{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T12:01:05Z","timestamp":1759147265472},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642009747"},{"type":"electronic","value":"9783642009754"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00975-4_16","type":"book-chapter","created":{"date-parts":[[2009,3,30]],"date-time":"2009-03-30T12:19:52Z","timestamp":1238415592000},"page":"155-164","source":"Crossref","is-referenced-by-count":10,"title":["PBS: Periodic Behavioral Spectrum of P2P Applications"],"prefix":"10.1007","author":[{"given":"Tom Z. J.","family":"Fu","sequence":"first","affiliation":[]},{"given":"Yan","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Xingang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Dah Ming","family":"Chiu","sequence":"additional","affiliation":[]},{"given":"John C. S.","family":"Lui","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"NetFlow, http:\/\/www.cisco.com\/web\/go\/netflow"},{"key":"16_CR2","unstructured":"Wireshark, http:\/\/www.wireshark.org\/"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Banerjee, S., Bhattacharjee, B., Kommareddy, C.: Scalable application layer multicast. In: Proc.\u00a0ACM SIGCOMM 2002 (August 2002)","DOI":"10.1145\/633025.633045"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Chu, Y., Rao, S.G., Zhang, H.: A case for end system multicast. In: Proc.\u00a0ACM Sigmetrics 2000 (2000)","DOI":"10.1145\/339331.339337"},{"key":"16_CR5","unstructured":"Cohen, B.: Incentives build robustness in bittorrent (May 2003), http:\/\/bitconjurer.org\/BitTorrent\/bittorrentecon.pdf"},{"key":"16_CR6","unstructured":"Francis, P.: Yoid: Extending the multicast internet architecture. White paper (1999)"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Huang, Y., Fu, T.Z.J., Chiu, D.M., Lui, J.C.S., Huang, C.: Challenges, design and analysis of a large-scale p2p-vod system. In: Proc.\u00a0ACM SIGCOMM 2008 (2008)","DOI":"10.1145\/1402958.1403001"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Broido, A., Faloutsos, M., Claffy, K.: Transport layer identification of p2p traffic. In: Proc.\u00a0IMC 2004 (2004)","DOI":"10.1145\/1028788.1028804"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Papagiannaki, K., Faloutsos, M.: Blinc: Multilevel traffic classification in the dark. In: Proc.\u00a0ACM SIGCOMM 2005 (2005)","DOI":"10.1145\/1080091.1080119"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Legout, A., Liogkas, N., Kohler, E.: Clustering and sharing incentives in bittorrent systems. In: Proc.\u00a0ACM Sigmetrics 2007 (June 2007)","DOI":"10.1145\/1254882.1254919"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Moore, A.W., Zuev, D.: Internet traffic classification using bayesian analysis techniques. In: Proc.\u00a0ACM Sigmetrics 2005 (2005)","DOI":"10.1145\/1064212.1064220"},{"key":"16_CR12","unstructured":"Moore, A.W., Zuev, D., Crogan, M.: Discriminators for use in flow-based classification. Technical report, Intel Research, Cambridge (2005)"},{"key":"16_CR13","volume-title":"Discrete-time signal processing","author":"A.V. Oppenheim","year":"1999","unstructured":"Oppenheim, A.V., Schafer, R.W., Buck, J.R.: Discrete-time signal processing, 2nd edn. Prentice-Hall, Englewood Cliffs (1999)","edition":"2"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Sen, S., Spatscheck, O., Wang, D.: Accurate, scalable in-network identification of p2p traffic. In: Proc.\u00a0WWW 2004 (2004)","DOI":"10.1145\/988672.988742"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Network Measurement"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00975-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T04:25:11Z","timestamp":1558239911000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00975-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642009747","9783642009754"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00975-4_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}