020","unstructured":"Hu, Z., et al.: Statistical techniques for detecting cyberattacks on computer networks based on an analysis of abnormal traffic behavior. Int. J. Comput. Netw. Inf. Sec. 12, 1 (2020)","journal-title":"Int. J. Comput. Netw. Inf. Sec."},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"Kumari, N., Mohapatra, A.K.: A comprehensive and critical analysis of TLS 1.3. J. Inf. Optim. Sci., 1\u201315 (2022)","DOI":"10.1080\/02522667.2021.1968579"},{"key":"30_CR17","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-030-93479-8_13","volume-title":"Broadband Communications, Networks, and Systems","author":"M Morawski","year":"2022","unstructured":"Morawski, M., Karbowa\u0144czyk, M.: Multipath QUIC \u2013 directions of the improvements. In: Xiang, W., Han, F., Phan, T.K. (eds.) BROADNETS 2021. LNICST, vol. 413, pp. 193\u2013207. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-93479-8_13"},{"key":"30_CR18","series-title":"Studies in Big Data","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-030-77214-7_6","volume-title":"Smart Sensor Networks","author":"A Sharma","year":"2022","unstructured":"Sharma, A., Kamthania, D.: QUIC protocol based monitoring probes for network devices monitor and alerts. In: Singh, U., Abraham, A., Kaklauskas, A., Hong, T.-P. (eds.) Smart Sensor Networks. SBD, vol. 92, pp. 127\u2013150. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-77214-7_6"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Wu, B., Li, H., Wu, Q., Jiang, Z., Liu, J.: TMPTCP: a lightweight trust extension for multipath-TCP. In: 2020 International Conference on Networking and Network Applications, pp. 342\u2013347. IEEE (2020)","DOI":"10.1109\/NaNA51271.2020.00065"},{"key":"30_CR20","doi-asserted-by":"publisher","first-page":"8456","DOI":"10.1109\/TII.2022.3151093","volume":"18","author":"Y Cao","year":"2022","unstructured":"Cao, Y., Ji, R., Ji, L., Lei, G., Wang, H., Shao, X.: $$l^{2}$$-MPTCP: a learning-driven latency-aware multipath transport scheme for industrial internet applications. IEEE Trans. Ind. Inf. 18, 8456\u20138466 (2022)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"30_CR21","doi-asserted-by":"crossref","unstructured":"Zheng, Z., et al.: Xlink: Qoe-driven multi-path QUIC transport in large-scale video services. In: Proceedings of the 2021 ACM SIGCOMM 2021 Conference 2021, pp. 418\u2013432 (2021)","DOI":"10.1145\/3452296.3472893"},{"key":"30_CR22","doi-asserted-by":"publisher","first-page":"2807","DOI":"10.1109\/TDSC.2021.3074439","volume":"19","author":"R Xu","year":"2021","unstructured":"Xu, R., Joshi, J., Li, C.: NN-EMD: efficiently training neural networks using encrypted multi-sourced datasets. IEEE Trans. Dependable Sec. Comput. 19, 2807\u20132820 (2021)","journal-title":"IEEE Trans. Dependable Sec. Comput."},{"key":"30_CR23","doi-asserted-by":"crossref","unstructured":"Du, S., Xu, Z., Lv, J.: An EMD-and GRU-based hybrid network traffic prediction model with data reconstruction. In: 2021 IEEE International Conference on Communications Workshops (ICC Workshops), pp. 1\u20137. IEEE (2021)","DOI":"10.1109\/ICCWorkshops50388.2021.9473822"},{"issue":"2","key":"30_CR24","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.3233\/JIFS-189775","volume":"42","author":"H Malik","year":"2022","unstructured":"Malik, H., Alotaibi, M.A., Almutairi, A.: A new hybrid model combining EMD and neural network for multi-step ahead load forecasting. J. Intell. Fuzzy Syst. 42(2), 1099\u20131114 (2022)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"30_CR25","doi-asserted-by":"crossref","unstructured":"Tian, M., Sun, C., Wu, S.: An EMD and ARMA-based network traffic prediction approach in SDN-based internet of vehicles. Wirel. Netw., 1\u20133 (2021)","DOI":"10.1007\/s11276-021-02675-2"},{"issue":"7","key":"30_CR26","doi-asserted-by":"publisher","first-page":"e5097","DOI":"10.1002\/dac.5097","volume":"35","author":"Z Tian","year":"2022","unstructured":"Tian, Z., Song, P.: A novel network traffic combination prediction model. Int. J. Commun. Syst. 35(7), e5097 (2022)","journal-title":"Int. J. Commun. Syst."},{"issue":"1","key":"30_CR27","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/MNET.011.1900647","volume":"35","author":"L Zhang","year":"2020","unstructured":"Zhang, L., et al.: LNTP: an end-to-end online prediction model for network traffic. IEEE Netw. 35(1), 226\u2013233 (2020)","journal-title":"IEEE Netw."},{"key":"30_CR28","doi-asserted-by":"publisher","first-page":"2254","DOI":"10.1007\/s11036-022-02005-6","volume":"27","author":"Y Cao","year":"2022","unstructured":"Cao, Y., Ji, R., Huang, X., Lei, G., Shao, X., You, I.: Empirical mode decomposition-empowered network traffic anomaly detection for secure multipath TCP communications. Mob. Netw. Appl. 27, 2254\u20132263 (2022)","journal-title":"Mob. Netw. Appl."},{"key":"30_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/978-3-030-59016-1_35","volume-title":"Wireless Algorithms, Systems, and Applications","author":"X Tao","year":"2020","unstructured":"Tao, X., Peng, Y., Zhao, F., Wang, S.F., Liu, Z.: An improved parallel network traffic anomaly detection method based on bagging and GRU. In: Yu, D., Dressler, F., Yu, J. (eds.) WASA 2020. LNCS, vol. 12384, pp. 420\u2013431. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59016-1_35"},{"issue":"01","key":"30_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S1793536909000047","volume":"1","author":"Z Wu","year":"2009","unstructured":"Wu, Z., Huang, N.E.: Ensemble empirical mode decomposition: a noise-assisted data analysis method. Adv. Adapt. Data Anal. 1(01), 1\u201341 (2009)","journal-title":"Adv. Adapt. Data Anal."},{"issue":"2","key":"30_CR31","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/LSP.2003.821662","volume":"11","author":"P Flandrin","year":"2004","unstructured":"Flandrin, P., Rilling, G., Goncalves, P.: Empirical mode decomposition as a filter bank. IEEE Sign. Process. Lett. 11(2), 112\u2013114 (2004)","journal-title":"IEEE Sign. Process. Lett."},{"key":"30_CR32","doi-asserted-by":"crossref","unstructured":"Wu, Z., Huang, N.E.: A study of the characteristics of white noise using the empirical mode decomposition method. In: Proceedings of the Royal Society of London, pp. 1597\u20131611 (2004)","DOI":"10.1098\/rspa.2003.1221"},{"key":"30_CR33","doi-asserted-by":"crossref","unstructured":"Flandrin, P., Gon\u00e7alves, P., Rilling, G.: EMD equivalent filter banks, from interpretation to applications. In: Hilbert-Huang Transform and its Applications, pp. 57\u201374 (2005)","DOI":"10.1142\/9789812703347_0003"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile Networks and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-32443-7_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,27]],"date-time":"2023-05-27T20:37:33Z","timestamp":1685219853000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-32443-7_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031324420","9783031324437"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-32443-7_30","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"28 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MONAMI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile Networks and Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"monami2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mon-ami.eai-conferences.org\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confyplus.eai.eu","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"78","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}