{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:32:17Z","timestamp":1742931137902,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031459320"},{"type":"electronic","value":"9783031459337"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-45933-7_29","type":"book-chapter","created":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T09:02:37Z","timestamp":1700470957000},"page":"496-512","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Research on\u00a0Encrypted Malicious 5G Access Network Traffic Identification Based on\u00a0Deep Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3657-4706","authenticated-orcid":false,"given":"Zongning","family":"Gao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8437-5894","authenticated-orcid":false,"given":"Shunliang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"29_CR1","unstructured":"https:\/\/www.miit.gov.cn\/zwgk\/zcjd\/art\/2023\/art _9f5022af3cdf48789484117d9da03c58.html"},{"key":"29_CR2","unstructured":"Deng, W.: Network traffic classification based on deep learning. Xidian University (2020)"},{"key":"29_CR3","unstructured":"Roesch, M.: Network Intrusion Detection & Prevention System (Snort) (2017). https:\/\/www.snort.org"},{"key":"29_CR4","first-page":"156","volume":"2","author":"G He","year":"2022","unstructured":"He, G., Wei, Q., Xiao, X., et al.: Confirmation method for the detection of malicious encrypted traffic with data privacy protection. J. Commun. 2, 156\u2013170 (2022)","journal-title":"J. Commun."},{"key":"29_CR5","first-page":"935","volume":"7","author":"T Wang","year":"2022","unstructured":"Wang, T., Ding, Y.: Network malicious encryption traffic identification method based on stacking. Commun. Technol. 7, 935\u2013942 (2022)","journal-title":"Commun. Technol."},{"key":"29_CR6","first-page":"129","volume":"2","author":"H Li","year":"2021","unstructured":"Li, H., Zhang, S., Song, H., et al.: Robust malicious encrypted traffic detection based with multiple features. J. Cyber Secur. 2, 129\u2013142 (2021)","journal-title":"J. Cyber Secur."},{"key":"29_CR7","unstructured":"https:\/\/www.smallcellforum.org\/scf-market-forecast\/"},{"issue":"2","key":"29_CR8","first-page":"315","volume":"36","author":"W Lin","year":"2019","unstructured":"Lin, W., Huamin, F., Biao, L., et al.: SSL VPN encrypted traffic identification based on hybrid method. Comput. Appl. Softw. 36(2), 315\u2013322 (2019)","journal-title":"Comput. Appl. Softw."},{"issue":"5","key":"29_CR9","first-page":"1386","volume":"41","author":"S Guo","year":"2021","unstructured":"Guo, S., Su, Y.: Encrypted traffic classification method based on data stream. J. Comput. Appl. 41(5), 1386-l391 (2021)","journal-title":"J. Comput. Appl."},{"key":"29_CR10","first-page":"1","volume":"12","author":"P Kang","year":"2022","unstructured":"Kang, P., Yang, W., Ma, H.: TLS malicious encrypted traffic identification research. Comput. Eng. Appl. 12, 1\u201311 (2022)","journal-title":"Comput. Eng. Appl."},{"key":"29_CR11","doi-asserted-by":"publisher","first-page":"158261","DOI":"10.1109\/ACCESS.2021.3128181","volume":"9","author":"Y Pan","year":"2021","unstructured":"Pan, Y., Zhang, X., Jiang, H., et al.: A network traffic classification method based on graph convolution and LSTM. IEEE Access 9, 158261\u2013158272 (2021)","journal-title":"IEEE Access"},{"key":"29_CR12","first-page":"270","volume":"52","author":"J Zhao","year":"2022","unstructured":"Zhao, J., Li, Q., Liu, S., et al.: Towards traffic supervision in 6G: a graph neural network-based encrypted malicious traffic detection method. Sci. China (Inf. Sci.) 52, 270\u2013286 (2022)","journal-title":"Sci. China (Inf. Sci.)"},{"issue":"4","key":"29_CR13","first-page":"295","volume":"48","author":"Y Zhou","year":"2021","unstructured":"Zhou, Y., Liu, F., Wang, Y.: IPSec VPN encrypted traffic identification based on hybrid method. Comput. Sci. 48(4), 295\u2013302 (2021)","journal-title":"Comput. Sci."},{"key":"29_CR14","doi-asserted-by":"publisher","first-page":"74729","DOI":"10.1109\/ACCESS.2021.3081504","volume":"9","author":"C Li","year":"2021","unstructured":"Li, C., Dong, C., Niu, K., et al.: Mobile service traffic classification based on joint deep learning with attention mechanism. IEEE Access. 9, 74729\u201374738 (2021)","journal-title":"IEEE Access."},{"key":"29_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2021.100081","volume":"12","author":"I Chakraborty","year":"2021","unstructured":"Chakraborty, I., Kelley, B.M., Gallagher, B.: Industrial control system device classification using network traffic features and neural network embeddings. Array 12, 100081 (2021)","journal-title":"Array"}],"container-title":["Lecture Notes in Computer Science","Science of Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45933-7_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T09:06:59Z","timestamp":1700471219000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45933-7_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031459320","9783031459337"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45933-7_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"21 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SciSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Science of Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/scisec.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}