{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T11:40:04Z","timestamp":1745322004398,"version":"3.40.4"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031710247"},{"type":"electronic","value":"9783031710254"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-71025-4_7","type":"book-chapter","created":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T07:45:15Z","timestamp":1736149515000},"page":"119-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["User Behavior Forensics on Encrypted Traffic in the Industrial Internet of Things"],"prefix":"10.1007","author":[{"given":"Zhishen","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Gaopeng","family":"Gou","sequence":"additional","affiliation":[]},{"given":"Chonghua","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,7]]},"reference":[{"key":"7_CR1","unstructured":"6sense, Siemens MindSphere, San Francisco, California (6sense.com\/tech\/iot-platform\/siemens-mindsphere-market-share), 2024."},{"key":"7_CR2","unstructured":"Gartner, Global Industrial IoT Platforms: Reviews and Ratings, Stamford, Connecticut (www.gartner.com\/reviews\/market\/global-industrial-iot-platforms), 2024."},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"A. Lashkari, A. Kadir, L. Taheri and A. Ghorbani, Toward developing a systematic approach to generate benchmark Android malware datasets and classification, Proceedings of the International Carnahan Conference on Security Technology, 2018.","DOI":"10.1109\/CCST.2018.8585560"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"C. Liu, L. He, G. Xiong, Z. Cao and Z. Li, FS-Net: A flow sequence network for encrypted traffic classification, Proceedings of the IEEE Conference on Computer Communications, pp. 1171\u20131179, 2019.","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"A. Panchenko, F. Lanze, A. Zinnen, M. Henze, J. Pennekamp, K. Wehrle and T. Engel, Website fingerprinting at Internet scale, Proceedings of the Twenty-Third Annual Network and Distributed System Security Symposium, 2016.","DOI":"10.14722\/ndss.2016.23477"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"P. Patel, M. Ali and A. Sheth, From raw data to smart manufacturing: AI and Semantic Web of Things for Industry 4.0, IEEE Intelligent Systems, vol. 33(4), pp. 79\u201386, 2018.","DOI":"10.1109\/MIS.2018.043741325"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"T. Pham, T. Ho, T. Truong-Huu, T. Cao and H. Truong, MAppGraph: Mobile-app classification of encrypted network traffic using deep graph convolution neural networks, Proceedings of the Thirty-Seventh Annual Computer Security Applications Conference, pp. 1025\u20131038, 2021.","DOI":"10.1145\/3485832.3485925"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"A. Sadeghi, C. Wachsmann and M. Waidner, Security and privacy challenges in the Industrial Internet of Things, Proceedings of the Fifty-Second Annual Design Automation Conference, 2015.","DOI":"10.1145\/2744769.2747942"},{"key":"7_CR9","unstructured":"U. Sendler, The Internet of Things: Industrie 4.0 Unleashed, Springer-Verlag, Berlin Heidelberg, Germany, 2018."},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"P. Sirinam, M. Imani, M. Juarez and M. Wright, Deep fingerprinting: Undermining website fingerprinting defenses with deep learning, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1928\u20131943, 2018.","DOI":"10.1145\/3243734.3243768"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"E. Sisinni, A. Saifullah, S. Han, U. Jennehag and M. Gidlund, Industrial Internet of Things: Challenges, opportunities and directions, IEEE Transactions on Industrial Informatics, vol. 14(11), pp. 4724\u20134734, 2018.","DOI":"10.1109\/TII.2018.2852491"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"M. Stoyanova, Y. Nikoloudakis, S. Panagiotakis, E. Pallis and E. Markakis, A survey of Internet of Things (IoT) forensics: Challenges, approaches and open issues, IEEE Communications Surveys and Tutorials, vol. 22(2), pp. 1191\u20131221, 2020.","DOI":"10.1109\/COMST.2019.2962586"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"D. Sun, J. Hu, H. Wu, J. Wu, J. Yang, Q. Sheng and S. Dustdar, A comprehensive survey of collaborative data-access enablers in the IIoT, ACM Computing Surveys, vol. 56(2), article no. 50, 2023.","DOI":"10.1145\/3612918"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"V. Taylor, R. Spolaor, M. Conti and I. Martinovic, AppScanner: Automatic fingerprinting of smartphone apps from encrypted network traffic, Proceedings of the IEEE European Symposium on Security and Privacy, pp. 439\u2013454, 2016.","DOI":"10.1109\/EuroSP.2016.40"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"T. van Ede, R. Bortolameotti, A. Continella, J. Ren, D. Dubois, M. Lindorfer, D. Choffnes, M. van Steen and A. Peter, FlowPrint: Semi-supervised mobile-app fingerprinting on encrypted network traffic, Proceedings of the Twenty-Seventh Annual Network and Distributed System Security Symposium, 2020.","DOI":"10.14722\/ndss.2020.24412"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"H. Xu, S. Li, Z. Cheng, R. Qin, J. Xie and P. Sun, TrafficGCN: Mobile application encrypted traffic classification based on GCN, Proceedings of the IEEE Global Communications Conference, pp. 891\u2013896, 2022.","DOI":"10.1109\/GLOBECOM48099.2022.10000658"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"M. Zhang, Z. Cui, M. Neumann and Y. Chen, An end-to-end deep learning architecture for graph classification, Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, Thirtieth Innovative Applications of Artificial Intelligence Conference and Eighth AAAI Symposium on Educational Advances in Artificial Intelligence, article no. 544, pp. 4438\u20134445, 2018.","DOI":"10.1609\/aaai.v32i1.11782"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Z. Zhu, J. Shi, C. Wang, G. Xiong, Z. Hao and G. Gou, MCFM: Discovering sensitive behavior from encrypted traffic in industrial control systems, Proceedings of the IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 897\u2013904, 2022.","DOI":"10.1109\/TrustCom56396.2022.00124"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics XX"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-71025-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T11:15:12Z","timestamp":1745320512000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-71025-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031710247","9783031710254"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-71025-4_7","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"7 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DigitalForensics","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Digital Forensics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Delhi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 January 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 January 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"digitalforensics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ifip119.org\/Conferences\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}