{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:22:11Z","timestamp":1740100931329,"version":"3.37.3"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"publisher","award":["2021YFB3101403"],"award-info":[{"award-number":["2021YFB3101403"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019059","name":"Jiangsu Provincial Key Laboratory of Network and Information Security","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100019059","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1109\/icccn54977.2022.9868928","type":"proceedings-article","created":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T20:26:54Z","timestamp":1662409614000},"page":"1-10","source":"Crossref","is-referenced-by-count":1,"title":["Real-time Application Identification of RTC Media Streams via Encrypted Traffic Analysis"],"prefix":"10.1109","author":[{"given":"Hua","family":"Wu","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University,Nanjing,China"}]},{"given":"Chengfei","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University,Nanjing,China"}]},{"given":"Guang","family":"Cheng","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University,Nanjing,China"}]},{"given":"Xiaoyan","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University,Nanjing,China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1145\/1921168.1921179"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ICACCI.2013.6637152"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ICECCO.2013.6718232"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1016\/j.comnet.2021.108637"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/1282380.1282386"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ICCCS52626.2021.9449097"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TNET.2016.2562259"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/EuroSP.2016.40"},{"key":"ref17","article-title":"Deep packet: A novel approach for encrypted traffic classification using deep learning","author":"lotfollahi","year":"2017","journal-title":"Soft Computing"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/ISI.2017.8004872"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ACCESS.2021.3081504"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/TNSM.2020.3028197"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/INFCOMW.2010.5466645"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/1568613.1568616"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/SURV.2013.100613.00161"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.ins.2020.05.035"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1016\/j.patcog.2017.09.005"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/MCOM.2019.1800819"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1016\/j.comnet.2020.107213"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TNSM.2019.2899085"},{"key":"ref2","first-page":"130","article-title":"Real-time net-work traffic classification based on cdh pattern matching","author":"li","year":"2018","journal-title":"2018 14th International Conference on Computational Intelligence and Security (CIS) CIS"},{"key":"ref9","first-page":"1","article-title":"Online classification of rtc traffic","author":"gianluca","year":"2021","journal-title":"2021 IEEE 18th Annual Consumer Communications Networking Conference (CCNC)"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/j.comnet.2019.04.004"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162891"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"ref21","first-page":"329","article-title":"Encrypted traffic classification with a con-volutional long short-term memory neural network","author":"zou","year":"2018","journal-title":"In 2018 IEEE 20th International Conference on High Performance Computing and Communications IEEE 16th International Conference on Smart City IEEE 4th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS)"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484477"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TNSM.2021.3071441"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162884"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/GLOBECOM42002.2020.9322309"}],"event":{"name":"2022 International Conference on Computer Communications and Networks (ICCCN)","start":{"date-parts":[[2022,7,25]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2022,7,28]]}},"container-title":["2022 International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9868842\/9868856\/09868928.pdf?arnumber=9868928","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T21:04:23Z","timestamp":1664226263000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9868928\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icccn54977.2022.9868928","relation":{},"subject":[],"published":{"date-parts":[[2022,7]]}}}