{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T14:04:38Z","timestamp":1772546678138,"version":"3.50.1"},"reference-count":71,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T00:00:00Z","timestamp":1768867200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T00:00:00Z","timestamp":1772496000000},"content-version":"vor","delay-in-days":42,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s44443-026-00470-7","type":"journal-article","created":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T13:26:59Z","timestamp":1768915619000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bridging packet and session: Cross-level dual-attention networks for encrypted traffic classification"],"prefix":"10.1007","volume":"38","author":[{"given":"Jieming","family":"Gu","sequence":"first","affiliation":[]},{"given":"Yue","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Xiangzhan","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,20]]},"reference":[{"key":"470_CR1","doi-asserted-by":"crossref","unstructured":"Anderson B, McGrew D (2016) Identifying encrypted malware traffic with contextual flow data. In: ACM Workshop on Artificial Intelligence and Security, ACM, pp 35\u201346","DOI":"10.1145\/2996758.2996768"},{"key":"470_CR2","unstructured":"Bergstra J, Bardenet R, Bengio Y, et\u00a0al (2011) Algorithms for hyper-parameter optimization. Advances in Neural Information Processing Systems 24"},{"key":"470_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45:5\u201332","journal-title":"Mach Learn"},{"key":"470_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/S0962492900000015","volume":"9","author":"MD Buhmann","year":"2000","unstructured":"Buhmann MD (2000) Radial basis functions. Acta Numer 9:1\u201338","journal-title":"Acta Numer"},{"issue":"14","key":"470_CR5","doi-asserted-by":"publisher","first-page":"2709","DOI":"10.3390\/rs13142709","volume":"13","author":"QT Bui","year":"2021","unstructured":"Bui QT, Chou TY, Hoang TV et al (2021) Gradient boosting machine and object-based cnn for land cover classification. Remote Sensing 13(14):2709","journal-title":"Remote Sensing"},{"key":"470_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103601","volume":"163","author":"C Campo","year":"2024","unstructured":"Campo C, Garcia-Rubio C, Jimenez-Berenguel A et al (2024) Inferring mobile applications usage from dns traffic. Ad Hoc Netw 163:103601","journal-title":"Ad Hoc Netw"},{"issue":"2","key":"470_CR7","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/s10994-024-06714-9","volume":"114","author":"MA Chattha","year":"2025","unstructured":"Chattha MA, Malik MI, Dengel A et al (2025) Addressing data dependency in neural networks: Introducing the knowledge enhanced neural network (KENN) for time series forecasting+. Mach Learn 114(2):30","journal-title":"Mach Learn"},{"key":"470_CR8","doi-asserted-by":"crossref","unstructured":"Chen T, Guestrin C (2016) XGBoost: A scalable tree boosting system. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, pp 785\u2013794","DOI":"10.1145\/2939672.2939785"},{"key":"470_CR9","doi-asserted-by":"publisher","first-page":"7091","DOI":"10.1109\/TIFS.2024.3428839","volume":"19","author":"Y Chen","year":"2024","unstructured":"Chen Y, Wang Y (2024) MPAF: Encrypted traffic classification with multi-phase attribute fingerprint. IEEE Trans Inf Forensics Secur 19:7091\u20137105","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"470_CR10","doi-asserted-by":"crossref","unstructured":"Chen Y, Zang T, Zhang Y, et\u00a0al (2019) Rethinking encrypted traffic classification: A multi-attribute associated fingerprint approach. In: IEEE International Conference on Network Protocols, IEEE, pp 1\u201311","DOI":"10.1109\/ICNP.2019.8888043"},{"key":"470_CR11","doi-asserted-by":"publisher","first-page":"19418","DOI":"10.1109\/ACCESS.2024.3356073","volume":"12","author":"P Choorod","year":"2024","unstructured":"Choorod P, Weir G, Fernando A (2024) Classifying tor traffic encrypted payload using machine learning. IEEE Access 12:19418\u201319431","journal-title":"IEEE Access"},{"issue":"1","key":"470_CR12","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/TIFS.2015.2478741","volume":"11","author":"M Conti","year":"2015","unstructured":"Conti M, Mancini LV, Spolaor R et al (2015) Analyzing android encrypted network traffic to identify user actions. IEEE Trans Inf Forensics Secur 11(1):114\u2013125","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"470_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109614","volume":"224","author":"Z Diao","year":"2023","unstructured":"Diao Z, Xie G, Wang X et al (2023) EC-GCN: A encrypted traffic classification framework based on multi-scale graph convolution networks. Comput Netw 224:109614","journal-title":"Comput Netw"},{"issue":"4","key":"470_CR14","doi-asserted-by":"publisher","first-page":"4197","DOI":"10.1109\/TNSM.2021.3120804","volume":"18","author":"S Dong","year":"2021","unstructured":"Dong S, Xia Y, Peng T (2021) Network abnormal traffic detection model based on semi-supervised deep reinforcement learning. IEEE Trans Netw Serv Manage 18(4):4197\u20134212","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"3","key":"470_CR15","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/MWC.011.2200320","volume":"31","author":"S Dong","year":"2024","unstructured":"Dong S, Xia Y, Wang T (2024) Network abnormal traffic detection framework based on deep reinforcement learning. IEEE Wirel Commun 31(3):185\u2013193","journal-title":"IEEE Wirel Commun"},{"key":"470_CR16","doi-asserted-by":"publisher","first-page":"71611","DOI":"10.1109\/ACCESS.2025.3563799","volume":"13","author":"AE Ergun","year":"2025","unstructured":"Ergun AE, Can O, Kantarcioglu M (2025) Enhancing privacy in iot networks: A comparative analysis of classification and defense methods. IEEE Access 13:71611\u201371646","journal-title":"IEEE Access"},{"issue":"4","key":"470_CR17","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s10586-025-05156-9","volume":"28","author":"S Farhan","year":"2025","unstructured":"Farhan S, Mubashir J, Haq YU et al (2025) Enhancing network security: an intrusion detection system using residual network-based convolutional neural network. Clust Comput 28(4):251","journal-title":"Clust Comput"},{"issue":"1","key":"470_CR18","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1006\/jcss.1997.1504","volume":"55","author":"Y Freund","year":"1997","unstructured":"Freund Y, Schapire RE (1997) A decision-theoretic generalization of on-line learning and an application to boosting. J Comput Syst Sci 55(1):119\u2013139","journal-title":"J Comput Syst Sci"},{"key":"470_CR19","doi-asserted-by":"crossref","unstructured":"Fu J, Liu J, Tian H, et\u00a0al (2019) Dual attention network for scene segmentation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, IEEE, pp 3146\u20133154","DOI":"10.1109\/CVPR.2019.00326"},{"key":"470_CR20","doi-asserted-by":"crossref","unstructured":"Gil GD, Lashkari AH, Mamun M, et\u00a0al (2016) Characterization of encrypted and vpn traffic using time-related features. In: International Conference on Information Systems Security and Privacy, SciTePress, pp 407\u2013414","DOI":"10.5220\/0005740704070414"},{"key":"470_CR21","doi-asserted-by":"crossref","unstructured":"Grinsztajn L, Oyallon E, Varoquaux G (2022) Why do tree-based models still outperform deep learning on typical tabular data? Advances in Neural Information Processing Systems 35","DOI":"10.52202\/068431-0037"},{"key":"470_CR22","doi-asserted-by":"crossref","unstructured":"Gu Z, Gou G, Hou C et\u00a0al (2021) LFETT2021: A large-scale fine-grained encrypted tunnel traffic dataset. IEEE International Conference on Trust. Security and Privacy in Computing and Communications, IEEE, pp 240\u2013249","DOI":"10.1109\/TrustCom53373.2021.00048"},{"key":"470_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.apacoust.2024.110213","volume":"227","author":"Y Guo","year":"2025","unstructured":"Guo Y, Chen M, Geng Z et al (2025) Improved filtered-s least mean square\/fourth algorithm for nonlinear active noise control system. Appl Acoust 227:110213","journal-title":"Appl Acoust"},{"key":"470_CR24","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, et\u00a0al (2016) Identity mappings in deep residual networks. In: European Conference on Computer Vision, Springer, pp 630\u2013645","DOI":"10.1007\/978-3-319-46493-0_38"},{"issue":"4","key":"470_CR25","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/5254.708428","volume":"13","author":"MA Hearst","year":"1998","unstructured":"Hearst MA, Dumais ST, Osuna E et al (1998) Support vector machines. IEEE Intelligent Systems and Their Applications 13(4):18\u201328","journal-title":"IEEE Intelligent Systems and Their Applications"},{"key":"470_CR26","unstructured":"Huoh TL, Luo Y, Zhang T (2021) Encrypted network traffic classification using a geometric learning model. In: IFIP\/IEEE International Symposium on Integrated Network Management, IEEE, pp 376\u2013383"},{"key":"470_CR27","doi-asserted-by":"publisher","first-page":"19728","DOI":"10.1109\/ACCESS.2025.3530242","volume":"13","author":"Z Jia","year":"2025","unstructured":"Jia Z (2025) Research on image recognition and classification algorithms in cloud computing environment based on deep neural networks. IEEE Access 13:19728\u201319754","journal-title":"IEEE Access"},{"key":"470_CR28","unstructured":"Ke G, Meng Q, Finley T, et\u00a0al (2017) LightGBM: A highly efficient gradient boosting decision tree. Advances in Neural Information Processing Systems 30"},{"key":"470_CR29","doi-asserted-by":"crossref","unstructured":"Korczy\u0144ski M, Duda A (2014) Markov chain fingerprinting to classify encrypted traffic. In: IEEE International Conference on Computer Communications, IEEE, pp 781\u2013789","DOI":"10.1109\/INFOCOM.2014.6848005"},{"issue":"23","key":"470_CR30","doi-asserted-by":"publisher","first-page":"23741","DOI":"10.1109\/JIOT.2022.3191951","volume":"9","author":"K Kostas","year":"2022","unstructured":"Kostas K, Just M, Lones MA (2022) IoTDevID: A behavior-based device identification method for the IoT. IEEE Internet Things J 9(23):23741\u201323749","journal-title":"IEEE Internet Things J"},{"key":"470_CR31","doi-asserted-by":"crossref","unstructured":"Lashkari AH, Gil GD, Mamun MSI, et\u00a0al (2017) Characterization of tor traffic using time based features. In: International Conference on Information Systems Security and Privacy, SciTePress, pp 253\u2013262","DOI":"10.5220\/0006105602530262"},{"issue":"11","key":"470_CR32","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun Y, Bottou L, Bengio Y et al (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278\u20132324","journal-title":"Proc IEEE"},{"key":"470_CR33","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1007\/s00500-025-10462-w","volume":"29","author":"Z Li","year":"2025","unstructured":"Li Z, Liu Y, Zhang C et al (2025) Trustworthy deep learning for encrypted traffic classification. Soft Comput 29:645\u2013662","journal-title":"Soft Comput"},{"issue":"3","key":"470_CR34","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1109\/TNET.2022.3215507","volume":"31","author":"P Lin","year":"2023","unstructured":"Lin P, Ye K, Hu Y et al (2023) A novel multimodal deep learning framework for encrypted traffic classification. IEEE\/ACM Trans Networking 31(3):1369\u20131384","journal-title":"IEEE\/ACM Trans Networking"},{"key":"470_CR35","doi-asserted-by":"crossref","unstructured":"Lin X, Xiong G, Gou G, et\u00a0al (2022) ET-BERT: A contextualized datagram representation with pre-training transformers for encrypted traffic classification. In: Proceedings of the ACM Web Conference, ACM, pp 633\u2013642","DOI":"10.1145\/3485447.3512217"},{"key":"470_CR36","doi-asserted-by":"crossref","unstructured":"Liu C, He L, Xiong G, et\u00a0al (2019) FS-Net: A flow sequence network for encrypted traffic classification. In: IEEE International Conference on Computer Communications, IEEE, pp 1171\u20131179","DOI":"10.1109\/INFOCOM.2019.8737507"},{"issue":"6","key":"470_CR37","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.3390\/sym13061080","volume":"13","author":"B Lu","year":"2021","unstructured":"Lu B, Luktarhan N, Ding C et al (2021) ICLSTM: encrypted traffic service identification based on inception-lstm neural network. Symmetry 13(6):1080","journal-title":"Symmetry"},{"issue":"1","key":"470_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-024-01817-5","volume":"18","author":"J Luo","year":"2025","unstructured":"Luo J, Chen Z, Chen W et al (2025) A study on the application of the T5 large language model in encrypted traffic classification. Peer-to-Peer Networking and Applications 18(1):1\u201313","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"470_CR39","unstructured":"Mao A, Mohri M, Zhong Y (2023) Cross-entropy loss functions: Theoretical analysis and applications. In: International Conference on Machine Learning, PMLR, pp 23803\u201323828"},{"key":"470_CR40","doi-asserted-by":"crossref","unstructured":"Maonan W, Kangfeng Z, Ning X, et\u00a0al (2021) CENTIME: A direct comprehensive traffic features extraction for encrypted traffic classification. In: International Conference on Computer and Communication Systems, IEEE, pp 490\u2013498","DOI":"10.1109\/ICCCS52626.2021.9449280"},{"key":"470_CR41","doi-asserted-by":"crossref","unstructured":"Muehlstein J, Zion Y, Bahumi M, et\u00a0al (2017) Analyzing https encrypted traffic to identify user\u2019s operating system, browser and application. In: IEEE Consumer Communications and Networking Conference, IEEE, pp 1\u20136","DOI":"10.1109\/CCNC.2017.8013420"},{"key":"470_CR42","unstructured":"Prokhorenkova L, Gusev G, Vorobev A, et\u00a0al (2018) CatBoost: Unbiased boosting with categorical features. Advances in Neural Information Processing Systems 31"},{"key":"470_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2024.100674","volume":"45","author":"YK Saheed","year":"2024","unstructured":"Saheed YK, Abdulganiyu OH, Majikumna KU et al (2024) Resnet50-1d-cnn: A new lightweight resnet50-one-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems. Int J Crit Infrastruct Prot 45:100674","journal-title":"Int J Crit Infrastruct Prot"},{"issue":"9","key":"470_CR44","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2316301121","volume":"121","author":"A Sclocchi","year":"2024","unstructured":"Sclocchi A, Wyart M (2024) On the different regimes of stochastic gradient descent. Proc Natl Acad Sci 121(9):e2316301121","journal-title":"Proc Natl Acad Sci"},{"key":"470_CR45","doi-asserted-by":"crossref","unstructured":"Sethi S, Patil R, Rani S, et\u00a0al (2024) Decrypting secrets: Deep learning for unmasking malicious traffic. In: International Conference on Computing for Sustainable Global Development, IEEE, pp 1249\u20131254","DOI":"10.23919\/INDIACom61295.2024.10498419"},{"key":"470_CR46","doi-asserted-by":"publisher","first-page":"141674","DOI":"10.1109\/ACCESS.2023.3343189","volume":"11","author":"M Seydali","year":"2023","unstructured":"Seydali M, Khunjush F, Akbari B et al (2023) CBS: A deep learning approach for encrypted traffic classification with mixed spatio-temporal and statistical features. IEEE Access 11:141674\u2013141702","journal-title":"IEEE Access"},{"issue":"2","key":"470_CR47","doi-asserted-by":"publisher","first-page":"1218","DOI":"10.1109\/TNSM.2021.3071441","volume":"18","author":"T Shapira","year":"2021","unstructured":"Shapira T, Shavitt Y (2021) FlowPic: A generic representation for encrypted traffic classification and applications identification. IEEE Trans Netw Serv Manage 18(2):1218\u20131232","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"3","key":"470_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-025-01064-6","volume":"24","author":"A Sharma","year":"2025","unstructured":"Sharma A, Habibi Lashkari A (2025) Hybrid attention-enhanced explainable model for encrypted traffic detection and classification. Int J Inf Secur 24(3):1\u201329","journal-title":"Int J Inf Secur"},{"key":"470_CR49","doi-asserted-by":"publisher","first-page":"2367","DOI":"10.1109\/TIFS.2021.3050608","volume":"16","author":"M Shen","year":"2021","unstructured":"Shen M, Zhang J, Zhu L et al (2021) Accurate decentralized application identification via encrypted traffic analysis using graph neural networks. IEEE Trans Inf Forensics Secur 16:2367\u20132380","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"470_CR50","doi-asserted-by":"publisher","first-page":"1398237","DOI":"10.3389\/fbioe.2024.1398237","volume":"12","author":"G Sun","year":"2024","unstructured":"Sun G, Pan Y, Kong W et al (2024) DA-TransUNet: Integrating spatial and channel dual attention with transformer U-Net for medical image segmentation. Frontiers in Bioengineering and Biotechnology 12:1398237","journal-title":"Frontiers in Bioengineering and Biotechnology"},{"key":"470_CR51","doi-asserted-by":"publisher","first-page":"36951","DOI":"10.1109\/ACCESS.2025.3542633","volume":"13","author":"S Sunahara","year":"2025","unstructured":"Sunahara S, Jin Y, Iida K et al (2025) A framework for institutional privacy considered full dns over https architecture. IEEE Access 13:36951\u201336964","journal-title":"IEEE Access"},{"key":"470_CR52","doi-asserted-by":"crossref","unstructured":"Taylor VF, Spolaor R, Conti M, et\u00a0al (2016) AppScanner: Automatic fingerprinting of smartphone apps from encrypted network traffic. In: IEEE European Symposium on Security and Privacy, IEEE, pp 439\u2013454","DOI":"10.1109\/EuroSP.2016.40"},{"key":"470_CR53","doi-asserted-by":"crossref","unstructured":"Van\u00a0Ede T, Bortolameotti R, Continella A, et\u00a0al (2020) FlowPrint: Semi-supervised mobile-app fingerprinting on encrypted network traffic. In: Network and distributed system security symposium, Internet Society","DOI":"10.14722\/ndss.2020.24412"},{"key":"470_CR54","unstructured":"Vaswani A, Shazeer N, Parmar N, et\u00a0al (2017) Attention is all you need"},{"key":"470_CR55","doi-asserted-by":"crossref","unstructured":"Wang H, Xu T, Yang J, et\u00a0al (2022) Sessionvideo: A novel approach for encrypted traffic classification via 3D-CNN model. In: Asia-Pacific Network Operations and Management Symposium, IEEE, pp 1\u20136","DOI":"10.23919\/APNOMS56106.2022.9919917"},{"key":"470_CR56","doi-asserted-by":"crossref","unstructured":"Wang W, Zhu M, Wang J, et\u00a0al (2017) End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: IEEE International Conference on Intelligence and Security Informatics, IEEE, pp 43\u201348","DOI":"10.1109\/ISI.2017.8004872"},{"key":"470_CR57","doi-asserted-by":"crossref","unstructured":"Wang X, Chen S, Su J (2020) App-Net: A hybrid neural network for encrypted mobile traffic classification. In: IEEE Conference on Computer Communications Workshops, IEEE, pp 424\u2013429","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162891"},{"key":"470_CR58","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110403","volume":"245","author":"X Wang","year":"2024","unstructured":"Wang X, Yuan Q, Wang Y et al (2024) Combine intra-and inter-flow: A multimodal encrypted traffic classification model driven by diverse features. Comput Netw 245:110403","journal-title":"Comput Netw"},{"key":"470_CR59","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2025.103581","volume":"126","author":"X Wang","year":"2026","unstructured":"Wang X, Yuan Q, Yu W et al (2026) Entropy-regulated cross-modal generative fusion for multimodal network intrusion detection. Information Fusion 126:103581","journal-title":"Information Fusion"},{"issue":"5","key":"470_CR60","doi-asserted-by":"publisher","first-page":"3521","DOI":"10.1109\/TDSC.2021.3101311","volume":"19","author":"X Xiao","year":"2021","unstructured":"Xiao X, Xiao W, Li R et al (2021) EBSNN: Extended byte segment neural network for network traffic classification. IEEE Trans Dependable Secure Comput 19(5):3521\u20133538","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"470_CR61","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108267","volume":"196","author":"G Xie","year":"2021","unstructured":"Xie G, Li Q, Jiang Y (2021) Self-attentive deep learning method for online traffic classification and its interpretability. Comput Netw 196:108267","journal-title":"Comput Netw"},{"issue":"1","key":"470_CR62","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-023-2386-4","volume":"18","author":"Q Yuan","year":"2024","unstructured":"Yuan Q, Gou G, Zhu Y et al (2024) MMCo: Using multimodal deep learning to detect malicious traffic with noisy labels. Front Comp Sci 18(1):181809","journal-title":"Front Comp Sci"},{"key":"470_CR63","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109084","volume":"213","author":"F Zaki","year":"2022","unstructured":"Zaki F, Afifi F, Abd Razak S et al (2022) Grain: Granular multi-label encrypted traffic classification using classifier chain. Comput Netw 213:109084","journal-title":"Comput Netw"},{"key":"470_CR64","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110598","volume":"250","author":"X Zang","year":"2024","unstructured":"Zang X, Wang T, Zhang X et al (2024) Encrypted malicious traffic detection based on natural language processing and deep learning. Comput Netw 250:110598","journal-title":"Comput Netw"},{"key":"470_CR65","doi-asserted-by":"crossref","unstructured":"Zeng Y, Qi Z, Chen W, et\u00a0al (2019) TEST: an end-to-end network traffic classification system with spatio-temporal features extraction. In: IEEE International Conference on Smart Cloud, IEEE, pp 131\u2013136","DOI":"10.1109\/SmartCloud.2019.00032"},{"key":"470_CR66","doi-asserted-by":"crossref","unstructured":"Zhang H, Yu L, Xiao X, et\u00a0al (2023) TFE-GNN: A temporal fusion encoder using graph neural networks for fine-grained encrypted traffic classification. In: Proceedings of the ACM Web Conference, ACM, pp 2066\u20132075","DOI":"10.1145\/3543507.3583227"},{"key":"470_CR67","unstructured":"Zhang H, Xiao X, Yu L, et\u00a0al (2024) One train for two tasks: An encrypted traffic classification framework using supervised contrastive learning. arXiv:2402.07501"},{"key":"470_CR68","doi-asserted-by":"crossref","unstructured":"Zhang H, Yue H, Xiao X, et\u00a0al (2025) Revolutionizing encrypted traffic classification with MH-Net: A multi-view heterogeneous graph model. In: Proceedings of the AAAI Conference on Artificial Intelligence, Association for the Advancement of Artificial Intelligence, pp 1048\u20131056","DOI":"10.1609\/aaai.v39i1.32091"},{"issue":"2","key":"470_CR69","doi-asserted-by":"publisher","first-page":"2460","DOI":"10.1109\/TNSM.2024.3350080","volume":"21","author":"J Zhao","year":"2024","unstructured":"Zhao J, Li Q, Hong Y et al (2024) MetaRockETC: Adaptive encrypted traffic classification in complex network environments via time series analysis and meta-learning. IEEE Trans Netw Serv Manage 21(2):2460\u20132476","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"470_CR70","doi-asserted-by":"crossref","unstructured":"Zhao X (2025) Dns security governance and application practices in higher education institutions. In: International Conference on Computer Network Security and Software Engineering, ACM, pp 115\u2013120","DOI":"10.1145\/3732365.3732385"},{"issue":"12","key":"470_CR71","doi-asserted-by":"publisher","first-page":"15031","DOI":"10.1109\/TMC.2024.3450691","volume":"23","author":"C Zhou","year":"2024","unstructured":"Zhou C, Xiang Q, Pu L et al (2024) NetDPI: Efficient deep packet inspection via filtering-plus-verification in programmable 5G data plane for multi-access edge computing. IEEE Trans Mob Comput 23(12):15031\u201315047","journal-title":"IEEE Trans Mob Comput"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-026-00470-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-026-00470-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-026-00470-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T09:37:39Z","timestamp":1772530659000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-026-00470-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,20]]},"references-count":71,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["470"],"URL":"https:\/\/doi.org\/10.1007\/s44443-026-00470-7","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"value":"1319-1578","type":"print"},{"value":"2213-1248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,20]]},"assertion":[{"value":"24 November 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Declarations"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"79"}}