{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:33:06Z","timestamp":1764333186124,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1109\/icc45855.2022.9839256","type":"proceedings-article","created":{"date-parts":[[2022,8,11]],"date-time":"2022-08-11T19:37:11Z","timestamp":1660246631000},"page":"5070-5075","source":"Crossref","is-referenced-by-count":4,"title":["Real-time Identification of VPN Traffic based on Counting Bloom Filter and Chained Hash Table from Sampled Data in High-speed Networks"],"prefix":"10.1109","author":[{"given":"Hua","family":"Wu","sequence":"first","affiliation":[{"name":"Southeast University,School of Cyber Science and Engineering,Nanjing,China"}]},{"given":"Yujie","family":"Liu","sequence":"additional","affiliation":[{"name":"Southeast University,School of Cyber Science and Engineering,Nanjing,China"}]},{"given":"Guang","family":"Cheng","sequence":"additional","affiliation":[{"name":"Southeast University,School of Cyber Science and Engineering,Nanjing,China"}]},{"given":"Xiaoyan","family":"Hu","sequence":"additional","affiliation":[{"name":"Southeast University,School of Cyber Science and Engineering,Nanjing,China"}]}],"member":"263","reference":[{"key":"ref10","first-page":"321","article-title":"SSL VPN encrypted traffic identification based on hybrid Method","volume":"36","author":"wang","year":"2019","journal-title":"Computer Applications and Software"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS47876.2019.00133"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-019-00930-6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028803"},{"key":"ref14","first-page":"273","article-title":"Research on Flow Sampling Algorithm Based on Counting Bloom Filter","volume":"44","author":"zhai","year":"2018","journal-title":"Computer Engineering"},{"journal-title":"Introduction to Algorithms","year":"2009","author":"cormen","key":"ref15"},{"key":"ref16","first-page":"263","article-title":"Traffic data repository at the wide project","author":"cho","year":"2000","journal-title":"Proceedings of USENIX 2000 Annual Technical Conference FREENIX Track"},{"key":"ref4","first-page":"135","article-title":"High-Speed Network Traffic Measurement Method","volume":"25","author":"zhou","year":"2014","journal-title":"Journal of Software"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1901"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2982003"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2933358"},{"key":"ref8","first-page":"407","article-title":"Characterization of encrypted and VPN traffic using time-related","author":"lashkari","year":"2016","journal-title":"Proceedings of the 2nd International Conference on Information Systems Security and Privacy"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.03.002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1856\/1\/012014"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2019.1688731"},{"key":"ref9","first-page":"23","article-title":"Detection and recognition of VPN encrypted traffic based on segmented entropy distribution","volume":"11","author":"tang","year":"2020","journal-title":"Security in Cyberspace"}],"event":{"name":"ICC 2022 - IEEE International Conference on Communications","start":{"date-parts":[[2022,5,16]]},"location":"Seoul, Korea, Republic of","end":{"date-parts":[[2022,5,20]]}},"container-title":["ICC 2022 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9837954\/9838246\/09839256.pdf?arnumber=9839256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T20:05:43Z","timestamp":1663013143000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9839256\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icc45855.2022.9839256","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]}}}