{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:54:30Z","timestamp":1763193270385,"version":"3.45.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008118","name":"Shandong Academy of Sciences","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008118","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008118","name":"Shandong Academy of Sciences","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008118","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1109\/ijcnn64981.2025.11227646","type":"proceedings-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:46:15Z","timestamp":1763145975000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["DMT-DHIN: A Dynamic Heterogeneous Information Network Framework for Detecting Malicious Encrypted Traffic"],"prefix":"10.1109","author":[{"given":"Xiaotong","family":"Li","sequence":"first","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China"}]},{"given":"Xiaohui","family":"Han","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China"}]},{"given":"Hui","family":"Cui","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China"}]},{"given":"Lei","family":"Guo","sequence":"additional","affiliation":[{"name":"Shandong Normal University,Jinan,China"}]},{"given":"Hua","family":"Ding","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China"}]},{"given":"Chaoran","family":"Cui","sequence":"additional","affiliation":[{"name":"Shandong University of Finance and Economics,Jinan,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3071441"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3627673.3679968"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN60899.2024.10651222"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599762"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.01.064"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC50000.2020.9219609"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3051381"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2022.02.063"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583227"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2019.2940675"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107974"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IPCCC50635.2020.9391542"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3050608"},{"key":"ref16","first-page":"376","article-title":"Encrypted network traffic classification using a geometric learning model","volume-title":"2021 IFIP\/IEEE International Symposium on Integrated Network Management (IM).","author":"Huoh"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102632"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3227500"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3383851"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10448051"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.09.024"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4274139"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65390-3_17"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD61410.2024.10580328"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313562"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/s23135941"}],"event":{"name":"2025 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2025,6,30]]},"location":"Rome, Italy","end":{"date-parts":[[2025,7,5]]}},"container-title":["2025 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11227166\/11227148\/11227646.pdf?arnumber=11227646","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:52:29Z","timestamp":1763193149000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11227646\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ijcnn64981.2025.11227646","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]}}}