{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T13:51:01Z","timestamp":1721829061895},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2013,11,26]],"date-time":"2013-11-26T00:00:00Z","timestamp":1385424000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1007\/s12243-013-0408-1","type":"journal-article","created":{"date-parts":[[2013,11,25]],"date-time":"2013-11-25T05:28:44Z","timestamp":1385357324000},"page":"155-169","source":"Crossref","is-referenced-by-count":6,"title":["A novel traffic identification approach based on multifractal analysis and combined neural network"],"prefix":"10.1007","volume":"69","author":[{"given":"Hongtao","family":"Shi","sequence":"first","affiliation":[]},{"given":"Gang","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,11,26]]},"reference":[{"key":"408_CR1","first-page":"205","volume-title":"PAM LNCS","author":"A McGregor","year":"2004","unstructured":"McGregor A, Hall M, Lorier P, Brunskill J (2004) Flow clustering using machine learning techniques. In: Barakat C, Pratt J (eds) PAM LNCS, vol 3015. Springer, Heidelberg, pp 205\u2013214"},{"key":"408_CR2","unstructured":"Nogueira A, Oliveira M, Salvador P, Valadas R, Pacheco A (2005) Classification of Internet users using discriminant analysis and neural networks, In: First EuroNGI Conference on Traffic Engineering for the Next Generation Internet Networks, April 2005, pp. 341\u2013348"},{"key":"408_CR3","unstructured":"Erman J, Arlitt M, Mahanti A (2006) Traffic classification using clustering algorithms, in: ACM SIGCOMM Workshop on Mining Network Data ACM, New York, pp. 281\u2013286"},{"key":"408_CR4","unstructured":"Willinger W, Paxson V, Taqqu MS (1998) Self-similarity and heavy ails: structural modeling of network traffic. In: A Practical Guide to Heavy Tails: Statistical Techniques for Analyzing Heavy Tailed Distributions, Birkhauser Verlag"},{"key":"408_CR5","doi-asserted-by":"crossref","unstructured":"Garret MW, Willinger W (1994) Analysis modeling and generation of self-similar VBR video traffic. In: Proceedings of the SIGCOMM'94 Conference on Communications Architectures, Protocols and Applications, London, UK","DOI":"10.1145\/190314.190339"},{"issue":"3","key":"408_CR6","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1109\/90.392383","volume":"3","author":"V Paxson","year":"1995","unstructured":"Paxson V, Floyd S (1995) Wide-area traffic: the failure of Poisson modelling. IEEE\/ACM Trans Netw 3(3):226\u201344","journal-title":"IEEE\/ACM Trans Netw"},{"key":"408_CR7","doi-asserted-by":"crossref","unstructured":"Feldmann A, Gilbert AC, Willinger W (1998) Data networks as cascade: investigating the multifractal nature of Internet WAN traffic. In Proceedings of the ACM SIGCOMM'98 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication","DOI":"10.1145\/285237.285256"},{"key":"408_CR8","unstructured":"Riedi RH, V\u00e9hel J (1997) Multifractal properties of TCP traffic: a numerical study. In: IEEE Transactions on Networking"},{"issue":"2","key":"408_CR9","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/S0893-6080(05)80023-1","volume":"5","author":"DH Wolpert","year":"1992","unstructured":"Wolpert DH (1992) Stacked generalization. Neural Netw 5(2):241\u2013259","journal-title":"Neural Netw"},{"issue":"9","key":"408_CR10","doi-asserted-by":"crossref","first-page":"2529","DOI":"10.1002\/aic.690420913","volume":"42","author":"V Sridhar","year":"1996","unstructured":"Sridhar V, Seagrave C, Barlett B (1996) Process modeling using stacked neural networks. Am Inst Chem Eng J 42(9):2529\u20132539","journal-title":"Am Inst Chem Eng J"},{"key":"408_CR11","doi-asserted-by":"crossref","first-page":"915","DOI":"10.1016\/S0893-6080(99)00030-1","volume":"12","author":"V Sridhar","year":"1999","unstructured":"Sridhar V, Barlett B, Seagrave C (1999) An information theoretic approach for combining neural network process models. Neural Netw 12:915\u2013926","journal-title":"Neural Netw"},{"key":"408_CR12","first-page":"680","volume":"45","author":"P Subbaraj","year":"2008","unstructured":"Subbaraj P, Rajasekaran V (2008) Evolutionary techniques based combined artificial neural networks for peak load forecasting. World Acad Sci Eng Technol 45:680\u2013686","journal-title":"World Acad Sci Eng Technol"},{"key":"408_CR13","doi-asserted-by":"crossref","unstructured":"Dung PT (2008) Combined neural Networks for radar target recognition from radar range profiles. Int Conf Adv Technol Commun pp 353\u20135","DOI":"10.1109\/ATC.2008.4760595"},{"key":"408_CR14","doi-asserted-by":"crossref","unstructured":"Sen S, Spatscheck O, Wang D (2004) Accurate, scalable in network identification of p2p traffic using application signatures. In Proceedings of the 13th International Conference on World Wide Web, ACM, New York, pp. 512\u2013521","DOI":"10.1145\/988672.988742"},{"key":"408_CR15","doi-asserted-by":"crossref","unstructured":"Madhukar A and Williamson C (2006). A longitudinal study of p2p traffic classification. In 14th IEEE international symposium on modeling analysis and simulation of computer and telecommunication systems 2006. MASCOTS 2006 (pp. 179\u2013188). Sept. 2006","DOI":"10.1109\/MASCOTS.2006.6"},{"key":"408_CR16","doi-asserted-by":"crossref","unstructured":"Sen S, Spatscheck O, and Wang D (2004). Accurate, scalable in-network identification of p2p traffic using application signatures. In WWW'04: Proceedings of the 13th international conference on Wo r l d Wi d e We b. (pp. 512\u2013521). New York: ACM","DOI":"10.1145\/988672.988742"},{"key":"408_CR17","doi-asserted-by":"crossref","unstructured":"Moore A and Papagiannaki K (2005) \u201cToward the Accurate Identification of Network Applications\u201d, Passive and Active Measurements Workshop, Boston, MA, USA, March 31, April 1","DOI":"10.1007\/978-3-540-31966-5_4"},{"key":"408_CR18","doi-asserted-by":"crossref","first-page":"1532","DOI":"10.1109\/GLOCOM.2004.1378239","volume":"3","author":"T Karagiannis","year":"2004","unstructured":"Karagiannis T, Broido A, Brownlee N, Claffy K, Faloutsos M (2004) Is p2p dying or just hiding? Glob Telecommun Conf 3:1532\u20131538","journal-title":"Glob Telecommun Conf"},{"key":"408_CR19","doi-asserted-by":"crossref","unstructured":"Haffner P, Sen S, Spatscheck O, Wang D (2005) Acas: automated construction of application signatures. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Mining Network Data, pp. 197\u2013202","DOI":"10.1145\/1080173.1080183"},{"key":"408_CR20","unstructured":"Karagiannis T, Papagiannaki K, Faloutsos M (2005) Blinc: multilevel traffic classification in the dark, in: Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 229\u2013240"},{"key":"408_CR21","unstructured":"Hu Y, Chiu D.M, Lui J (2008) Application identification based on network behavioral profiles, in: 16th International Workshop on Quality of Service, 2008. IWQoS 2008, June, pp. 219\u2013228"},{"key":"408_CR22","unstructured":"Karagiannis T, Broido A, Faloutsos M, Claffy K (2004) Transport layer identification of p2p traffic, in Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, ACM, New York, pp.121\u2013134"},{"key":"408_CR23","doi-asserted-by":"crossref","unstructured":"Madhukar A, Williamson C (2006) A longitudinal study of p2p traffic classification, in: 14th IEEE International Symposium on Modeling Analysis and Simulation of Computer and Telecommunication Systems Sept, pp. 179\u2013188","DOI":"10.1109\/MASCOTS.2006.6"},{"issue":"1","key":"408_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","volume":"39","author":"A Dempster","year":"1977","unstructured":"Dempster A, Paird N, Rubin D (1977) Maximum likelihood from in complete data via the EM algorithm. J R Stat Soc 39(1):1\u201338","journal-title":"J R Stat Soc"},{"key":"408_CR25","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-31966-5_26","volume-title":"Self-learning IP traffic classification based on statistical flow characteristics","author":"S Zander","year":"2005","unstructured":"Zander S, Nguyen T, Armitage G (2005) Self-learning IP traffic classification based on statistical flow characteristics. PAM 2005, Boston"},{"key":"408_CR26","doi-asserted-by":"crossref","unstructured":"Zander S (2005) \u201cAutomated Traffic Classification and Application Identification using Machine Learning,\u201d in LCN'05, Sydney, Australia, November 15\u201317","DOI":"10.1109\/LCN.2005.35"},{"key":"408_CR27","volume-title":"Bayesian Classification (Auto Class): theory and results. In Advances in Knowledge Discovery and Data Mining","author":"P Cheeseman","year":"1996","unstructured":"Cheeseman P, Strutz J (1996) Bayesian Classification (Auto Class): theory and results. In Advances in Knowledge Discovery and Data Mining. AAI\/MIT, USA"},{"key":"408_CR28","doi-asserted-by":"crossref","unstructured":"Roughan M, Sen S, Spatscheck O and Duffield N (2004) \u201cClass-of-Service Mapping for QoS: A Statistical Signature-based Approach to IP Traffic Classification,\u201d inIMC'04, Taormina, Italy, October 25\u201327","DOI":"10.1145\/1028788.1028805"},{"key":"408_CR29","doi-asserted-by":"crossref","unstructured":"Moore A and Zuev D (2005) \u201cInternet Traffic Classification Using Bayesian Analysis Techniques,\u201d inSIGMETRICS'05, Banff, Canada, June 6\u201310","DOI":"10.1145\/1064212.1064220"},{"key":"408_CR30","doi-asserted-by":"crossref","unstructured":"Feldmann A, Gilbert A and Willinger W (1998) Data networks as cascades: explaining the multifractal nature of Internet WAN traffic. In Proceedings of ACM SIGCOMM, ACM, New York, NY, pp. 42\u201355","DOI":"10.1145\/285243.285256"},{"key":"408_CR31","doi-asserted-by":"crossref","unstructured":"Feldmann A, Gilbert A, Huang P and Willinger W (1999) Dy-namics of IP traffic: a study of the role of variability and the impact of control. In SIGCOMM 1999 (pp. 301\u2013313)","DOI":"10.1145\/316194.316235"},{"key":"408_CR32","doi-asserted-by":"crossref","unstructured":"Veitch D, Abry P, Flandrin P and Chainais P (2000) Infinitely divisible cascade analysis of network traffic data. In Proceedings of the international conference on acoustics speech and signal processing, June 2000","DOI":"10.1109\/ICASSP.2000.861931"},{"key":"408_CR33","volume-title":"Multifractality of Deutschmark\/US Dollar Exchanges Rates","author":"A Fisher","year":"1997","unstructured":"Fisher A, Calvet L, Mandelbrot BB (1997) Multifractality of Deutschmark\/US Dollar Exchanges Rates. Cowles Foundation Discussion Paper, Yale University"},{"issue":"1","key":"408_CR34","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/18.650984","volume":"44","author":"P Abry","year":"1998","unstructured":"Abry P, Veitch D (1998) Wavelet analysis of long range dependent traffic. IEEE Trans Inf Theory 44(1):2\u201315","journal-title":"IEEE Trans Inf Theory"},{"key":"408_CR35","doi-asserted-by":"crossref","unstructured":"Daubechies I (1992) Ten Lectures on wavelets. CBMS-NSF Lecture Notes nr. 61, SIAM","DOI":"10.1137\/1.9781611970104"},{"issue":"2","key":"408_CR36","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/279345.279346","volume":"28","author":"A Feldmann","year":"1998","unstructured":"Feldmann A, Gilbert AC, Willinger W, Kurtz TG (1998) The changing nature of network traffic. ACM SIGCOMM Comput Commun Rev 28(2):5\u201329","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"408_CR37","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1109\/18.761336","volume":"45","author":"AC Gilbert","year":"1999","unstructured":"Gilbert AC, Willinger W, Feldmann A (1999) Scaling analysis of conservative cascades with application to network traffic. IEEE Trans Inf Theory 45:971\u201391","journal-title":"IEEE Trans Inf Theory"},{"issue":"1","key":"408_CR38","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/S0167-7012(00)00201-3","volume":"43","author":"IA Basheer","year":"2000","unstructured":"Basheer IA, Hajmeer M (2000) Artificial neural networks: fundamentals computing design and application. J Microbiol Methods 43(1):3\u201331","journal-title":"J. Microbiol Methods"},{"key":"408_CR39","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/S0925-2312(00)00305-2","volume":"34","author":"BB Chaudhuri","year":"2000","unstructured":"Chaudhuri BB, Bhattacharya U (2000) Efficient training and improved performance of multilayer perceptron in pattern classification. Neurocomputing 34:11\u201327","journal-title":"Neurocomputing"},{"key":"408_CR40","volume-title":"Neural networks: a comprehensive foundation","author":"S Haykin","year":"1994","unstructured":"Haykin S (1994) Neural networks: a comprehensive foundation. Macmillan, New York"},{"issue":"6","key":"408_CR41","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/72.329697","volume":"5","author":"MT Hagan","year":"1994","unstructured":"Hagan MT, Menhaj MB (1994) Training feedforward networks with the Marquardt algorithm. IEEE Trans Neural Netw 5(6):989\u2013993","journal-title":"IEEE Trans Neural Netw"},{"key":"408_CR42","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1162\/neco.1992.4.2.141","volume":"4","author":"R Battiti","year":"1992","unstructured":"Battiti R (1992) First- and second-order methods for learning: between steepest descent and Newton\u2019s method. Neural Comput 4:141\u2013166","journal-title":"Neural Comput"},{"key":"408_CR43","volume-title":"Practical methods of optimization","author":"R Fletcher","year":"1987","unstructured":"Fletcher R (1987) Practical methods of optimization. Wiley, New York"},{"key":"408_CR44","volume-title":"The Levenberg\u2013Marquardt algorithm: implementation and theory","author":"JJ More","year":"1978","unstructured":"More JJ (1978) The Levenberg\u2013Marquardt algorithm: implementation and theory. Springer, Berlin"},{"key":"408_CR45","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/S0893-6080(05)80023-1","volume":"5","author":"DH Wolpert","year":"1992","unstructured":"Wolpert DH (1992) Stacked generalization. Neural Netw 5:241\u2013259","journal-title":"Neural Netw"},{"key":"408_CR46","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/S0925-2312(00)00364-7","volume":"43","author":"V Hansen","year":"2002","unstructured":"Hansen V, Nelson RD (2002) Data mining of time series using stacked generalizers. Neurocomputing 43:173\u2013184","journal-title":"Neurocomputing"},{"key":"408_CR47","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1613\/jair.594","volume":"10","author":"KM Ting","year":"1999","unstructured":"Ting KM, Witten IH (1999) Issues in stacked generalization. J Artif Intell 10:271\u2013289","journal-title":"J. Artif. Intell."},{"key":"408_CR48","doi-asserted-by":"crossref","unstructured":"Yongli L, Guizhong L and Hongliang L (2002) Wavelet-based analysis of hurst parameter estimation for self-similar traffic. In Proceedings of ICASSP, pp 2061-2064.","DOI":"10.1109\/ICASSP.2002.1006180"}],"container-title":["annals of telecommunications - annales des t\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-013-0408-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-013-0408-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-013-0408-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T09:08:36Z","timestamp":1716196116000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-013-0408-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,26]]},"references-count":48,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2014,4]]}},"alternative-id":["408"],"URL":"https:\/\/doi.org\/10.1007\/s12243-013-0408-1","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,11,26]]}}}