{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:36:56Z","timestamp":1775054216023,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642203046","type":"print"},{"value":"9783642203053","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20305-3_14","type":"book-chapter","created":{"date-parts":[[2011,4,5]],"date-time":"2011-04-05T02:55:14Z","timestamp":1301972114000},"page":"164-171","source":"Crossref","is-referenced-by-count":29,"title":["Entropy Estimation for Real-Time Encrypted Traffic Identification (Short Paper)"],"prefix":"10.1007","author":[{"given":"Peter","family":"Dorfinger","sequence":"first","affiliation":[]},{"given":"Georg","family":"Panholzer","sequence":"additional","affiliation":[]},{"given":"Wolfgang","family":"John","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"14_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2007.48","volume":"5","author":"R. Lyda","year":"2007","unstructured":"Lyda, R., Hamrock, J.: Using entropy analysis to find encrypted and packed malware. IEEE Security & Privacy\u00a05(2), 40\u201345 (2007)","journal-title":"IEEE Security & Privacy"},{"key":"14_CR2","unstructured":"Olivain, J., Goubault-Larrecq, J.: Detecting subverted cryptographic protocols by entropy checking. Research Report LSV-06-13, Laboratoire Sp\u00e9cification et V\u00e9rification, ENS Cachan (2006)"},{"issue":"2","key":"14_CR3","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1109\/LCOMM.2007.061068","volume":"11","author":"A. Pescape","year":"2007","unstructured":"Pescape, A.: Entropy-based reduction of traffic data. IEEE Communications Letters\u00a011(2), 191\u2013193 (2007)","journal-title":"IEEE Communications Letters"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Dorfinger, P., Panholzer, G., Trammell, B., Pepe, T.: Entropy-based traffic filtering to support real-time Skype detection. In: IWCMC, Caen, France, pp. 747\u2013751 (2010)","DOI":"10.1145\/1815396.1815568"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C.E. Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell System Technical Journal\u00a027, 379\u2013423, 625\u2013656 (1948)","journal-title":"Bell System Technical Journal"},{"issue":"27","key":"14_CR6","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1088\/0305-4470\/37\/27\/L02","volume":"37","author":"T. Sch\u00fcrmann","year":"2004","unstructured":"Sch\u00fcrmann, T.: Bias analysis in entropy estimation. Journal of Physics A: Mathematical and General\u00a037(27), L295\u2013L301 (2004)","journal-title":"Journal of Physics A: Mathematical and General"},{"issue":"10","key":"14_CR7","doi-asserted-by":"publisher","first-page":"4750","DOI":"10.1109\/TIT.2008.928987","volume":"54","author":"L. Paninski","year":"2008","unstructured":"Paninski, L.: A coincidence-based test for uniformity given very sparsely sampled discrete data. IEEE Transactions on Information Theory\u00a054(10), 4750\u20134755 (2008)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"6","key":"14_CR8","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1162\/089976603321780272","volume":"15","author":"L. Paninski","year":"2003","unstructured":"Paninski, L.: Estimation of entropy and mutual information. Neural Computation\u00a015(6), 1191\u20131253 (2003)","journal-title":"Neural Computation"},{"key":"14_CR9","unstructured":"Dorfinger, P.: Real-Time Detection of Encrypted Traffic based on Entropy Estimation. Master\u2019s thesis, Salzburg University of Applied Sciences, Austria (2010)"},{"key":"14_CR10","unstructured":"Hjelmvik, E., John, W.: Breaking and improving protocol obfuscation. Tech. Rep. 2010-05, Computer Science and Engineering, Chalmers University of Technology (2010), \n                    \n                      http:\/\/www.iis.se\/docs\/hjelmvik_breaking.pdf\n                    \n                    \n                   (28.01.2011)"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-642-04190-7_16","volume-title":"Smart Spaces and Next Generation Wired\/Wireless Networking","author":"D. Adami","year":"2009","unstructured":"Adami, D., Callegari, C., Giordano, S., Pagano, M., Pepe, T.: A Real-Time Algorithm for Skype Traffic Detection and Classification. In: Balandin, S., Moltchanov, D., Koucheryavy, Y. (eds.) ruSMART 2009. LNCS, vol.\u00a05764, pp. 168\u2013179. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Traffic Monitoring and Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20305-3_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T14:23:12Z","timestamp":1558534992000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20305-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642203046","9783642203053"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20305-3_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}