{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T19:10:05Z","timestamp":1751569805067,"version":"3.41.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031877711"},{"type":"electronic","value":"9783031877728"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87772-8_11","type":"book-chapter","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T07:36:09Z","timestamp":1745307369000},"page":"127-137","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Traffic Classification Method of Power Information Communication Network Based on Multi-mode Competitive Feature Selection"],"prefix":"10.1007","author":[{"given":"Shanyi","family":"Xie","sequence":"first","affiliation":[]},{"given":"Congcong","family":"Zhan","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Zuo","sequence":"additional","affiliation":[]},{"given":"Xingwang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Caiyan","family":"Nong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,23]]},"reference":[{"issue":"8","key":"11_CR1","doi-asserted-by":"publisher","first-page":"1315","DOI":"10.1109\/LCOMM.2015.2441722","volume":"19","author":"X Huang","year":"2015","unstructured":"Huang, X., Wang, S.: Aggregation points planning in smart grid communication system. IEEE Commun. Lett. 19(8), 1315\u20131318 (2015)","journal-title":"IEEE Commun. Lett."},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Meng, F., Zhao, H., Yu, B., et al.: An optimized power terminal communication access network planning based on hierarchical genetic algorithm. In: 2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN), pp. 431\u2013435. IEEE (2017)","DOI":"10.1109\/ICCSN.2017.8230150"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Tang, Y., Chen, Q., Li, M., Wang, Q., Ni, M., Fu, X.Y.: Challenge and evolution of cyber attacks in cyber physical power system. In: Proceedings of the IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC) Xi\u2019an, China, pp. 857\u2013862 (2016)","DOI":"10.1109\/APPEEC.2016.7779616"},{"issue":"1","key":"11_CR4","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2202\/1\/012042","volume":"2202","author":"L Qi","year":"2022","unstructured":"Qi, L., Zhao, C., Yu, G., et al.: Application of network security situational awareness in power information system security. J. Phys. Conf. Ser. 2202(1), 012042 (2022)","journal-title":"J. Phys. Conf. Ser."},{"issue":"2","key":"11_CR5","doi-asserted-by":"publisher","first-page":"2883","DOI":"10.1109\/JSYST.2020.3026997","volume":"15","author":"Y Wu","year":"2020","unstructured":"Wu, Y., Chen, J., Ru, Y., et al.: Research on power communication network planning based on information transmission reachability against cyber-attacks. IEEE Syst. J. 15(2), 2883\u20132894 (2020)","journal-title":"IEEE Syst. J."},{"issue":"1","key":"11_CR6","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2146\/1\/012011","volume":"2146","author":"K Yun","year":"2022","unstructured":"Yun, K., Li, H., Chen, J.: Design and implementation of power network security protection system based on internet of things. J. Phys. Conf. Ser. 2146(1), 012011 (2022)","journal-title":"J. Phys. Conf. Ser."},{"key":"11_CR7","doi-asserted-by":"publisher","unstructured":"Barakaz, F.E., Boutkhoum, O., Moutaouakkil, A.E.: Feature selection method based on classification performance score and P-value. In: International Conference on Advanced Intelligent Systems for Sustainable Development, pp. 379\u2013386. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-90639-9_30","DOI":"10.1007\/978-3-030-90639-9_30"},{"key":"11_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.chemolab.2021.104396","volume":"217","author":"N Singh","year":"2021","unstructured":"Singh, N., Singh, P.: A hybrid ensemble-filter wrapper feature selection approach for medical data classification. Chemom. Intell. Lab. Syst. 217, 104396 (2021)","journal-title":"Chemom. Intell. Lab. Syst."},{"issue":"7","key":"11_CR9","doi-asserted-by":"publisher","first-page":"314","DOI":"10.3390\/info13070314","volume":"13","author":"Y Zhang","year":"2022","unstructured":"Zhang, Y., Zhang, H., Zhang, B.: An effective ensemble automatic feature selection method for network intrusion detection. Information 13(7), 314 (2022)","journal-title":"Information"},{"key":"11_CR10","unstructured":"Guo, H., Heidemann, J.: Detecting IoT devices in the internet (extended), USC\/ISI Technical Report ISI-TR-726 July, 2018 (2018)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Sivanathan, A., et al.: Characterizing and classifying IoT traffic in smart cities and campuses. In: 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 559\u2013564. IEEE (2017)","DOI":"10.1109\/INFCOMW.2017.8116438"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Bai, L., Yao, L., Kanhere, S.S., et al.: Automatic device classification from network traffic streams of internet of things. In: 2018 IEEE 43rd Conference on Local Computer Networks (LCN), pp. 1\u20139. IEEE (2018)","DOI":"10.1109\/LCN.2018.8638232"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Ortiz, J., Crawford, C., Le, F.: DeviceMien: network device behavior modeling for identifying unknown IoT devices. In: Proceedings of the International Conference on Internet of Things Design and Implementation, pp. 106\u2013117 (2019)","DOI":"10.1145\/3302505.3310073"},{"issue":"2017","key":"11_CR14","doi-asserted-by":"publisher","first-page":"18042","DOI":"10.1109\/ACCESS.2017.2747560","volume":"5","author":"M Lopez-Martin","year":"2017","unstructured":"Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A., Lloret, J.: NetworkTraffic classifier with convolutional and recurrent neural networks for internet of things. IEEE Access 5(2017), 18042\u201318050 (2017). https:\/\/doi.org\/10.1109\/ACCESS.2017.2747560","journal-title":"IEEE Access"},{"issue":"2","key":"11_CR15","first-page":"1","volume":"30","author":"S Izadi","year":"2022","unstructured":"Izadi, S., Ahmadi, M., Rajabzadeh, A.: Network traffic classification using deep learning networks and Bayesian data fusion. J. Netw. Syst. Manage.Netw. Syst. Manage. 30(2), 1\u201321 (2022)","journal-title":"J. Netw. Syst. Manage.Netw. Syst. Manage."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87772-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T18:37:43Z","timestamp":1751567863000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87772-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877711","9783031877728"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87772-8_11","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"23 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}