{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:25:10Z","timestamp":1743128710137,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811366208"},{"type":"electronic","value":"9789811366215"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-6621-5_7","type":"book-chapter","created":{"date-parts":[[2019,2,19]],"date-time":"2019-02-19T13:04:38Z","timestamp":1550581478000},"page":"86-95","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["End-Link Collaboration Control Mechanism in Intelligent Networks Based on Traffic Classification"],"prefix":"10.1007","author":[{"given":"Songer","family":"Sun","sequence":"first","affiliation":[]},{"given":"Li","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiaoping","family":"Han","sequence":"additional","affiliation":[]},{"given":"Chengjie","family":"Gu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,20]]},"reference":[{"issue":"1","key":"7_CR1","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1587\/transcom.E96.B.108","volume":"96","author":"Y Kanaumi","year":"2013","unstructured":"Kanaumi, Y., Saito, S., Kawai, E.: RISE: a wide-area hybrid OpenFlow network testbed. IEICE Trans. Commun. 96(1), 108\u2013118 (2013)","journal-title":"IEICE Trans. Commun."},{"doi-asserted-by":"crossref","unstructured":"Bari, M., Chowdhury, S., Ahmed, R.: On orchestrating virtual network functions. In: International Conference on Network and Service Management, pp. 50\u201356 (2015)","key":"7_CR2","DOI":"10.1109\/CNSM.2015.7367338"},{"issue":"4","key":"7_CR3","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/MCOM.2015.7081093","volume":"53","author":"J Marias","year":"2015","unstructured":"Marias, J., Garay, J., Toledo, N.: Toward an SDN-enabled NFV architecture. IEEE Commun. Magzine 53(4), 187\u2013193 (2015)","journal-title":"IEEE Commun. Magzine"},{"issue":"2","key":"7_CR4","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MCOM.2015.7045396","volume":"53","author":"B Han","year":"2015","unstructured":"Han, B., Gopalakrishnan, V.: Network function virtualization: challenges and opportunities for innovations. IEEE Commun. Mag. 53(2), 90\u201397 (2015)","journal-title":"IEEE Commun. Mag."},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-540-31966-5_4","volume-title":"Passive and Active Network Measurement","author":"AW Moore","year":"2005","unstructured":"Moore, A.W., Papagiannaki, K.: Toward the accurate identification of network applications. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 41\u201354. Springer, Heidelberg (2005). \n                    https:\/\/doi.org\/10.1007\/978-3-540-31966-5_4"},{"issue":"8","key":"7_CR6","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1109\/JLT.2015.2388585","volume":"33","author":"M Xia","year":"2015","unstructured":"Xia, M., Shirazipour, M., Zhang, Y.: Network function placement for NFV chaining in packet\/optical data centers. J. Light. Technol. 33(8), 1565\u20131570 (2015)","journal-title":"J. Light. Technol."},{"doi-asserted-by":"crossref","unstructured":"Sen, S., Spatscheck, O., Wang, D.: Accurate, scalable in-network identification of p2p traffic using application signatures. In: Proceedings of the 13th International Conference on World Wide Web, pp. 512\u2013521 (2004)","key":"7_CR7","DOI":"10.1145\/988672.988742"},{"issue":"3","key":"7_CR8","first-page":"37","volume":"11","author":"T Nguyen","year":"2008","unstructured":"Nguyen, T., Armitage, G.: A survey of techniques for internet traffic classification using machine learning. IEEE Commun. Surv. Tutor. 11(3), 37\u201352 (2008)","journal-title":"IEEE Commun. Surv. Tutor."},{"unstructured":"Vapnik, V.: SVM method of estimating density, conditional probability, and conditional density. In: IEEE International Symposium on Circuits and Systems, pp. 749\u2013752 (2002)","key":"7_CR9"},{"issue":"3","key":"7_CR10","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TNN.2007.894080","volume":"18","author":"H Yan","year":"2007","unstructured":"Yan, H., Xu, D.: An approach to estimating product design time based on fuzzy \u03bd-support vector machine. IEEE Trans. Neural Netw. 18(3), 721\u2013732 (2007)","journal-title":"IEEE Trans. Neural Netw."},{"issue":"10","key":"7_CR11","first-page":"2087","volume":"7","author":"S Hichem","year":"2006","unstructured":"Hichem, S., Donald, G.: A hierarchy of support vector machines for pattern detection. J. Mach. Learn. Res. 7(10), 2087\u20132123 (2006)","journal-title":"J. Mach. Learn. Res."},{"issue":"7","key":"7_CR12","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1109\/TPDS.2007.70800","volume":"19","author":"DA Tran","year":"2008","unstructured":"Tran, D.A., Nguyen, T.: Localization in wireless sensor networks based on support vector machines. IEEE Trans. Parallel Distrib. Syst. 19(7), 981\u2013994 (2008)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"7_CR13","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1002\/sec.175","volume":"4","author":"S Benfano","year":"2011","unstructured":"Benfano, S., Lucas, V., Ning, W.: Hybrid pattern matching for trusted intrusion detection. Secur. Commun. Netw. 4(1), 33\u201343 (2011)","journal-title":"Secur. Commun. Netw."},{"issue":"1","key":"7_CR14","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.cose.2009.06.008","volume":"29","author":"Z Chenfeng","year":"2010","unstructured":"Chenfeng, Z., Christopher, L., Shanika, K.: A survey of coordinated attacks and collaborative intrusion detection. Comput. Secur. 29(1), 124\u2013140 (2010)","journal-title":"Comput. Secur."},{"issue":"7","key":"7_CR15","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1016\/S0167-4048(03)00710-7","volume":"22","author":"H Sang","year":"2003","unstructured":"Sang, H., Won, S.: An anomaly intrusion detection method by clustering normal user behavior. Comput. Secur. 22(7), 596\u2013612 (2003)","journal-title":"Comput. Secur."},{"issue":"10","key":"7_CR16","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1016\/j.comcom.2005.07.030","volume":"29","author":"J Jing","year":"2006","unstructured":"Jing, J., Papavassiliou, S.: Enhancing network traffic prediction and anomaly detection via statistical network traffic separation and combination strategies. Comput. Commun. 29(10), 1627\u20131638 (2006)","journal-title":"Comput. Commun."}],"container-title":["Communications in Computer and Information Science","Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-6621-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:00:48Z","timestamp":1558396848000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-6621-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811366208","9789811366215"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-6621-5_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"20 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CNCERT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China Cyber Security Annual Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cncert2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conf.cert.org.cn\/English","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}