{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T10:24:17Z","timestamp":1774952657232,"version":"3.50.1"},"reference-count":210,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/comst.2018.2883147","type":"journal-article","created":{"date-parts":[[2018,11,23]],"date-time":"2018-11-23T19:25:31Z","timestamp":1543001131000},"page":"1988-2014","source":"Crossref","is-referenced-by-count":308,"title":["Towards the Deployment of Machine Learning Solutions in Network Traffic Classification: A Systematic Survey"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6997-0222","authenticated-orcid":false,"given":"Fannia","family":"Pacheco","sequence":"first","affiliation":[]},{"given":"Ernesto","family":"Exposito","sequence":"additional","affiliation":[]},{"given":"Mathieu","family":"Gineste","sequence":"additional","affiliation":[]},{"given":"Cedric","family":"Baudoin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4194-6882","authenticated-orcid":false,"given":"Jose","family":"Aguilar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","article-title":"Deep packet: A novel approach for encrypted traffic classification using deep learning","volume":"abs 1709 2656","author":"lotfollahi","year":"2017","journal-title":"CoRR"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(15)60641-0"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2012.6167418"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.10.016"},{"key":"ref173","first-page":"127","author":"m\u00fcnz","year":"2010","journal-title":"TCP Traffic Classification Using Markov Models"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.10.009"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.04.026"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2017.01.016"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2013.07.006"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/ACCT.2015.54"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/IWMN.2013.6663794"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.06.084"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MCAS.2006.1688199"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638346"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0123"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2010.03.014"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015435"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.12.026"},{"key":"ref36","author":"hastie","year":"2009","journal-title":"The Elements of Statistical Learning Data Mining Inference and Prediction"},{"key":"ref35","author":"witten","year":"2005","journal-title":"Data Mining Practical Machine Learning Tools and Techniques"},{"key":"ref34","author":"dunham","year":"2002","journal-title":"Data Mining Introductory and Advanced Topics"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.10.009"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.11.002"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/ICUT.2009.5405754"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.079"},{"key":"ref183","first-page":"37","article-title":"High performance and high scalable packet classification algorithm for network security systems","volume":"14","author":"pak","year":"2017","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"ref182","first-page":"833","article-title":"Efficient tri-ary search tree based packet classification algorithm","author":"xu","year":"2007","journal-title":"Proc IET Conf"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1145\/2133360.2133364"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2017.2773824"},{"key":"ref187","article-title":"Deep learning in mobile and wireless networking: A survey","volume":"abs 1803 4311","author":"zhang","year":"2018","journal-title":"CoRR"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2491361"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8655(89)90037-8"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.07.045"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004872"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13232-2_18"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.07.155"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2015.12.011"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.11.008"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.09.043"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.08.038"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.06.008"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.05.019"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2566669"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.03.026"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1016\/j.phpro.2012.05.220"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.09.015"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(11)60319-1"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.007"},{"key":"ref150","author":"wang","year":"2009","journal-title":"Data Mining with Computational Intelligence"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.04.005"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.04.012"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.04.019"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.07.019"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.12.039"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.02.002"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/1555349.1555356"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1862"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.01.020"},{"key":"ref56","first-page":"9850","article-title":"Function and activity classification in network traffic data: Existing methods, their weaknesses, and a path forward","volume":"9850","author":"levchuk","year":"2016","journal-title":"Proc SPIE"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2015.7367362"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.03.021"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(13)60245-9"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(10)60156-2"},{"key":"ref40","author":"sutton","year":"1998","journal-title":"Introduction to Reinforcement Learning"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2011.5945941"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-013-9690-5"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.07.018"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2018.8551395"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.08.008"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/ICIW.2010.36"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2014.06.016"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIM.2015.7381869"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6135854"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.238"},{"key":"ref5","first-page":"1","article-title":"On different ways to classify Internet traffic: A short review of selected publications","volume":"25","author":"foremski","year":"2013","journal-title":"Theoretical and Applied Informatics"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1516"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.12.002"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1901"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.001"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.06.016"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2016.05.161"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1855"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.02.028"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.07.010"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7011"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2009.03.002"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"ref43","first-page":"37","article-title":"Evaluation: From precision, recall and F-measure to ROC","volume":"2","author":"powers","year":"2006","journal-title":"J Mach Learn Technol"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3135"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2321898"},{"key":"ref71","year":"2017","journal-title":"Openbach"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2016.7577032"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR.2016.7525661"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2017.7991973"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2424887"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140424"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2015.7289142"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/GIIS.2016.7814852"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2264634"},{"key":"ref62","first-page":"839","article-title":"BRUTE: A high performance and extensible traffic generator","author":"secchi","year":"2005","journal-title":"Proc SPECTS"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"ref63","year":"2017","journal-title":"iPerf&#x2014;The Ultimate Speed Test Tool for TCP UDP and SCTP"},{"key":"ref64","year":"2017","journal-title":"Ostinato - Network Traffic Generator\/Analyzer"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15512-3_12"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.05.004"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.02.019"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.09.026"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6970701"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.3233\/KES-170373"},{"key":"ref198","year":"2017","journal-title":"ULAKNET Data"},{"key":"ref199","first-page":"51","article-title":"Traffic data repository at the wide project","author":"cho","year":"2000","journal-title":"Proc Annu Conf USENIX Annu Tech Conf (ATEC)"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2015.7145322"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7060482"},{"key":"ref195","author":"exposito","year":"2013","journal-title":"Advanced Transport Protocols Designing the Next Generation"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1002\/9781118761489"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-014-0337-2"},{"key":"ref94","article-title":"Discriminators for use in flow-based classification","author":"moore","year":"2005"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2031175"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.01.006"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644908"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.05.008"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2014.011714.130505"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502895"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.04.020"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658967"},{"key":"ref99","article-title":"NetSimile: A scalable approach to size-independent network similarity","volume":"abs 1209 2684","author":"berlingerio","year":"2012","journal-title":"CoRR"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.12.004"},{"key":"ref97","first-page":"1669","article-title":"Traffic identification based on applications using statistical signature free from abnormal TCP behavior","volume":"31","author":"an","year":"2015","journal-title":"J Inf Sci Eng"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600972"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4870-z"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/1629607.1629610"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502952"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/W-FiCloud.2016.30"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2011.6143528"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.11.006"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04918-2_10"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.09.004"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2011.5772055"},{"key":"ref200","year":"2017","journal-title":"MAWI Data"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.03.012"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.02.012"},{"key":"ref209","year":"2017","journal-title":"KDD Cup 1999 data"},{"key":"ref203","year":"2017","journal-title":"Traffic Traces"},{"key":"ref204","year":"2017","journal-title":"Traffic Traces"},{"key":"ref201","year":"2017","journal-title":"CAIDA DATA"},{"key":"ref202","year":"2017","journal-title":"Traffic Traces"},{"key":"ref207","year":"2017","journal-title":"Telecommunication Networks Group"},{"key":"ref208","year":"2017","journal-title":"LBNL\/ICSI Enterprise Tracing Project"},{"key":"ref205","year":"2017","journal-title":"TSTAT Telecommunication Networks Group&#x2014;Politecnico Di Torino"},{"key":"ref206","year":"2017","journal-title":"DatCat Internet Measurement Data Catalog"},{"key":"ref210","year":"2017","journal-title":"DARPA Intrusion Detection Data Sets"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2016.133"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-008-9131-2"},{"key":"ref125","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1016\/S1005-8885(10)60069-6","article-title":"Research of the traffic characteristics for the real time online traffic classification","volume":"18","author":"m -feng","year":"2011","journal-title":"J China Univ Posts Telecommun"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.09.114"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683649"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-014-9324-6"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2014.02.002"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.09.011"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.02.023"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2015.7387586"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.12.053"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.04.011"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962736"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223675"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2012.11.004"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(11)60247-1"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(09)60577-X"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.02.008"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.17577\/IJERTV4IS070268"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.05.089"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2016.10.001"},{"key":"ref1","year":"2017","journal-title":"Internet Assigned Numbers Authority (IANA)"},{"key":"ref145","article-title":"Real time video quality representation classification of encrypted HTTP adaptive video streaming&#x2014;The case of Safari","volume":"abs 1602 489","author":"dubin","year":"2016","journal-title":"CoRR"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.01.021"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.412"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.08.021"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSS.2011.6059997"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.98"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.011"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735749"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.10.003"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2014.03.013"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.04.015"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIE.2010.5559900"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.08.007"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.05.009"},{"key":"ref13","first-page":"1","article-title":"Advances in knowledge discovery and data mining","author":"fayyad","year":"1996","journal-title":"From Data Mining to Knowledge Discovery An Overview"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.12.035"},{"key":"ref15","author":"liu","year":"2008","journal-title":"Computational Methods of Feature Selection"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2013.11.024"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364024"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.04.001"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2010.01.001"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1023\/B:AMAI.0000018580.96245.c6"},{"key":"ref19","first-page":"507","article-title":"Laplacian score for feature selection","author":"he","year":"2005","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.019"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2012.6423690"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13193-6_32"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.01.006"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/CQR.2011.5996087"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.07.015"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.11.007"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/2048302"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.04.017"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/8727625\/08543584.pdf?arnumber=8543584","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:07:46Z","timestamp":1657746466000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8543584\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":210,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/comst.2018.2883147","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}