{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T20:28:03Z","timestamp":1776889683580,"version":"3.51.2"},"reference-count":85,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012190","name":"Institute for Information Transmission Problems of the Russian Academy of Sciences","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012190","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012190","name":"Ministry of Science and Higher Education of the Russian Federation","doi-asserted-by":"publisher","award":["FFNU-2022-0036"],"award-info":[{"award-number":["FFNU-2022-0036"]}],"id":[{"id":"10.13039\/501100012190","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3469730","type":"journal-article","created":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T18:37:34Z","timestamp":1727462254000},"page":"142979-142993","source":"Crossref","is-referenced-by-count":7,"title":["Early Traffic Classification With Encrypted ClientHello: A Multi-Country Study"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8352-0738","authenticated-orcid":false,"given":"Danil","family":"Shamsimukhametov","sequence":"first","affiliation":[{"name":"Wireless Networks Laboratory, Institute for Information Transmission Problems of the Russian Academy of Sciences (IITP RAS), Moscow, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1392-3547","authenticated-orcid":false,"given":"Anton","family":"Kurapov","sequence":"additional","affiliation":[{"name":"Wireless Networks Laboratory, Institute for Information Transmission Problems of the Russian Academy of Sciences (IITP RAS), Moscow, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2674-7674","authenticated-orcid":false,"given":"Mikhail","family":"Liubogoshchev","sequence":"additional","affiliation":[{"name":"Wireless Networks Laboratory, Institute for Information Transmission Problems of the Russian Academy of Sciences (IITP RAS), Moscow, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5541-4671","authenticated-orcid":false,"given":"Evgeny","family":"Khorov","sequence":"additional","affiliation":[{"name":"Wireless Networks Laboratory, Institute for Information Transmission Problems of the Russian Academy of Sciences (IITP RAS), Moscow, Russia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.06.091"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2006.275"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2401031"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s23094351"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-019-00755-x"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3280913"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EIECC60864.2023.10456636"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2018.8644183"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3403\/30266283"},{"key":"ref10","volume-title":"Northbound Application Programming Interface (API) for Multimedia Broadcast\/Multicast Service (MBMS) at the xMB Reference Point; (Release 16)","year":"2020"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.01.021"},{"key":"ref12","volume-title":"HTTParchive","year":"2023"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2962018"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20305-3_11"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-022-04969-4"},{"issue":"2","key":"ref16","doi-asserted-by":"crossref","first-page":"451","DOI":"10.3390\/electronics12020451","article-title":"Effective resource allocation technique to improve QoS in 5G wireless network","volume":"12","author":"Jayaraman","year":"2023","journal-title":"Electronics"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/BlackSeaCom58138.2023.10299740"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800819"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.17487\/RFC8446","volume-title":"The Transport Layer Security (TLS) Protocol Version 1.3","author":"Rescorla","year":"2018"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/EnT50460.2021.9681767"},{"key":"ref21","volume-title":"TLS Encrypted Client Hello","author":"Rescorla","year":"2024"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.17487\/RFC8701","volume-title":"Applying Generate Random Extensions and Sustain Extensibility (Grease) to TLS Extensibility","author":"Benjamin","year":"2020"},{"key":"ref23","volume-title":"Transport Layer Security (TLS) Extensions","year":"2022"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3191431"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3324936"},{"key":"ref26","volume-title":"ISCX VPN-nonVPN Encrypted Network Traffic Dataset","year":"2023"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3286978.3287000"},{"key":"ref28","volume-title":"HTTPS Websites Dataset","author":"Shbair","year":"2016"},{"key":"ref29","first-page":"1","article-title":"YouTube Netflix web dataset for encrypted traffic classification","volume-title":"Proc. Int. Conf. Eng. Telecommun.","author":"Shamsimukhametov"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2023.108888"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3543516.3453921"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.05.035"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108472"},{"key":"ref34","article-title":"Early identification of services in HTTPS traffic","author":"Shbair","year":"2020","journal-title":"arXiv:2008.08350"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109648"},{"issue":"11","key":"ref36","first-page":"1","article-title":"The applications of deep learning on traffic identification","volume":"24","author":"Wang","year":"2015","journal-title":"BlackHat USA"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004872"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2018.00074"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2019.00071"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2019.2940675"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-021-03032-8"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109965"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3208196"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502818"},{"issue":"2","key":"ref46","doi-asserted-by":"crossref","first-page":"324","DOI":"10.3390\/electronics9020324","article-title":"Improved KNN algorithm for fine-grained classification of encrypted network flow","volume":"9","author":"Ma","year":"2020","journal-title":"Electronics"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963024"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2014.6785319"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2015.27"},{"key":"ref51","first-page":"1","article-title":"Network traffic classification by packet length signature extraction","volume-title":"Proc. IEEE Int. WIE Conf. Electr. Comput. Eng. (WIECON-ECE)","author":"Chari"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3251745"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109084"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3155133.3155175"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258054"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2747560"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.3390\/s22197643"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3209979"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3050608"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3179955"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.02.003"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.06.055"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109467"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3215507"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098163"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512217"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2019.102036"},{"key":"ref68","volume-title":"Examining Http\/3 Usage One Year on","year":"2024"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.17487\/rfc9001"},{"key":"ref70","doi-asserted-by":"crossref","DOI":"10.17487\/RFC9000","volume-title":"QUIC: A UDP-Based Multiplexed and Secure Transport","author":"Iyengar","year":"2021"},{"key":"ref71","article-title":"You get PADDING, everybody gets PADDING! You get privacy? Evaluating practical QUIC website fingerprinting protections for the masses","author":"Siby","year":"2022","journal-title":"arXiv:2203.07806"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1002\/047120644X.ch1"},{"key":"ref73","volume-title":"Wireshark","year":"2024"},{"key":"ref74","volume-title":"The Global Internet Phenomena Report Jauary 2023","year":"2023"},{"key":"ref75","volume-title":"Alexa 1M, Top Visited Webcites","year":"2023"},{"key":"ref76","volume-title":"WebDriver, S.","year":"2024"},{"key":"ref77","volume-title":"Websites Using Quic","year":"2022"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-25460-4_10"},{"key":"ref79","article-title":"QUIC hunter: Finding QUIC deployments and identifying server libraries across the Internet","author":"Zirngibl","year":"2023","journal-title":"arXiv:2308.15841"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.9735\/2229-3981"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1134\/S1064226923120173"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2004.843247"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2833110"},{"issue":"12","key":"ref84","doi-asserted-by":"crossref","first-page":"2117","DOI":"10.3390\/sym12122117","article-title":"Multi-level P2P traffic classification using heuristic and statistical-based techniques: A hybrid approach","volume":"12","author":"Bhatia","year":"2020","journal-title":"Symmetry"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-023-01915-5"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10697158.pdf?arnumber=10697158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T14:21:41Z","timestamp":1728570101000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10697158\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":85,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3469730","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}