{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:32:10Z","timestamp":1725492730509},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/icc.2009.5199062","type":"proceedings-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T20:20:30Z","timestamp":1250022030000},"page":"1-5","source":"Crossref","is-referenced-by-count":5,"title":["Identifying the Use of Data\/Voice\/Video-Based P2P Traffic by DNS-Query Behavior"],"prefix":"10.1109","author":[{"given":"H.-S.","family":"Wu","sequence":"first","affiliation":[]},{"given":"N.-F.","family":"Huang","sequence":"additional","affiliation":[]},{"given":"G.-H.","family":"Lin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"15"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080183"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.312"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080112"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-31966-5_4","article-title":"toward the accurate identification of network applications","author":"moore","year":"2005","journal-title":"Passive and Active Measurement Workshop"},{"year":"0","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.826277"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060319"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"7","article-title":"snort - lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"LISA '99"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/945472.945475"},{"article-title":"file-sharing in the internet: a characterization of p2p traffic in the backbone","year":"2003","author":"karagiannis","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948214"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1145\/1090191.1080119","article-title":"blinc: multilevel traffic classification in the dark","author":"karagiannis","year":"2005","journal-title":"ACM SIGCOMM"},{"key":"8","article-title":"dynamic application-layer protocol analysis for network intrusion detection","author":"dreger","year":"2006","journal-title":"Usenix Security"}],"event":{"name":"ICC 2009 - 2009 IEEE International Conference on Communications","start":{"date-parts":[[2009,6,14]]},"location":"Dresden, Germany","end":{"date-parts":[[2009,6,18]]}},"container-title":["2009 IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5198563\/5198564\/05199062.pdf?arnumber=5199062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T22:44:47Z","timestamp":1497825887000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5199062\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icc.2009.5199062","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}