{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T08:21:14Z","timestamp":1768551674365,"version":"3.49.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100009532","name":"Ministry of the Interior of the Czech Republic","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100009532","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,4]]},"DOI":"10.1109\/csnet64211.2024.10851738","type":"proceedings-article","created":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T18:35:01Z","timestamp":1738089301000},"page":"213-221","source":"Crossref","is-referenced-by-count":1,"title":["Towards Identification of Network Applications in Encrypted Traffic"],"prefix":"10.1109","author":[{"given":"Ivana","family":"Burgetov\u00e1","sequence":"first","affiliation":[{"name":"Brno University of Technology,Faculty of Information Technology,Brno,Czech Republic"}]},{"given":"Ond\u0159ej","family":"Ry\u0161av\u00fd","sequence":"additional","affiliation":[{"name":"Brno University of Technology,Faculty of Information Technology,Brno,Czech Republic"}]},{"given":"Petr","family":"Matou\u0161ek","sequence":"additional","affiliation":[{"name":"Brno University of Technology,Faculty of Information Technology,Brno,Czech Republic"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-017-0306-6"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9020856"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3442520.3442529"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355601"},{"key":"ref5","article-title":"Accurate TLS fingerprinting using destination context and knowledge bases","volume":"abs\/2009.01939","author":"Anderson","year":"2020","journal-title":"CoRR"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68734-2_1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004872"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2019.2940675"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5246"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc8446"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc8701"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6066"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7301"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"key":"ref16","volume-title":"Data Mining: Concepts and Techniques","author":"Han","year":"2011"},{"key":"ref17","article-title":"Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information","author":"Claise","year":"2013","journal-title":"RFC 7011, IETF"}],"event":{"name":"2024 8th Cyber Security in Networking Conference (CSNet)","location":"Paris, France","start":{"date-parts":[[2024,12,4]]},"end":{"date-parts":[[2024,12,6]]}},"container-title":["2024 8th Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10851715\/10851472\/10851738.pdf?arnumber=10851738","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T06:45:12Z","timestamp":1738133112000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10851738\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,4]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/csnet64211.2024.10851738","relation":{},"subject":[],"published":{"date-parts":[[2024,12,4]]}}}