{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:15:49Z","timestamp":1761401749678,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319171715"},{"type":"electronic","value":"9783319171722"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17172-2_9","type":"book-chapter","created":{"date-parts":[[2015,4,16]],"date-time":"2015-04-16T03:04:26Z","timestamp":1429153466000},"page":"126-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["SFMap: Inferring Services over Encrypted Web Flows Using Dynamical Domain Name Graphs"],"prefix":"10.1007","author":[{"given":"Tatsuya","family":"Mori","sequence":"first","affiliation":[]},{"given":"Takeru","family":"Inoue","sequence":"additional","affiliation":[]},{"given":"Akihiro","family":"Shimoda","sequence":"additional","affiliation":[]},{"given":"Kazumichi","family":"Sato","sequence":"additional","affiliation":[]},{"given":"Keisuke","family":"Ishibashi","sequence":"additional","affiliation":[]},{"given":"Shigeki","family":"Goto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,17]]},"reference":[{"key":"9_CR1","unstructured":"Public suffix list. \n                      https:\/\/publicsuffix.org\/"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Bermudez, I.N., Mellia, M., Munafo, M.M., Keralapura, R., Nucci, A.: DNS to the rescue: discerning content and services in a tangled web. In: Proc. of IMC, pp. 413\u2013426 (2012)","DOI":"10.1145\/2398776.2398819"},{"key":"9_CR3","unstructured":"CAIDA. Internet traffic classification. \n                      http:\/\/www.caida.org\/research\/traffic-analysis\/classification-overview\/"},{"issue":"3","key":"9_CR4","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/2500098.2500100","volume":"43","author":"T Callahan","year":"2013","unstructured":"Callahan, T., Allman, M., Rabinovich, M.: On Modern DNS Behavior and Properties. SIGCOMM Comput. Commun. Rev. 43(3), 7\u201315 (2013)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Korczynski, M., Duda, A.: Markov chain fingerprinting to classify encrypted traffic. In: Proc. of INFOCOM, pp. 781\u2013789 (2014)","DOI":"10.1109\/INFOCOM.2014.6848005"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-12365-8_2","volume-title":"Traffic Monitoring and Analysis","author":"T Mori","year":"2010","unstructured":"Mori, T., Kawahara, R., Hasegawa, H., Shimogawa, S.: Characterizing traffic flows originating from large-scale video sharing services. In: Ricciato, F., Mellia, M., Biersack, E. (eds.) TMA 2010. LNCS, vol. 6003, pp. 17\u201331. Springer, Heidelberg (2010)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Naylor, D., Finamore, A., Leontiadis, I., Grunenberger, Y., Mellia, M., Munafo, M., Papagiannaki, K., Steenkiste, P.: The cost of the \u201cS\u201d in HTTP. In: Proc. of CoNext (2014)","DOI":"10.1145\/2674005.2674991"},{"key":"9_CR8","unstructured":"Plonka, D., Barford, P.: Flexible traffic and host profiling via DNS rendezvous. In: Proc. of SATIN (2011)"},{"key":"9_CR9","unstructured":"Sandvine. Global internet phenomena report: 1H 2014. \n                      http:\/\/bit.ly\/1jHpsW5"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Su, A.-J., Choffnes, D.R., Kuzmanovic, A., Bustamante, F.E.: Drafting behind akamai (travelocity-based detouring). In: Proc. of SIGCOMM, pp. 435\u2013446 (2006)","DOI":"10.1145\/1151659.1159962"}],"container-title":["Lecture Notes in Computer Science","Traffic Monitoring and Analysis"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17172-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T23:40:46Z","timestamp":1558309246000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-17172-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319171715","9783319171722"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17172-2_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 April 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}