{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:03:56Z","timestamp":1758845036603},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/ddecs.2019.8724658","type":"proceedings-article","created":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T22:52:12Z","timestamp":1559256732000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Acceleration of Feature Extraction for Real-Time Analysis of Encrypted Network Traffic"],"prefix":"10.1109","author":[{"given":"Roman","family":"Vrana","sequence":"first","affiliation":[]},{"given":"Jan","family":"Korenek","sequence":"additional","affiliation":[]},{"given":"David","family":"Novak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"An entropy based encrypted traffic classifier","year":"0","author":"mamun","key":"ref4"},{"journal-title":"Application identification from encrypted trafficbased on characteristic changes by encryption","year":"0","author":"ata","key":"ref3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2010.5470752"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2747560"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0894"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2006.883010"},{"key":"ref8","article-title":"A survey of methods for encrypted traffic classification and analysis","author":"velan","year":"2014","journal-title":"International Journal of Network Management"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2014.6785319"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.12.002"},{"key":"ref9","article-title":"The WEKA workbench","author":"frank","year":"2016","journal-title":"Data Mining Practical Machine Learning Tools and Techniques"},{"journal-title":"Google Transparency Report","year":"2018","key":"ref1"}],"event":{"name":"2019 IEEE 22nd International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS)","start":{"date-parts":[[2019,4,24]]},"location":"Cluj-Napoca, Romania","end":{"date-parts":[[2019,4,26]]}},"container-title":["2019 IEEE 22nd International Symposium on Design and Diagnostics of Electronic Circuits &amp; Systems (DDECS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8718445\/8724630\/08724658.pdf?arnumber=8724658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:21:45Z","timestamp":1658262105000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8724658\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/ddecs.2019.8724658","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}