{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T12:56:52Z","timestamp":1770814612736,"version":"3.50.1"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"State of Colorado through funds appropriated for Cybersecurity Law Dubbed \u201cCyber Coding Cryptology for State Records.\u201d"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3323927","type":"journal-article","created":{"date-parts":[[2023,10,11]],"date-time":"2023-10-11T17:49:06Z","timestamp":1697046546000},"page":"113100-113113","source":"Crossref","is-referenced-by-count":11,"title":["Tabular-to-Image Transformations for the Classification of Anonymous Network Traffic Using Deep Residual Networks"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6529-5493","authenticated-orcid":false,"given":"Nathan","family":"Briner","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Colorado Mesa University (CMU), Grand Junction, CO, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0000-8307","authenticated-orcid":false,"given":"Drake","family":"Cullen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Colorado Mesa University (CMU), Grand Junction, CO, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1804-3263","authenticated-orcid":false,"given":"James","family":"Halladay","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Colorado Mesa University (CMU), Grand Junction, CO, USA"}]},{"given":"Darrin","family":"Miller","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Colorado Mesa University (CMU), Grand Junction, CO, USA"}]},{"given":"Riley","family":"Primeau","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Colorado Mesa University (CMU), Grand Junction, CO, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9386-5232","authenticated-orcid":false,"given":"Abraham","family":"Avila","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Colorado Mesa University (CMU), Grand Junction, CO, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6864-6893","authenticated-orcid":false,"given":"Ram","family":"Basnet","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Colorado Mesa University (CMU), Grand Junction, CO, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1279-689X","authenticated-orcid":false,"given":"Tenzin","family":"Doleck","sequence":"additional","affiliation":[{"name":"Faculty of Education, Simon Fraser University, Burnaby, BC, Canada"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102663"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-90923-y"},{"key":"ref34","article-title":"XGBoost: Its genealogy, its architectural features, and its innovation","author":"suginoo","year":"2022"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IDSTA55301.2022.9923042"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.3004555"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/s22114216"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1007\/978-3-319-46493-0_38","article-title":"Identity mappings in deep residual networks","author":"he","year":"2016","journal-title":"Computer Vision&#x2014;ECCV 2016"},{"key":"ref31","article-title":"CMU-SynTraffic-2023-ImageDataset","author":"briner","year":"2023"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.07.091"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00360"},{"key":"ref33","year":"2023","journal-title":"XGBoost Documentation&#x2014;XGBoost 1 7 6 Documentation"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3173319"},{"key":"ref32","article-title":"XGBoost: Scalable GPU accelerated learning","author":"mitchell","year":"2018","journal-title":"arXiv 1806 11248"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382210"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.09.009"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10162042"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-47765-6"},{"key":"ref16","first-page":"225","article-title":"Encrypted traffic classification using extreme gradient boosting algorithm","author":"gupta","year":"2021","journal-title":"Proc Int Conf Innov Comput Commun"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/IMCOM48794.2020.9001712"},{"key":"ref19","article-title":"OmicsMapNet: Transforming omics data to take advantage of deep convolutional neural network for discovery","author":"ma","year":"2018","journal-title":"arXiv 1804 05283"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1101\/2020.05.02.074203","article-title":"A novel method for classification of tabular data using convolutional neural networks","author":"buturovi?","year":"2020"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70139-4_87"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEA50009.2020.00066"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"818","DOI":"10.1007\/978-3-319-10590-1_53","article-title":"Visualizing and understanding convolutional networks","author":"zeiler","year":"2014","journal-title":"Computer Vision&#x2014;ECCV 2014"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8891185"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-021-00444-8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10776-020-00495-3"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.displa.2022.102239"},{"key":"ref21","first-page":"1","article-title":"A convolutional neural network for network intrusion detection system","author":"mohammadpour","year":"2018","journal-title":"Proc APAN"},{"key":"ref28","article-title":"CMU-SynTraffic-2022","author":"cullen","year":"2022","journal-title":"IEEE Dataport"},{"key":"ref27","author":"lashkari","year":"2018","journal-title":"CICFlowmeter-V4 0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyser for anomaly detection"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3228507"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s21144677"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3442520.3442521"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102754"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1016\/j.dcan.2022.09.009","article-title":"Network traffic classification: Techniques, datasets, and challenges","author":"azab","year":"2022","journal-title":"Digital Communications and Networks"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.860"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON52537.2022.9766653"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5121\/ijdkp.2015.5201","article-title":"A review on evaluation metrics for data classification evaluations","volume":"5","author":"hossin","year":"2015","journal-title":"International Journal of Data Mining &amp; Knowledge Management Process"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10278393.pdf?arnumber=10278393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T19:42:05Z","timestamp":1699299725000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10278393\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3323927","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}