{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:48:43Z","timestamp":1743054523521,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031649479"},{"type":"electronic","value":"9783031649486"}],"license":[{"start":{"date-parts":[[2024,10,13]],"date-time":"2024-10-13T00:00:00Z","timestamp":1728777600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,13]],"date-time":"2024-10-13T00:00:00Z","timestamp":1728777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-64948-6_2","type":"book-chapter","created":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T09:02:09Z","timestamp":1728723729000},"page":"23-40","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CUFT: Cuflow-Based Approach with\u00a0Multi-headed Attention Mechanism for\u00a0Encrypted Traffic Classification"],"prefix":"10.1007","author":[{"given":"Xin","family":"Zong","sequence":"first","affiliation":[]},{"given":"Min","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Cong","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,13]]},"reference":[{"issue":"1","key":"2_CR1","first-page":"14","volume":"39","author":"Y Wang","year":"2018","unstructured":"Wang, Y., Zhou, H., Feng, H., Ye, M., Ke, W.: Network traffic classification method basing on CNN. J. commun. 39(1), 14\u201323 (2018)","journal-title":"J. commun."},{"issue":"3","key":"2_CR2","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1109\/TDSC.2018.2804394","volume":"17","author":"A Montieri","year":"2018","unstructured":"Montieri, A., Ciuonzo, D., Aceto, G., Pescap\u00e9, A.: Anonymity services Tor, I2P, JonDonym: classifying in the dark (web). IEEE Trans. Dependable Secure Comput. 17(3), 662\u2013675 (2018)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"5","key":"2_CR3","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MCOM.2019.1800819","volume":"57","author":"S Rezaei","year":"2019","unstructured":"Rezaei, S., Liu, X.: Deep learning for encrypted traffic classification: an overview. IEEE Commun. Mag. 57(5), 76\u201381 (2019)","journal-title":"IEEE Commun. Mag."},{"key":"2_CR4","first-page":"1","volume":"2021","author":"X Hu","year":"2021","unstructured":"Hu, X., Gu, C., Wei, F.: CLD-Net: a network combining CNN and LSTM for internet encrypted traffic classification. Secur. Commun. Netw. 2021, 1\u201315 (2021)","journal-title":"Secur. Commun. Netw."},{"doi-asserted-by":"crossref","unstructured":"Wang, W., Zhu, M., Wang, J., Zeng, X., Yang, Z.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 43\u201348. IEEE (2017)","key":"2_CR5","DOI":"10.1109\/ISI.2017.8004872"},{"doi-asserted-by":"crossref","unstructured":"Wang, W., Zhu, M., Zeng, X., Ye, X., Sheng, Y.: Malware traffic classification using convolutional neural network for representation learning. In: 2017 International Conference on Information Networking (ICOIN), pp. 712\u2013717. IEEE (2017)","key":"2_CR6","DOI":"10.1109\/ICOIN.2017.7899588"},{"doi-asserted-by":"crossref","unstructured":"Zou, Z., Ge, J., Zheng, H., Wu, Y., Han, C., Yao, Z.: Encrypted traffic classification with a convolutional long short-term memory neural network. In: 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), pp. 329\u2013334. IEEE (2018)","key":"2_CR7","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2018.00074"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"108472","DOI":"10.1016\/j.comnet.2021.108472","volume":"199","author":"J Cheng","year":"2021","unstructured":"Cheng, J., et al.: MATEC: a lightweight neural network for online encrypted traffic classification. Comput. Netw. 199, 108472 (2021)","journal-title":"Comput. Netw."},{"doi-asserted-by":"crossref","unstructured":"Shapira, T., Shavitt, Y.: FlowPic: encrypted internet traffic classification is as easy as image recognition. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 680\u2013687. IEEE (2019)","key":"2_CR9","DOI":"10.1109\/INFCOMW.2019.8845315"},{"issue":"8","key":"2_CR10","doi-asserted-by":"publisher","first-page":"1707","DOI":"10.1109\/LWC.2021.3077946","volume":"10","author":"R Zhao","year":"2021","unstructured":"Zhao, R., et al.: An efficient intrusion detection method based on dynamic autoencoder. IEEE Wirel. Commun. Lett. 10(8), 1707\u20131711 (2021)","journal-title":"IEEE Wirel. Commun. Lett."},{"unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, vol. 30 (2017)","key":"2_CR11"},{"doi-asserted-by":"crossref","unstructured":"Lotfollahi, M., Jafari\u00a0Siavoshani, M., Shirali Hossein\u00a0Zade, R., Saberian, M.: Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput. 24(3), 1999\u20132012 (2020)","key":"2_CR12","DOI":"10.1007\/s00500-019-04030-2"},{"doi-asserted-by":"crossref","unstructured":"Al-Naami, K., et al.: Adaptive encrypted traffic fingerprinting with bi-directional dependence. In: Proceedings of the 32nd Annual Conference on Computer Security Applications, pp. 177\u2013188 (2016)","key":"2_CR13","DOI":"10.1145\/2991079.2991123"},{"doi-asserted-by":"crossref","unstructured":"Anderson, B., McGrew, D.: Machine learning for encrypted malware traffic classification: accounting for noisy labels and non-stationarity. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1723\u20131732 (2017)","key":"2_CR14","DOI":"10.1145\/3097983.3098163"},{"issue":"5","key":"2_CR15","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1163593.1163596","volume":"36","author":"N Williams","year":"2006","unstructured":"Williams, N., Zander, S., Armitage, G.: A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification. ACM SIGCOMM Comput. Commun. Rev. 36(5), 5\u201316 (2006)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"2_CR16","doi-asserted-by":"publisher","first-page":"2367","DOI":"10.1109\/TIFS.2021.3050608","volume":"16","author":"M Shen","year":"2021","unstructured":"Shen, M., Zhang, J., Zhu, L., Xu, K., Du, X.: Accurate decentralized application identification via encrypted traffic analysis using graph neural networks. IEEE Trans. Inf. Forensics Secur. 16, 2367\u20132380 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Zhao, R., et al.: A novel traffic classifier with attention mechanism for industrial internet of things. IEEE Trans. Industr. Inform. (2023)","key":"2_CR17","DOI":"10.1109\/TII.2023.3241689"},{"key":"2_CR18","doi-asserted-by":"publisher","first-page":"107974","DOI":"10.1016\/j.comnet.2021.107974","volume":"190","author":"K Lin","year":"2021","unstructured":"Lin, K., Xu, X., Gao, H.: TSCRNN: a novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of iiot. Comput. Netw. 190, 107974 (2021)","journal-title":"Comput. Netw."},{"doi-asserted-by":"crossref","unstructured":"Lin, X., Xiong, G., Gou, G., Li, Z., Shi, J., Yu, J.: ET-BERT: a contextualized datagram representation with pre-training transformers for encrypted traffic classification. In: Proceedings of the ACM Web Conference 2022, pp. 633\u2013642 (2022)","key":"2_CR19","DOI":"10.1145\/3485447.3512217"},{"doi-asserted-by":"crossref","unstructured":"Lashkari, A.H., Draper-Gil, G., Mamun, M.S.I., Ghorbani, A.A., et\u00a0al.: Characterization of tor traffic using time based features. In: ICISSp, pp. 253\u2013262 (2017)","key":"2_CR20","DOI":"10.5220\/0005740704070414"},{"doi-asserted-by":"crossref","unstructured":"Draper-Gil, G., Lashkari, A.H., Mamun, M.S.I., Ghorbani, A.A.: Characterization of encrypted and VPN traffic using time-related. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP), pp. 407\u2013414 (2016)","key":"2_CR21","DOI":"10.5220\/0005740704070414"},{"key":"2_CR22","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.knosys.2016.10.031","volume":"116","author":"C Liu","year":"2017","unstructured":"Liu, C., Wang, W., Wang, M., Lv, F., Konan, M.: An efficient instance selection algorithm to reconstruct training set for support vector machine. Knowl.-Based Syst. 116, 58\u201373 (2017)","journal-title":"Knowl.-Based Syst."},{"doi-asserted-by":"crossref","unstructured":"Taylor, V.F., Spolaor, R., Conti, M., Martinovic, I.: AppScanner: automatic fingerprinting of smartphone apps from encrypted network traffic. In: 2016 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 439\u2013454. IEEE (2016)","key":"2_CR23","DOI":"10.1109\/EuroSP.2016.40"},{"doi-asserted-by":"crossref","unstructured":"Van\u00a0Ede, T., et al.: FlowPrint: semi-supervised mobile-app fingerprinting on encrypted network traffic. In: Network and Distributed System Security Symposium (NDSS), vol.\u00a027 (2020)","key":"2_CR24","DOI":"10.14722\/ndss.2020.24412"},{"doi-asserted-by":"crossref","unstructured":"Sirinam, P., Imani, M., Juarez, M., Wright, M.: Deep fingerprinting: undermining website fingerprinting defenses with deep learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1928\u20131943 (2018)","key":"2_CR25","DOI":"10.1145\/3243734.3243768"},{"doi-asserted-by":"crossref","unstructured":"Hu, X., Zhao, Y.: Block ciphers classification based on random forest. In: Journal of Physics: Conference Series, vol.\u00a01168, p. 032015. IOP Publishing (2019)","key":"2_CR26","DOI":"10.1088\/1742-6596\/1168\/3\/032015"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-64948-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,29]],"date-time":"2024-11-29T15:00:37Z","timestamp":1732892437000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-64948-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,13]]},"ISBN":["9783031649479","9783031649486"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-64948-6_2","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2024,10,13]]},"assertion":[{"value":"13 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hong Kong","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"180","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}