{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T21:02:48Z","timestamp":1768338168249,"version":"3.49.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/icnp.2016.7785325","type":"proceedings-article","created":{"date-parts":[[2016,12,19]],"date-time":"2016-12-19T21:55:41Z","timestamp":1482184541000},"page":"1-6","source":"Crossref","is-referenced-by-count":20,"title":["Enhanced telemetry for encrypted threat analytics"],"prefix":"10.1109","author":[{"given":"David","family":"McGrew","sequence":"first","affiliation":[]},{"given":"Blake","family":"Anderson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"139","article-title":"BotMiner: Clustering Analysis of Network Traffic for Protocol-and Structure-Independent Botnet Detection","volume":"5","author":"gu","year":"0"},{"key":"ref11","first-page":"1519","article-title":"An Interior-Point Method for Large-Scale 11-Regularized Logistic Regression","volume":"8","author":"koh","year":"2007","journal-title":"Journal of Machine Learning Research"},{"key":"ref12","author":"mcgrew","year":"2016","journal-title":"Joy"},{"key":"ref13","year":"2016","journal-title":"Open Information Security Foundation Suricata"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"ref15","first-page":"229","article-title":"Snort-Lightweight Intrusion Detection for Networks","author":"roesch","year":"1999","journal-title":"USENIX 13th Systems Administration Conference - LISA'99"},{"key":"ref16","author":"sanders","year":"2013","journal-title":"Applied Network Security Monitoring - Collection Detection and Analysis"},{"key":"ref17","year":"2016","journal-title":"Splunk Inc Splunk"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413217"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.86"},{"key":"ref4","year":"2016","journal-title":"ThreatGRID"},{"key":"ref3","year":"0","journal-title":"The SiLK Provisioning Spreadsheet"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.12"},{"key":"ref5","author":"anderson","year":"2016","journal-title":"Deciphering Malware's use of TLS (without Decryption)"},{"key":"ref8","author":"claise","year":"2013","journal-title":"Specification of the IP Flow Information Export (IPFIX) protocol for the exchange of flow information"},{"key":"ref7","author":"claise","year":"2013","journal-title":"Cisco Systems NetFlow Services Export Version 9"},{"key":"ref2","year":"0","journal-title":"Most Internet Traffic will be Encrypted by Year End Here's Why"},{"key":"ref1","year":"0","journal-title":"Are Cybercriminals Hiding in Your SSL Traffic?"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa9375"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_12"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2005.35"}],"event":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","location":"Singapore","start":{"date-parts":[[2016,11,8]]},"end":{"date-parts":[[2016,11,11]]}},"container-title":["2016 IEEE 24th International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7774710\/7784399\/07785325.pdf?arnumber=7785325","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T03:37:54Z","timestamp":1507001874000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7785325\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icnp.2016.7785325","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}