{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:06:19Z","timestamp":1725541579581},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108464"},{"type":"electronic","value":"9783642108471"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10847-1_33","type":"book-chapter","created":{"date-parts":[[2009,11,27]],"date-time":"2009-11-27T22:33:01Z","timestamp":1259361181000},"page":"265-272","source":"Crossref","is-referenced-by-count":1,"title":["Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection"],"prefix":"10.1007","author":[{"given":"David A.","family":"Carvalho","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Manuela","family":"Pereira","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M\u00e1rio M.","family":"Freire","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"33_CR1","unstructured":"PeerApp: Comparing P2P Solutions (2007), \n                  \n                    http:\/\/www.peerapp.com\/docs\/ComparingP2P.pdf"},{"key":"33_CR2","first-page":"179","volume-title":"14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems ( MASCOTS 2006)","author":"A. Madhukar","year":"2006","unstructured":"Madhukar, A., Williamson, C.: A Longitudinal Study of P2P Traffic Classification. In: 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems ( MASCOTS 2006), pp. 179\u2013188. IEEE Press, New York (2006)"},{"key":"33_CR3","first-page":"2013","volume-title":"9th International Conference on Signal Processing (ICSP 2008)","author":"Z. Guo","year":"2008","unstructured":"Guo, Z., Qiu, Z.: Identification Peer-to-Peer Traffic for High Speed Networks Using Packet Sampling and Application Signatures. In: 9th International Conference on Signal Processing (ICSP 2008), pp. 2013\u20132019. IEEE Press, New York (2008)"},{"key":"33_CR4","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1109\/NAS.2007.6","volume-title":"International Conference on Networking, Architecture, and Storage (NAS 2007)","author":"H. Liu","year":"2007","unstructured":"Liu, H., Feng, W., Huang, Y., Li, X.: A Peer-To-Peer Traffic Identification Method Using Machine Learning. In: International Conference on Networking, Architecture, and Storage (NAS 2007), pp. 155\u2013160. IEEE Press, New York (2007)"},{"key":"33_CR5","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/PCCC.2008.4745138","volume-title":"IEEE International Performance, Computing and Communications Conference (IPCCC 2008)","author":"J. Gomes","year":"2008","unstructured":"Gomes, J., Inacio, P., Freire, M., Pereira, M., Monteiro, P.: Analysis of Peer-to-Peer Traffic Using a Behavioural Method Based on Entropy. In: IEEE International Performance, Computing and Communications Conference (IPCCC 2008), pp. 201\u2013208. IEEE Press, New York (2008)"},{"key":"33_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ISCIS.2007.4456894","volume-title":"22nd International International Symposium on Computer and Information Sciences (ISCIS 2007)","author":"M. Soysal","year":"2007","unstructured":"Soysal, M., Schmidt, E.G.: An accurate evaluation of machine learning algorithms for flow-based P2P traffic detection. In: 22nd International International Symposium on Computer and Information Sciences (ISCIS 2007), pp. 1\u20136. IEEE Press, New York (2007)"},{"key":"33_CR7","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/CIMSA.2006.250766","volume-title":"IEEE International Conference on Computational Intelligence for Measurement Systems and Applications","author":"F.J. Gonzalez-Castano","year":"2006","unstructured":"Gonzalez-Castano, F.J., Rodriguez-Hernandez, P.S., Martinez-Alvarez, R.P., Gomez, A., Lopez-Cabido, I., Villasuso-Barreiro, J.: Support Vector Machine Detection of Peer-to-Peer Traffic. In: IEEE International Conference on Computational Intelligence for Measurement Systems and Applications, pp. 103\u2013108. IEEE Press, New York (2006)"},{"key":"33_CR8","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1109\/WKDD.2009.116","volume-title":"Second International Workshop on Knowledge Discovery and Data Mining (WKDD 2009)","author":"Z. Gao","year":"2009","unstructured":"Gao, Z., Lu, G., Gu, D.: A Novel P2P Traffic Identification Scheme Based on Support Vector Machine Fuzzy Network. In: Second International Workshop on Knowledge Discovery and Data Mining (WKDD 2009), pp. 909\u2013912. IEEE Press, New York (2009)"},{"key":"33_CR9","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1109\/CCECE.2008.4564629","volume-title":"Canadian Conference on Electrical and Computer Engineering (CCECE 2008)","author":"B. Raahemi","year":"2008","unstructured":"Raahemi, B., Kouznetsov, A., Hayajneh, A., Rabinovitch, P.: Classification of Peer-to-Peer traffic using incremental neural networks (Fuzzy ARTMAP). In: Canadian Conference on Electrical and Computer Engineering (CCECE 2008), pp. 719\u2013724. IEEE Press, New York (2008)"},{"key":"33_CR10","unstructured":"Snort, \n                  \n                    http:\/\/www.snort.org"},{"key":"33_CR11","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/HOT-P2P.2005.2","volume-title":"Second International Workshop on Hot Topics in Peer-to-Peer Systems (HOT-P2P 2005)","author":"A. Spognardi","year":"2005","unstructured":"Spognardi, A., Lucarelli, A., Di Pietro, R.: A Methodology for P2P File-sharing Traffic Detection. In: Second International Workshop on Hot Topics in Peer-to-Peer Systems (HOT-P2P 2005), pp. 52\u201361. IEEE Press, New York (2005)"},{"key":"33_CR12","unstructured":"Smoothwall open source project, \n                  \n                    http:\/\/www.smoothwall.org"},{"key":"33_CR13","unstructured":"Basic analysis and security engine (base), \n                  \n                    http:\/\/base.secureideas.net"},{"key":"33_CR14","unstructured":"Wireshark, \n                  \n                    http:\/\/www.wireshark.org"},{"key":"33_CR15","unstructured":"Emerging threats, \n                  \n                    http:\/\/www.emergingthreats.net\/rules\/emerging-p2p.rules"}],"container-title":["Communications in Computer and Information Science","Security Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10847-1_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T21:38:39Z","timestamp":1558388319000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10847-1_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108464","9783642108471"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10847-1_33","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}