{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:23:40Z","timestamp":1773246220610,"version":"3.50.1"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s10922-024-09892-y","type":"journal-article","created":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T14:39:32Z","timestamp":1733841572000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Model of Encrypted Network Traffic Classification that Trades Off Accuracy and Efficiency"],"prefix":"10.1007","volume":"33","author":[{"given":"Lancan","family":"Yu","sequence":"first","affiliation":[]},{"given":"Jianting","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,10]]},"reference":[{"key":"9892_CR1","unstructured":"Encrypt,L.: Percentage of web pages loaded by Firefox using HTTPS, 2024, URL https:\/\/letsencrypt.org\/stats\/"},{"issue":"4","key":"9892_CR2","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"TTT Nguyen","year":"2008","unstructured":"Nguyen, T.T.T., Armitage, G.: A survey of techniques for internet traffic classification using machine learning. IEEE Commun. Surv. Tutor. 10(4), 56\u201376 (2008)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"9892_CR3","doi-asserted-by":"crossref","unstructured":"Khatouni, A.S., Zincir-Heywood, N.: Integrating machine learning with off-the-shelf traffic flow features for HTTP, HTTPS traffic classification, in, IEEE Symposium on Computers and Communications (ISCC). IEEE 2019, 1\u20137 (2019)","DOI":"10.1109\/ISCC47284.2019.8969578"},{"issue":"6","key":"9892_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3457904","volume":"54","author":"E Papadogiannaki","year":"2021","unstructured":"Papadogiannaki, E., Ioannidis, S.: A survey on encrypted network traffic analysis applications, techniques, and countermeasures. ACM Comput. Surv. (CSUR) 54(6), 1\u201335 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"9892_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109965","volume":"235","author":"Y Xu","year":"2023","unstructured":"Xu, Y., Cao, J., Song, K., et al.: Fasttraffic: a lightweight method for encrypted traffic fast classification. Comput. Netw. 235, 109965 (2023)","journal-title":"Comput. Netw."},{"issue":"1","key":"9892_CR6","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.socnet.2004.11.008","volume":"27","author":"SP Borgatti","year":"2005","unstructured":"Borgatti, S.P.: Centrality and network flow. Social Netw. 27(1), 55\u201371 (2005)","journal-title":"Social Netw."},{"key":"9892_CR7","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.eswa.2019.01.064","volume":"125","author":"AS Shekhawat","year":"2019","unstructured":"Shekhawat, A.S., Di Troia, F., Stamp, M.: Feature analysis of encrypted malicious traffic. Expert Syst. Appl. 125, 130\u2013141 (2019)","journal-title":"Expert Syst. Appl."},{"key":"9892_CR8","doi-asserted-by":"publisher","first-page":"219275","DOI":"10.1109\/ACCESS.2020.3041719","volume":"8","author":"TM Khan","year":"2020","unstructured":"Khan, T.M., Robles-Kelly, A.: Machine learning: quantum vs classical. IEEE Access 8, 219275\u2013219294 (2020)","journal-title":"IEEE Access"},{"key":"9892_CR9","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.comnet.2019.04.004","volume":"158","author":"KL Dias","year":"2019","unstructured":"Dias, K.L., Pongelupe, M.A., Caminhas, W.M., de Errico, L.: An innovative approach for real-time network traffic classification. Comput. Netw. 158, 143\u2013157 (2019). https:\/\/doi.org\/10.1016\/j.comnet.2019.04.004","journal-title":"Comput. Netw."},{"key":"9892_CR10","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1016\/j.neucom.2020.05.036","volume":"409","author":"G Aceto","year":"2020","unstructured":"Aceto, G., Ciuonzo, D., Montieri, A., Antonio, P.: Toward effective mobile encrypted traffic classification through deep learning. Neurocomputing 409, 306\u2013315 (2020). https:\/\/doi.org\/10.1016\/j.neucom.2020.05.036","journal-title":"Neurocomputing"},{"issue":"12","key":"9892_CR11","doi-asserted-by":"publisher","first-page":"21","DOI":"10.3390\/electron-ics9122152","volume":"9","author":"QA Al-Haija","year":"2020","unstructured":"Al-Haija, Q.A., Zein-Sabatto, S.: An efficient deep-learning-based detection and classification system for cyber-attacks in IoT communication networks. Electronics 9(12), 21\u201352 (2020). https:\/\/doi.org\/10.3390\/electron-ics9122152","journal-title":"Electronics"},{"issue":"4","key":"9892_CR12","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MNET.011.1900366","volume":"34","author":"M Shen","year":"2020","unstructured":"Shen, M., Liu, Y., Zhu, L., et al.: Optimizing feature selection for efficient encrypted traffic classification: a systematic approach. IEEE Netw. 34(4), 20\u201327 (2020)","journal-title":"IEEE Netw."},{"issue":"2","key":"9892_CR13","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MCOM.001.2100736","volume":"60","author":"T Zhang","year":"2022","unstructured":"Zhang, T., Qiu, H., Mellia, M., Li, Y., Li, H., Xu, K.: Interpreting AI for networking: where we are and where we are going. IEEE Commun. Mag. 60(2), 25\u201331 (2022)","journal-title":"IEEE Commun. Mag."},{"key":"9892_CR14","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1016\/j.ins.2020.05.035","volume":"541","author":"X Liu","year":"2020","unstructured":"Liu, X., You, J., Wu, Y., et al.: Attention-based bidirectional GRU networks for efficient HTTPS traffic classification. Inform. Sci. 541, 297\u2013315 (2020)","journal-title":"Inform. Sci."},{"key":"9892_CR15","doi-asserted-by":"publisher","first-page":"108472","DOI":"10.1016\/j.comnet.2021.108472","volume":"199","author":"J Cheng","year":"2021","unstructured":"Cheng, J., Wu, Y., Yuepeng, E., et al.: MATEC: a lightweight neural network for online encrypted traffic classification. Comput. Netw. 199, 108472 (2021)","journal-title":"Comput. Netw."},{"issue":"3","key":"9892_CR16","doi-asserted-by":"publisher","first-page":"1999","DOI":"10.1007\/s00500-019-04030-2","volume":"24","author":"M Lotfollahi","year":"2020","unstructured":"Lotfollahi, M., Jafari Siavoshani, M., Zade, Shirali Hossein, R., et al.: Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput. 24(3), 1999\u20132012 (2020)","journal-title":"Soft Comput."},{"key":"9892_CR17","doi-asserted-by":"publisher","first-page":"114363","DOI":"10.1016\/j.eswa.2020.114363","volume":"167","author":"X Ren","year":"2021","unstructured":"Ren, X., Gu, H., Wei, W.: Tree-RNN: tree structural recurrent neural network for network traffic classification. Expert Syst. Appl. 167, 114363 (2021)","journal-title":"Expert Syst. Appl."},{"key":"9892_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107974","volume":"190","author":"K Lin","year":"2021","unstructured":"Lin, K., Xu, X., Gao, H.: TSCRNN: a novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT. Comput. Netw. 190, 107974 (2021)","journal-title":"Comput. Netw."},{"key":"9892_CR19","doi-asserted-by":"crossref","unstructured":"Lin, X., Xiong, G., Gou, G., et al.: Et-bert: A contextualized datagram representation with pre-training transformers for encrypted traffic classification\/\/Proceedings of the ACM Web Conference 2022. 2022: 633-642","DOI":"10.1145\/3485447.3512217"},{"key":"9892_CR20","doi-asserted-by":"publisher","first-page":"107213","DOI":"10.1016\/j.comnet.2020.107213","volume":"173","author":"F Pacheco","year":"2020","unstructured":"Pacheco, F., Exposito, E., Gineste, M.: A framework to classify heterogeneous Internet traffic with machine learning and deep learning techniques for satellite communications. Comput. Netw. 173, 107213 (2020)","journal-title":"Comput. Netw."},{"key":"9892_CR21","doi-asserted-by":"crossref","unstructured":"Wang, W., Zeng, X., Ye, X., Sheng, Y., Zhu, M.: Malware Traffic Classification Using Convolutional Neural Networks for Representation Learning. In Proceedings of the 31st International Conference on Information Networking (ICOIN 2017), Da Nang, Vietnam, 11-13 January 2017; pp. 712-717","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"9892_CR22","doi-asserted-by":"crossref","unstructured":"Wang, W., Zhu, M., Wang, J, et al.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks\/\/2017 IEEE international conference on Intelligence and security informatics (ISI). IEEE, 2017: 43-48","DOI":"10.1109\/ISI.2017.8004872"},{"key":"9892_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/6480172","volume":"2022","author":"J Zheng","year":"2022","unstructured":"Zheng, J., Zeng, Z., Feng, T.: Gcn-eta: high-efficiency encrypted malicious traffic detection. Secur. Commun. Netw. 2022, 1\u201311 (2022)","journal-title":"Secur. Commun. Netw."},{"issue":"6","key":"9892_CR24","doi-asserted-by":"publisher","first-page":"1326","DOI":"10.1016\/j.comnet.2010.12.002","volume":"55","author":"R Alshammari","year":"2011","unstructured":"Alshammari, R., Zincir-Heywood, A.N.: Can encrypted traffic be identified without port numbers, IP addresses and payload inspection? Comput. Netw. 55(6), 1326\u20131350 (2011)","journal-title":"Comput. Netw."},{"issue":"8","key":"9892_CR25","doi-asserted-by":"publisher","first-page":"1747","DOI":"10.1109\/TIFS.2016.2551203","volume":"11","author":"S Feghhi","year":"2016","unstructured":"Feghhi, S., Leith, D.J.: A web traffic analysis attack using only timing information. IEEE Trans. Inform. Forensics Secur. 11(8), 1747\u20131759 (2016)","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"key":"9892_CR26","unstructured":"Moore, A., Zuev, D., Crogan, M.: Discriminators for use in flow-based classification. 2013"},{"key":"9892_CR27","doi-asserted-by":"crossref","unstructured":"Liu, C., Cao, Z., Xiong, G., et al.: Mampf: Encrypted traffic classification based on multi-attribute markov probability fingerprints\/\/2018 IEEE\/ACM 26th International Symposium on Quality of Service (IWQoS). IEEE, 2018: 1-10","DOI":"10.1109\/IWQoS.2018.8624124"},{"key":"9892_CR28","doi-asserted-by":"crossref","unstructured":"Okada, Y., Ata, S., Nakamura, N., et al. 2011, Comparisons of machine learning algorithms for application identification of encrypted traffic 10th International Conference on Machine Learning and Applications and Workshops. IEEE, 2: 358-361","DOI":"10.1109\/ICMLA.2011.162"},{"key":"9892_CR29","doi-asserted-by":"crossref","unstructured":"Okada, Y., Ata, S., Nakamura, N., et al. 2011, Comparisons of machine learning algorithms for application identification of encrypted traffic 10th International Conference on Machine Learning and Applications and Workshops. IEEE, 2: 358-361","DOI":"10.1109\/ICMLA.2011.162"},{"issue":"2","key":"9892_CR30","doi-asserted-by":"publisher","first-page":"e5292","DOI":"10.1002\/cpe.5292","volume":"32","author":"W Zhongsheng","year":"2020","unstructured":"Zhongsheng, W., Jianguo, W., Sen, Y., et al.: Retracted: traffic identification and traffic analysis based on support vector machine. Concurr. Comput. 32(2), e5292 (2020)","journal-title":"Concurr. Comput."},{"key":"9892_CR31","doi-asserted-by":"crossref","unstructured":"Panchenko, A., Lanze, F., Pennekamp, J., et al.: Website Fingerprinting at Internet Scale NDSS. 2016","DOI":"10.14722\/ndss.2016.23477"},{"key":"9892_CR32","unstructured":"Saltaformaggio, B., Choi, H., Johnson, K., et al.: Eavesdropping on Fine-Grained user activities within smartphone apps over encrypted network traffic. 10th USENIX workshop on offensive technologies (WOOT 16). 2016"},{"issue":"12","key":"9892_CR33","doi-asserted-by":"publisher","first-page":"3039","DOI":"10.1109\/TIFS.2017.2730819","volume":"12","author":"R Dubin","year":"2017","unstructured":"Dubin, R., Dvir, A., Pele, O., et al.: I know what you saw last minute-encrypted http adaptive video streaming title classification. IEEE Trans. Inform. Forensics Secur. 12(12), 3039\u20133049 (2017)","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"key":"9892_CR34","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/TIFS.2020.3046876","volume":"16","author":"M Shen","year":"2020","unstructured":"Shen, M., Liu, Y., Zhu, L., et al.: Fine-grained webpage fingerprinting using only packet length information of encrypted traffic. IEEE Trans. Inform. Forensics Secur. 16, 2046\u20132059 (2020)","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"key":"9892_CR35","doi-asserted-by":"publisher","first-page":"2166","DOI":"10.1109\/TIFS.2022.3179955","volume":"17","author":"SJ Xu","year":"2022","unstructured":"Xu, S.J., Geng, G.G., Jin, X.B., et al.: Seeing traffic paths: Encrypted traffic classification with path signature features. IEEE Trans. Inform. Forensics Secur. 17, 2166\u20132181 (2022)","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"issue":"1","key":"9892_CR36","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1109\/TBDATA.2019.2940675","volume":"8","author":"H Yao","year":"2019","unstructured":"Yao, H., Liu, C., Zhang, P., et al.: Identification of encrypted traffic through attention mechanism based long short term memory. IEEE Trans. Big Data 8(1), 241\u2013252 (2019)","journal-title":"IEEE Trans. Big Data"},{"key":"9892_CR37","unstructured":"Devlin, J., Chang, M W., Lee, K., et al.: Bert: Pre-training of deep bidirectional transformers for language understanding[J]. arXiv preprint arXiv:1810.04805, 2018"},{"key":"9892_CR38","doi-asserted-by":"crossref","unstructured":"Wang, K., Gao, J., Lei, X.: MTC: A Multi-Task Model for Encrypted Network Traffic Classification Based on Transformer and 1D-CNN. Intell. Autom. Soft Comput. 2023, 37(1)","DOI":"10.32604\/iasc.2023.036701"},{"key":"9892_CR39","doi-asserted-by":"crossref","unstructured":"Huang, H., Deng, H., Chen, J., et al. 2018 Automatic multi-task learning system for abnormal network traffic detection. Int. J. Emerg. Techn. Learn. 13(4)","DOI":"10.3991\/ijet.v13i04.8466"},{"key":"9892_CR40","unstructured":"Subakan, C., Ravanelli, M., Cornell, S., et al.: Resource-efficient separation transformer. arXiv preprint arXiv:2206.09507, 2022"},{"issue":"5","key":"9892_CR41","doi-asserted-by":"publisher","first-page":"821","DOI":"10.3390\/e25050821","volume":"25","author":"Z Shi","year":"2023","unstructured":"Shi, Z., Luktarhan, N., Song, Y., et al.: TSFN: a novel malicious traffic classification method using BERT and LSTM. Entropy 25(5), 821 (2023)","journal-title":"Entropy"},{"issue":"10","key":"9892_CR42","doi-asserted-by":"publisher","first-page":"18024","DOI":"10.1109\/TITS.2022.3154884","volume":"23","author":"Y Ding","year":"2022","unstructured":"Ding, Y., Zhu, G., Chen, D., et al.: Adversarial sample attack and defense method for encrypted traffic data. IEEE Trans. Intell. Transp. Syst. 23(10), 18024\u201318039 (2022)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"9892_CR43","doi-asserted-by":"publisher","first-page":"106944","DOI":"10.1016\/j.comnet.2019.106944","volume":"165","author":"G Aceto","year":"2019","unstructured":"Aceto, G., Ciuonzo, D., Montieri, A., et al.: MIMETIC: mobile encrypted traffic classification using multimodal deep learning. Comput. Netw. 165, 106944 (2019)","journal-title":"Comput. Netw."},{"key":"9892_CR44","doi-asserted-by":"publisher","first-page":"102985","DOI":"10.1016\/j.jnca.2021.102985","volume":"183","author":"G Aceto","year":"2021","unstructured":"Aceto, G., Ciuonzo, D., Montieri, A., et al.: DISTILLER: encrypted traffic classification via multimodal multitask deep learning. J. Netw. Comput. Appl. 183, 102985 (2021)","journal-title":"J. Netw. Comput. Appl."},{"key":"9892_CR45","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1109\/TNSM.2023.3246794","volume":"20","author":"A Nascita","year":"2023","unstructured":"Nascita, A., Montieri, A., Aceto, G., et al.: Improving performance, reliability, and feasibility in multimodal multitask traffic classification with XAI. IEEE Trans. Netw. Serv. Manag. 20, 1267 (2023)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"9892_CR46","doi-asserted-by":"publisher","first-page":"55380","DOI":"10.1109\/ACCESS.2018.2872430","volume":"6","author":"P Wang","year":"2018","unstructured":"Wang, P., Ye, F., Chen, X., et al.: Datanet: deep learning based encrypted network traffic classification in sdn home gateway. IEEE Access 6, 55380\u201355391 (2018)","journal-title":"IEEE Access"},{"key":"9892_CR47","doi-asserted-by":"crossref","unstructured":"Wang, W., Zhu, M., Zeng, X.,Ye, X., Sheng, Y.: Malware traffic classification using convolutional neural network for representation learning. In Proceedings of the 2017 IEEE International Conference on Information Networking (ICOIN), Da Nang, Vietnam,11-13 January 2017; pp. 712-717","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"9892_CR48","unstructured":"Lashkari, A H., Gil, G D., Mamun, M S I., et al.: Characterization of tor traffic using time-based features International Conference on Information Systems Security and Privacy. SciTePress, 2: 253-262"},{"issue":"10","key":"9892_CR49","doi-asserted-by":"publisher","first-page":"1631","DOI":"10.3390\/electronics9101631","volume":"9","author":"L Zhang","year":"2020","unstructured":"Zhang, L., Li, B., Liu, Y., et al.: FPGA acceleration of CNNs-based malware traffic classification. Electronics 9(10), 1631 (2020)","journal-title":"Electronics"},{"key":"9892_CR50","doi-asserted-by":"crossref","unstructured":"Mark Sandler, Andrew Howard, Menglong Zhu, Andrey Zhmoginov, and Liang Chieh Chen. Mobilenetv2: Inverted residuals and linear bottlenecks. In Proceedings of the IEEE Conference on computer vision and pattern recognition, pages 4510-4520, 2018","DOI":"10.1109\/CVPR.2018.00474"},{"key":"9892_CR51","doi-asserted-by":"crossref","unstructured":"Chen, J., Kao, S., He, H., et al.: Run, Don\u2019t Walk: Chasing Higher FLOPS for Faster Neural Networks[C]\/\/Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2023: 12021-12031","DOI":"10.1109\/CVPR52729.2023.01157"},{"key":"9892_CR52","doi-asserted-by":"publisher","first-page":"3726","DOI":"10.1109\/TIP.2022.3175432","volume":"31","author":"J Cao","year":"2022","unstructured":"Cao, J., Li, Y., Sun, M., et al.: Do-Conv: depthwise over-parameterized convolutional layer. IEEE Trans. Image Process. 31, 3726\u20133736 (2022)","journal-title":"IEEE Trans. Image Process."},{"key":"9892_CR53","doi-asserted-by":"crossref","unstructured":"Ding, X., Zhang, X., Han, J., et al.: Scaling up your kernels to 31x31: Revisiting large kernel design in cnns Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. 2022: 11963-11975","DOI":"10.1109\/CVPR52688.2022.01166"},{"key":"9892_CR54","doi-asserted-by":"crossref","unstructured":"Liu, Z., Mao, H., Wu, C Y., et al.: A convnet for the 2020s[C]\/\/Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. 2022: 11976-11986","DOI":"10.1109\/CVPR52688.2022.01167"},{"key":"9892_CR55","doi-asserted-by":"crossref","unstructured":"Liu, Z., Lin, Y., Cao, Y., et al.: Swin transformer: Hierarchical vision transformer using shifted windows Proceedings of the IEEE\/CVF international conference on computer vision. 2021: 10012-10022","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"9892_CR56","doi-asserted-by":"crossref","unstructured":"Chen, J., Kao, S., He, H., et al.: Run, Don\u2019t walk: Chasing higher FLOPS for faster neural networks[C]\/\/Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2023: 12021-12031","DOI":"10.1109\/CVPR52729.2023.01157"},{"key":"9892_CR57","doi-asserted-by":"crossref","unstructured":"Cai, Z., Shen, Q.: FalconNet: Factorization for the Light-weight ConvNets. arXiv preprint arXiv:2306.06365, 2023","DOI":"10.1007\/978-981-99-8079-6_29"},{"key":"9892_CR58","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., et al.: Deep residual learning for image recognition Proceedings of the IEEE conference on computer vision and pattern recognition. 2016: 770-778","DOI":"10.1109\/CVPR.2016.90"},{"key":"9892_CR59","unstructured":"Wright, C V., Monrose, F., Masson, G M.: On inferring application protocol behaviors in encrypted network traffic. Journal of Machine Learning Research, 2006, 7(12)"},{"key":"9892_CR60","doi-asserted-by":"crossref","unstructured":"Rodriguez-Gomez, R A., Macia-Fernandez, G., Garcia-Teodoro, P.: Stochastic traffic identification for security management: edonkey protocol as a case study[C]\/\/Network and System Security: 7th International Conference, NSS: Madrid, Spain, June 3\u20134, 2013. Proceedings 7. Springer, Berlin Heidelberg 2013, 1\u201313 (2013)","DOI":"10.1007\/978-3-642-38631-2_1"},{"issue":"1","key":"9892_CR61","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MNET.2012.6135854","volume":"26","author":"A Dainotti","year":"2012","unstructured":"Dainotti, A., Pescape, A., Claffy, K.C.: Issues and future directions in traffic classification. IEEE Netw. 26(1), 35\u201340 (2012)","journal-title":"IEEE Netw."},{"key":"9892_CR62","doi-asserted-by":"crossref","unstructured":"Dahmouni, H., Vaton, S., Rosse, D.: A markovian signature-based approach to IP traffic classification[C]\/\/Proceedings of the 3rd annual ACM workshop on Mining network data. 2007: 29-34","DOI":"10.1145\/1269880.1269889"},{"key":"9892_CR63","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.neucom.2022.12.027","volume":"522","author":"A Yazdinejad","year":"2023","unstructured":"Yazdinejad, A., Dehghantanha, A., Parizi, R.M., et al.: An optimized fuzzy deep learning model for data classification based on NSGA-II. Neurocomputing 522, 116\u2013128 (2023)","journal-title":"Neurocomputing"},{"key":"9892_CR64","unstructured":"Akbari, I., Tahoun, E.: Privpkt: Privacy preserving collaborative encrypted traffic classification. 2020"},{"key":"9892_CR65","doi-asserted-by":"crossref","unstructured":"Namakshenas, D., Yazdinejad, A., Dehghantanha, A., et al: IP2FL: Interpretation-Based Privacy-Preserving Federated Learning for Industrial Cyber-Physical Systems. IEEE Transactions on Industrial Cyber-Physical Systems, 2024","DOI":"10.1109\/TICPS.2024.3435178"},{"key":"9892_CR66","doi-asserted-by":"crossref","unstructured":"Yazdinejad, A., Dehghantanha, A., Srivastava, G.: AP2FL: Auditable privacy-preserving federated learning framework for electronics in healthcare. IEEE Trans. Consum. Electron. 2023","DOI":"10.1109\/TCE.2023.3318509"},{"key":"9892_CR67","doi-asserted-by":"crossref","unstructured":"Yazdinejad, A., Dehghantanha, A., Karimipour, H., et al.: A robust privacy-preserving federated learning model against model poisoning attacks. IEEE Trans. Inform. Forensics Secur., 2024","DOI":"10.1109\/TIFS.2024.3420126"},{"key":"9892_CR68","unstructured":"Ren,J., Dubois,D., Choffnes,D.: An international view of privacy risks for mobile apps, 2019"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-024-09892-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-024-09892-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-024-09892-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T18:15:09Z","timestamp":1738088109000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-024-09892-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,10]]},"references-count":68,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["9892"],"URL":"https:\/\/doi.org\/10.1007\/s10922-024-09892-y","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-4586446\/v1","asserted-by":"object"}]},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,10]]},"assertion":[{"value":"15 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 December 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Ethical approval not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"11"}}