{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T17:15:41Z","timestamp":1720286141662},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,4,11]],"date-time":"2015-04-11T00:00:00Z","timestamp":1428710400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1007\/s12083-015-0350-2","type":"journal-article","created":{"date-parts":[[2015,4,10]],"date-time":"2015-04-10T07:16:52Z","timestamp":1428650212000},"page":"424-435","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["CUFTI: Methods for core users finding and traffic identification in P2P systems"],"prefix":"10.1007","volume":"9","author":[{"given":"Tao","family":"Qin","sequence":"first","affiliation":[]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Min","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,11]]},"reference":[{"key":"350_CR1","unstructured":"Sandvine (2013) http:\/\/www.sandvine.com\/news\/global_broadband_trends.asp"},{"key":"350_CR2","doi-asserted-by":"crossref","unstructured":"Zhai H, Wong A, Jiang H, Sun Y, Li J (2011) Optimal P2P Cache Sizing: A Monetary Cost Perspective on Capacity Design of Caches to Reduce P2P Traffic. In Proceedings of IEEE 17th International Conference on Parallel and Distributed Systems, pp 565\u2013572","DOI":"10.1109\/ICPADS.2011.90"},{"key":"350_CR3","unstructured":"Liu J, Rao S G, Li B, Zhang H (2008) Opportunities and Challenges of Peer-to-Peer Internet Video Broadcast. In Proceedings of the IEEE Special Issue on Recent Advances in Distributed Multimedia Communications, pp 11\u201324"},{"issue":"25","key":"350_CR4","first-page":"1640","volume":"10","author":"X Hei","year":"2007","unstructured":"Hei X, Liu Y, Ross KW (2007) Inferring network-wide quality in P2P live streaming systems. IEEE J Sel Areas in Commun 10(25):1640\u20131654","journal-title":"IEEE J Sel Areas in Commun"},{"key":"350_CR5","doi-asserted-by":"crossref","unstructured":"Liu Z, Wu C, Li B, Zhao S (2009) Distilling Superior Peers in Large-Scale P2P Streaming Systems. In Proceedings of the 28th IEEE INFOCOM, pp 82\u201390","DOI":"10.1109\/INFCOM.2009.5061909"},{"key":"350_CR6","unstructured":"Sirivianos M, Park J, Chen R, Yang X (2007) Free-riding in Bit-torrent networks with the large view exploit. In Proceedings of 6th International Workshop on Peer-to-Peer Systems"},{"key":"350_CR7","doi-asserted-by":"crossref","unstructured":"Guo L, Chen S, Tan E, Ding X, Zhang X (2005) Measurements, Analysis, and Modeling of BitTorrent-like Systems. In Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement, pp 35\u201348","DOI":"10.1145\/1330107.1330113"},{"issue":"9","key":"350_CR8","first-page":"11","volume":"8","author":"X Hei","year":"2007","unstructured":"Hei X, Liang C, Liang J, Liu Y, Ross KW (2007) A measurement study of a large-scale P2P IPTV system. IEEE Trans Multimedia 8(9):11\u201324","journal-title":"IEEE Trans Multimedia"},{"issue":"6","key":"350_CR9","first-page":"2010","volume":"4","author":"V Long","year":"2009","unstructured":"Long V, Indranil G, Klara N, Jin L (2009) Understanding overlay characteristics of a large-scale peer-to-peer IPTV system. ACM Trans Multimed Comput Commun Appl 4(6):2010\u20132035","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"key":"350_CR10","unstructured":"Kwon C, Song H (2011) A robust P2P video multicast streaming system under high peer-churn rate, In Proceedings of IEEE 13th International Conference on Communication Technology. pp 843\u2013848"},{"key":"350_CR11","doi-asserted-by":"crossref","unstructured":"Jiang X, Safaei F (2011) Churn performance study of structured peer-to-peer overlay in supporting massively multiplayer online role playing games. In Proceedings of 17th IEEE International Conference on Networks. pp 183\u2013188","DOI":"10.1109\/ICON.2011.6168472"},{"key":"350_CR12","unstructured":"Hu C, Chen D (2011) Distributed pairing for file sharing in large-scale peer-to-peer networks, In Proceedings of International Conference on Advanced Communication Technology, pp 492\u2013497"},{"key":"350_CR13","doi-asserted-by":"crossref","unstructured":"Wang F, Liu J, Xiong Y (2008) Stable Peers: Existence, Importance, and Application in Peer-to-Peer Live Video Streaming. In Proceedings of the IEEE Annual International Conference on Computer Communications, pp 1364\u20131372","DOI":"10.1109\/INFOCOM.2008.194"},{"key":"350_CR14","doi-asserted-by":"crossref","unstructured":"Bishop M, Rao S, Sripanidkulchai K (2006) Considering Priority in Overlay Multicast Protocols under Heterogeneous Environments. In Proceedings of the 25th IEEE INFOCOM, pp 1\u201313","DOI":"10.1109\/INFOCOM.2006.140"},{"key":"350_CR15","doi-asserted-by":"crossref","unstructured":"Stutzbach D, Rejaie R (2006) Understanding Churn in Peer-to-Peer Networks, In Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, pp 189\u2013202","DOI":"10.1145\/1177080.1177105"},{"issue":"2","key":"350_CR16","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/TNET.2004.826277","volume":"12","author":"S Sen","year":"2004","unstructured":"Sen S, Wang J (2004) Analyzing peer-to-peer traffic across large networks. IEEE\/ACM Trans Networking 12(2):219\u2013232","journal-title":"IEEE\/ACM Trans Networking"},{"key":"350_CR17","unstructured":"Gerber A, Houle J, Nguyen H, Roughan M, Sen, S (2003) P2P The Gorilla in the Cable. In Proceedings of National Cable &Telecommunications Association National Show"},{"key":"350_CR18","doi-asserted-by":"crossref","unstructured":"Sen S, Spatscheck O, Wang D (2004) Accurate, scalable in-network identification of P2P traffic using application signatures. In Proceedings of the 13th international conference on World Wide Web","DOI":"10.1145\/988672.988742"},{"key":"350_CR19","unstructured":"Karagiannis T, Broido A, Brownlee N, Claffy K, Faloutsos M (2004) Is P2P dying or just hiding? In Proceedings of IEEE Globecom\u2013Global Internet and Next Generation Networks"},{"key":"350_CR20","doi-asserted-by":"crossref","unstructured":"Constantinou F, Mavrommatis P (2006) Identifying Known and Unknown Peer-to-Peer Traffic. In Proceedings of Fifth IEEE International Symposium on Network Computing and Applications","DOI":"10.1109\/NCA.2006.34"},{"key":"350_CR21","doi-asserted-by":"crossref","unstructured":"Roughan M, Sen S, Spatscheck O, Duffield N (2004) Class-of-service mapping for QoS: A statistical signature-based approach to IP traffic classification. In Proceedings of ACM SIGCOMM Internet Measurement Conference","DOI":"10.1145\/1028788.1028805"},{"key":"350_CR22","doi-asserted-by":"crossref","unstructured":"Moore A, Zuev D (2005) Internet traffic classification using Bayesian analysis. In Proceedings of International Conference on Measurement and Modeling of Computer Systems","DOI":"10.1145\/1064212.1064220"},{"key":"350_CR23","doi-asserted-by":"crossref","unstructured":"Jin Y, Duffield N, Haffner P, Sen S, Zhang Z-L (2010) Inferring applications at the network layer using collective traffic statistics. In Proceedings of the 22nd International Tele traffic Congress","DOI":"10.1109\/ITC.2010.5608729"},{"key":"350_CR24","doi-asserted-by":"crossref","unstructured":"Iliofotou M, Gallagher B, Eliassi-Rad T, Xie G, Faloutsos M (2010) Profiling-by-association: a resilient traffic profiling solution for the internet backbone. In Proceedings of the 6th International Conference on emerging networking experiments and technologies","DOI":"10.1145\/1921168.1921171"},{"key":"350_CR25","unstructured":"Jaber M, Cascella G, Barakat C (2012) Using host profiling to refine statistical application identification, In Proceedings of 2012 I.E. INFOCOM, pp 2746\u20132750"},{"key":"350_CR26","doi-asserted-by":"crossref","unstructured":"Finamore A, Mellia M, Meo M (2011) Mining Unclassified Traffic Using Automatic Clustering Techniques. In Proceeding of the Third international conference on Traffic monitoring and analysis, pp 150\u2013163","DOI":"10.1007\/978-3-642-20305-3_13"},{"key":"350_CR27","doi-asserted-by":"crossref","unstructured":"Dainotti A, Pescap\u00e9 A, Sansone C (2011) Early Classification of Network Traffic through Multi-classification. In Proceedings of the Third international conference on Traffic monitoring and analysis, pp 122\u2013135","DOI":"10.1007\/978-3-642-20305-3_11"},{"issue":"2","key":"350_CR28","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/1129582.1129589","volume":"36","author":"L Bernaille","year":"2006","unstructured":"Bernaille L, Teixeira R, Akodkenou I (2006) Traffic classification on the fly. Comput Commun Rev 36(2):23\u201326","journal-title":"Comput Commun Rev"},{"key":"350_CR29","doi-asserted-by":"crossref","unstructured":"Haffner P, Sen S, Spatscheck O, Wang D (2005) ACAS: Automated construction of application signatures. In Proceedings of Workshop on Mining Network Data","DOI":"10.1145\/1080173.1080183"},{"key":"350_CR30","unstructured":"Keys K, Moore D, Koga R, Lagache E, Tesch M, Claffy K (2001) The Architecture of the CoralReef: Internet Traffic Monitoring Software Suite. In Proceedings of the Passive and Active Measurement Workshop"},{"key":"350_CR31","unstructured":"Nskeylab (2013) http:\/\/nskeylab.xjtu.edu.cn\/people\/tqin\/"},{"issue":"4","key":"350_CR32","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/TIFS.2010.2066970","volume":"5","author":"X Guan","year":"2010","unstructured":"Guan X, Qin T, Li W, Wang P (2010) Dynamic feature analysis and measurement for large-scale network monitoring. IEEE Trans Inf Forensics Secur 5(4):905\u2013919","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-015-0350-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-015-0350-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-015-0350-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T06:45:46Z","timestamp":1566542746000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-015-0350-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,11]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["350"],"URL":"https:\/\/doi.org\/10.1007\/s12083-015-0350-2","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,11]]}}}