{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T14:13:48Z","timestamp":1774016028640,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540716167","type":"print"},{"value":"9783540716174","type":"electronic"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-71617-4_17","type":"book-chapter","created":{"date-parts":[[2007,6,28]],"date-time":"2007-06-28T06:55:09Z","timestamp":1183013709000},"page":"165-175","source":"Crossref","is-referenced-by-count":122,"title":["Early Recognition of Encrypted Applications"],"prefix":"10.1007","author":[{"given":"Laurent","family":"Bernaille","sequence":"first","affiliation":[]},{"given":"Renata","family":"Teixeira","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Karagiannis, T., Broido, A., Brownlee, N., Claffy, K., Faloutsos, M.: Is p2p dying or just hiding? In: Globecom (2004)"},{"issue":"23\u201324","key":"17_CR2","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V. Paxson","year":"1999","unstructured":"Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer Networks\u00a031(23\u201324), 2435\u20132463 (1999), \n                    \n                      citeseer.ist.psu.edu\/article\/paxson98bro.html","journal-title":"Computer Networks"},{"key":"17_CR3","unstructured":"Snort: \n                    \n                      http:\/\/www.snort.org"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Ma, Levchenko, Kreibich, Savage, Voelker: Unexpected means of protocol inference. In: Internet Measurement Confererence (2006)","DOI":"10.1145\/1177080.1177123"},{"key":"17_CR5","unstructured":"Song, D.X., Wagner, D., Tian, X.: Timing analysis of keystrokes and timing attacks on ssh. In: Proc. 10th USENIX Security Symposium, Aug. 2001 (2001), \n                    \n                      http:\/\/citeseer.ist.psu.edu\/song01timing.html"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Hintz, A.: Fingerprinting websites using traffic analysis (2002)","DOI":"10.1007\/3-540-36467-6_13"},{"key":"17_CR7","unstructured":"Roughan, M., Sen, S., Spatscheck, O., Duffield, N.: A statistical signature-based approach to ip traffic classification. In: IMC (2004)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"McGregor, A., Hall, M., Lorier, P., Brunskill, J.: Flow clustering using machine learning techniques. In: Passive and Active Measurement (2004)","DOI":"10.1007\/978-3-540-24668-8_21"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Zuev, D., Moore, A.: Traffic classification using a statistical approach. In: Passive and Active Measurement (2005)","DOI":"10.1007\/978-3-540-31966-5_25"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Moore, A., Zuev, D.: Internet traffic classification using bayesian analysis. In: Sigmetrics (2005)","DOI":"10.1145\/1064212.1064220"},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1145\/1162678.1162679","volume-title":"MineNet \u201906: Proceedings of the 2006 SIGCOMM workshop on Mining network data","author":"J. Erman","year":"2006","unstructured":"Erman, J., Arlitt, M., Mahanti, A.: Traffic classification using clustering algorithms. In: MineNet \u201906: Proceedings of the 2006 SIGCOMM workshop on Mining network data, Pisa, Italy, pp. 281\u2013286. ACM Press, New York (2006), doi:10.1145\/1162678.1162679"},{"issue":"2","key":"17_CR12","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/1129582.1129589","volume":"36","author":"L. Bernaille","year":"2006","unstructured":"Bernaille, L., Teixeira, R., Akodkenou, I., Soule, A., Salamatian, K.: Traffic classification on the fly. SIGCOMM Comput. Commun. Rev.\u00a036(2), 23\u201326 (2006), doi:10.1145\/1129582.1129589","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Bernaille, L., Teixeira, R., Salamatian, K.: Early application identification. In: To appear in Conference on Future Networking Technologies (2006)","DOI":"10.1145\/1368436.1368445"},{"key":"17_CR14","unstructured":"Wright, Monrose, Masson: On inferring application protocol behaviors in encrypted network traffic. The Journal of Machine Learning Research, Special Topic on Machine Learning for Computer Security (2006)"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Papagiannaki, D., Faloutsos, M.: Blinc: Multilevel traffic classification in the dark. In: SIGCOMM (2005)","DOI":"10.1145\/1080091.1080119"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Wright, Monrose, Masson: Using visual motifs to classify encrypted traffic. In: Workshop on Visualization for Computer Security (2006)","DOI":"10.1145\/1179576.1179584"},{"key":"17_CR17","unstructured":"SSLv2: \n                    \n                      http:\/\/wp.netscape.com\/eng\/security\/SSL_2.html"},{"key":"17_CR18","unstructured":"SSLv3.0: \n                    \n                      http:\/\/wp.netscape.com\/eng\/ssl3\/draft302.txt"},{"key":"17_CR19","unstructured":"TLS: \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc2246.txt"},{"key":"17_CR20","unstructured":"Netcraft: \n                    \n                      http:\/\/www.netcraft.com"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Network Measurement"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71617-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T10:01:09Z","timestamp":1558260069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71617-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540716167","9783540716174"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71617-4_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007]]}}}