{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T16:40:03Z","timestamp":1750783203057,"version":"3.41.0"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319633084"},{"type":"electronic","value":"9783319633091"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-63309-1_24","type":"book-chapter","created":{"date-parts":[[2017,7,19]],"date-time":"2017-07-19T10:09:09Z","timestamp":1500458949000},"page":"260-272","source":"Crossref","is-referenced-by-count":0,"title":["P2P Traffic Identification Method Based on Traffic Statistical Characteristics"],"prefix":"10.1007","author":[{"given":"Bing","family":"Hu","sequence":"first","affiliation":[]},{"given":"Zhixin","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,20]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Horng, M.F., Chen, C.W., Chuang, C.S.: Identification and analysis of P2P traffic-an example of bittorrent. In: Proceedings of the First International Conference on Innovative Computing, Information and Control, pp. 266\u2013269, 30 August\u20131 September 2006","DOI":"10.1109\/ICICIC.2006.294"},{"key":"24_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1142\/S0218843008001750","volume":"17","author":"ZQ Chen","year":"2008","unstructured":"Chen, Z.Q., Delis, A., Wei, P.: Identification and management of sessions generated by instant messaging and Peer-to-Peer systems. Int. J. Coop. Inf. Syst. 17, 1\u201351 (2008)","journal-title":"Int. J. Coop. Inf. Syst."},{"key":"24_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12083-014-0307-x","volume":"9","author":"M Bhatia","year":"2016","unstructured":"Bhatia, M., Rai, M.K.: Identifying P2P traffic: a survey. Peer-to-Peer Netw. Appl. 9, 1\u201322 (2016)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Broido, A., Faloutsos, M.: Transport layer identification of P2P traffic. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, pp. 121\u2013134 (2004)","DOI":"10.1145\/1028788.1028804"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Papagiannaki, K., Faloutsos, M.: BLINC: multilevel traffic classification in the dark. In: Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 229\u2013240, October 2005","DOI":"10.1145\/1080091.1080119"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Constantinou, F., Mavrommatis, P.: Identifying known and unknown Peer-to-Peer traffic. In: Proceedings of the 5th IEEE International Symposium on Network Computing and Applications, pp. 93\u2013102, 24\u201326 July 2006","DOI":"10.1109\/NCA.2006.34"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Matsuda, T., Nakamura, F., Wakahara, Y.: Traffic features fit for P2P discrimination. In: Proceedings of the 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, pp. 230\u2013235, 9\u201310 November 2005","DOI":"10.1109\/APSITT.2005.203662"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Chen, Z., Wang, H., Peng, L.: A novel method of P2P hosts detection based on flexible neural tree. In: Proceedings of the of 6th International Conference on Intelligent Systems Design and Applications, pp. 556\u2013561, 16\u201318 October 2006","DOI":"10.1109\/ISDA.2006.253897"},{"key":"24_CR9","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1631\/FITEE.1400267","volume":"16","author":"J He","year":"2005","unstructured":"He, J., Yang, Y., Qiao, Y.: Fine-grained P2P traffic classification by simply counting flows. Front. Inf. Technol. Electron. Eng. 16, 391\u2013403 (2005)","journal-title":"Front. Inf. Technol. Electron. Eng."},{"key":"24_CR10","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1007\/s12083-015-0350-2","volume":"9","author":"T Qin","year":"2016","unstructured":"Qin, T., Wang, L., Zhao, D.: CUFTI: methods for core users finding and traffic identification in P2P systems. Peer-to-Peer Netw. Appl. 9, 424\u2013435 (2016)","journal-title":"Peer-to-Peer Netw. Appl."}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Theories and Application"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-63309-1_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T16:00:40Z","timestamp":1750780840000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-63309-1_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319633084","9783319633091"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-63309-1_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}