{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T06:51:34Z","timestamp":1764053494501,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856712","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T17:16:34Z","timestamp":1487265394000},"page":"279-285","source":"Crossref","is-referenced-by-count":7,"title":["User profiling from network traffic via novel application-level interactions"],"prefix":"10.1109","author":[{"given":"Gaseb","family":"Alotibi","sequence":"first","affiliation":[]},{"given":"Nathan","family":"Clarke","sequence":"additional","affiliation":[]},{"family":"Fudong Li","sequence":"additional","affiliation":[]},{"given":"Steven","family":"Furnell","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IC4.2015.7375719"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-128X(199703)11:2<111::AID-CEM455>3.0.CO;2-V"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/23.589532"},{"key":"ref30","first-page":"68","article-title":"Forensic Investigation of Network Traffic: A Study into the Derivation of Application-Level features from Network-Level Metadata","author":"li","year":"2015","journal-title":"Big data Could and Security (ICT-BDCS 2015)"},{"year":"0","key":"ref35","article-title":"Which ports need to be open to use Skype for Windows desktop"},{"key":"ref34","article-title":"Application of Keystrock Analysis to Mobile Text Messageing","author":"clarke","year":"2004","journal-title":"Proceedings of the 3rd Security Conference"},{"year":"0","key":"ref10","article-title":"2015 Information security breaches survey"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1388969.1389001"},{"key":"ref12","first-page":"203","article-title":"Anomalous Payload-Based Network Intrusion Detection","author":"wang","year":"2004","journal-title":"Proceedings of the 7th International Symposium RAID 2004"},{"journal-title":"Security information and Event managemnt (SIEM) use case","year":"2015","key":"ref13"},{"year":"0","key":"ref14","article-title":"Cisco Visual Networking Index: Forecast and Methodology, 2013&#x2013;2018"},{"article-title":"System for packet filtering of data packet at a computer network interface","year":"1995","author":"baehr","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/49.464717"},{"key":"ref17","first-page":"91","article-title":"Packet Sniffer-A comparative characteristic evaluation study","author":"awodele","year":"2015","journal-title":"Proceedings of Informing Science & IT Education Conference (InSITE)"},{"journal-title":"Password Cracking Using Cain & Abel","year":"2016","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0156-6"},{"journal-title":"Top 15 Most Popular Websites","year":"2016","key":"ref28"},{"journal-title":"UK National Statistics","year":"0","key":"ref4"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1016\/j.jnca.2012.12.020","article-title":"A survey of network flow applications","volume":"36","author":"li","year":"0","journal-title":"Journal of Network and Computer Applications"},{"year":"0","key":"ref3","article-title":"Introduction to Google Docs"},{"year":"2016","key":"ref6","article-title":"Application downloaded"},{"key":"ref29","first-page":"1","article-title":"Behavioral-Based Feature Abstraction from Network Traffic","author":"alotibi","year":"2015","journal-title":"International Conference on Cyber Warfare and Security"},{"journal-title":"The UK is now a smartphone society","year":"2015","key":"ref5"},{"year":"0","key":"ref8","article-title":"Net Losses:Estimating the Global cost of cybercrime"},{"year":"2016","key":"ref7","article-title":"Security Threats"},{"year":"0","key":"ref2","article-title":"Office 365 for business FAQ"},{"year":"0","key":"ref9","article-title":"2014 Data Breach Investigations Report"},{"year":"0","key":"ref1","article-title":"Internet live stats"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CONECT.2003.1231477"},{"key":"ref22","first-page":"452","article-title":"specialized hardware for deep network packet filtering","author":"cho","year":"2002","journal-title":"Proceeding of the 12th Conf of the Int"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185360"},{"year":"0","key":"ref24","article-title":"NetFlow version 9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5101"},{"year":"0","key":"ref26","article-title":"Juniper flow monitoring"},{"year":"0","key":"ref25","article-title":"sflow"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2016,12,5]]},"location":"Barcelona, Spain","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856712.pdf?arnumber=7856712","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T15:53:50Z","timestamp":1568822030000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7856712\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856712","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}