{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:17:36Z","timestamp":1725679056227},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642304217"},{"type":"electronic","value":"9783642304224"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30422-4_1","type":"book-chapter","created":{"date-parts":[[2012,5,9]],"date-time":"2012-05-09T01:01:33Z","timestamp":1336525293000},"page":"3-16","source":"Crossref","is-referenced-by-count":2,"title":["Classification of Hidden Users\u2019 Profiles in Wireless Communications"],"prefix":"10.1007","author":[{"given":"Eduardo","family":"Rocha","sequence":"first","affiliation":[]},{"given":"Paulo","family":"Salvador","sequence":"additional","affiliation":[]},{"given":"Ant\u00f3nio","family":"Nogueira","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Cisco ios intrusion prevention system (ips) - products and services (March 2011), http:\/\/www.cisco.com\/en\/US\/products\/ps6634\/index.html"},{"key":"1_CR2","unstructured":"Snort: Home page (March 2011), http:\/\/www.snort.org\/"},{"issue":"4","key":"1_CR3","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1017\/S0269888906000397","volume":"20","author":"D. Godoy","year":"2005","unstructured":"Godoy, D., Amandi, A.: User profiling in personal information agents: a survey. Knowledge Engineering Review\u00a020(4), 329\u2013361 (2005)","journal-title":"Knowledge Engineering Review"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Hu, Y., Chiu, D.M., Lui, J.: Application identification based on network behavioral profiles. In: 16th International Workshop on Quality of Service, IWQoS 2008, pp. 219\u2013228 (2008)","DOI":"10.1109\/IWQOS.2008.31"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Huang, N.F., Jai, G.Y., Chao, H.C.: Early identifying application traffic with application characteristics. In: IEEE International Conference on Communications, ICC 2008, pp. 5788\u20135792 (May 2008)","DOI":"10.1109\/ICC.2008.1083"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Iglesias, J.A., Angelov, P., Ledezma, A., Sanchis, A.: Creating evolving user behavior profiles automatically. IEEE Transactions on Knowledge and Data Engineering\u00a099 (2011) (preprints)","DOI":"10.1109\/TKDE.2011.17"},{"key":"1_CR7","unstructured":"Madhukar, A., Williamson, C.: A longitudinal study of p2p traffic classification. In: 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, MASCOTS 2006, pp. 179\u2013188 (September 2006)"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-540-31966-5_4","volume-title":"Passive and Active Network Measurement","author":"A.W. Moore","year":"2005","unstructured":"Moore, A.W., Papagiannaki, K.: Toward the Accurate Identification of Network Applications. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol.\u00a03431, pp. 41\u201354. Springer, Heidelberg (2005)"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Moore, A.W., Zuev, D.: Internet traffic classification using bayesian analysis techniques. In: ACM SIGMETRICS, pp. 50\u201360 (2005)","DOI":"10.1145\/1071690.1064220"},{"issue":"4","key":"1_CR10","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"T. Nguyen","year":"2008","unstructured":"Nguyen, T., Armitage, G.: A survey of techniques for internet traffic classification using machine learning. IEEE Communications Surveys Tutorials\u00a010(4), 56\u201376 (2008)","journal-title":"IEEE Communications Surveys Tutorials"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Rocha, E., Salvador, P., Nogueira, A.: Detection of Illicit Network Activities based on Multivariate Gaussian Fitting of Multi-Scale Traffic Characteristics. In: IEEE International Conference on Communications, ICC 2011 (June 2011)","DOI":"10.1109\/icc.2011.5962651"},{"issue":"2","key":"1_CR12","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/S0022-460X(02)01032-5","volume":"262","author":"J. Slavic","year":"2003","unstructured":"Slavic, J., Simonovski, I., Boltezar, M.: Damping identification using a continuous wavelet transform: application to real data. Journal of Sound and Vibration\u00a0262(2), 291\u2013307 (2003)","journal-title":"Journal of Sound and Vibration"},{"key":"1_CR13","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/CNSR.2009.22","volume-title":"Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference","author":"M. Tavallaee","year":"2009","unstructured":"Tavallaee, M., Lu, W., Ghorbani, A.A.: Online classification of network flows. In: Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference, pp. 78\u201385. IEEE Computer Society, Washington, DC (2009)"},{"issue":"2","key":"1_CR14","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1109\/TNET.2009.2031175","volume":"18","author":"I. Trestian","year":"2010","unstructured":"Trestian, I., Ranjan, S., Kuzmanovic, A., Nucci, A.: Googling the internet: Profiling internet endpoints via the world wide web. IEEE\/ACM Transactions on Networking\u00a018(2), 666\u2013679 (2010)","journal-title":"IEEE\/ACM Transactions on Networking"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile Networks and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30422-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,15]],"date-time":"2022-01-15T01:17:21Z","timestamp":1642209441000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30422-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642304217","9783642304224"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30422-4_1","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}