{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:43:59Z","timestamp":1756385039054,"version":"3.40.5"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,28]]},"DOI":"10.1109\/iccworkshops57953.2023.10283675","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T17:54:22Z","timestamp":1698083662000},"page":"1259-1264","source":"Crossref","is-referenced-by-count":2,"title":["Mining classification algorithms to identify flooding attacks through the HTTP\/3 protocol"],"prefix":"10.1109","author":[{"given":"Adam","family":"Kadi","sequence":"first","affiliation":[{"name":"ENSICAEN Normandie Univ, UNICAEN, CNRS GREYC,Caen,France,14000"}]},{"given":"Lyes","family":"Khoukhi","sequence":"additional","affiliation":[{"name":"ENSICAEN Normandie Univ, UNICAEN, CNRS GREYC,Caen,France,14000"}]},{"given":"Jouni","family":"Viinikka","sequence":"additional","affiliation":[{"name":"R&#x0026;D 6cure,Caen,France"}]},{"given":"Pierre-Edouard","family":"Fabre","sequence":"additional","affiliation":[{"name":"R&#x0026;D 6cure,Caen,France"}]}],"member":"263","reference":[{"key":"ref13","article-title":"A quic(k) way through your firewall?","author":"gbur","year":"2021","journal-title":"CoRR"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76481-8_19"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps45667.2019.9024637"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487840"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11040602"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.21236\/ADA400003"},{"journal-title":"The quic transport protocol Design and internet-scale deployment","year":"2017","author":"langley","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9114"},{"key":"ref17","volume":"173","author":"pacheco","year":"2020","journal-title":"A framework to classify heterogeneous Internet traffic with Machine Learning and Deep Learning techniques for satellite communications"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7011"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3161479"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23233"},{"key":"ref4","first-page":"1","author":"abdeldjalil chekired","year":"2019","journal-title":"Fog-based distributed intrusion detection system against false metering attacks in smart grid"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.21"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3014870"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2013.000029"}],"event":{"name":"2023 IEEE International Conference on Communications Workshops (ICC Workshops)","start":{"date-parts":[[2023,5,28]]},"location":"Rome, Italy","end":{"date-parts":[[2023,6,1]]}},"container-title":["2023 IEEE International Conference on Communications Workshops (ICC Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10283478\/10283479\/10283675.pdf?arnumber=10283675","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T19:00:28Z","timestamp":1699902028000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10283675\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,28]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iccworkshops57953.2023.10283675","relation":{},"subject":[],"published":{"date-parts":[[2023,5,28]]}}}