{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:07:30Z","timestamp":1730275650366,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,31]],"date-time":"2021-10-31T00:00:00Z","timestamp":1635638400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,31]],"date-time":"2021-10-31T00:00:00Z","timestamp":1635638400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,31]],"date-time":"2021-10-31T00:00:00Z","timestamp":1635638400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,31]]},"DOI":"10.1109\/isncc52172.2021.9615659","type":"proceedings-article","created":{"date-parts":[[2021,11,25]],"date-time":"2021-11-25T15:32:15Z","timestamp":1637854335000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Evaluation and Optimization of learning-based DNS over HTTPS Traffic Classification"],"prefix":"10.1109","author":[{"given":"Yue","family":"Li","sequence":"first","affiliation":[]},{"given":"Abdulhalim","family":"Dandoush","sequence":"additional","affiliation":[]},{"given":"Ji","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024583"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-S.2019.00015"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.05.109"},{"key":"ref12","article-title":"How dns over https is reshaping privacy, performance, and policy in the internet ecosystem","author":"kevin borgolteand","year":"2019","journal-title":"in Research Conference on Communication Information and Internet Policy (TPRC)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.12691\/jcsa-8-2-2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409192"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/3ICT51146.2020.9312004"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00514-X"},{"key":"ref17","article-title":"Decision tree classifiers for computer intrusion detection","volume":"4","author":"li","year":"2001","journal-title":"Scalable Comput Pract Exp"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.06.047"},{"key":"ref19","first-page":"218","article-title":"1d cnn based network intrusion detection with normalization on imbalanced data","author":"meliboev","year":"2020","journal-title":"International Conference on Artificial Intelligence in Information and Communication (ICAIIC)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444928"},{"journal-title":"An analysis of godlua backdoor","year":"2019","author":"turing","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-015-9329-8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8484"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICGS3.2019.8688016"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2019.00018"},{"journal-title":"Psixbot continues to evolve with updated dns infrastructure","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2836950"},{"journal-title":"How to protect from malware that abuses dns over https or doh","year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SECUREWARE.2007.4385307"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00026"},{"journal-title":"Domain name system (dns) security","year":"1999","author":"davidowicz","key":"ref1"},{"key":"ref20","first-page":"1222","article-title":"Applying convolutional neural network for network intrusion detection","author":"ravi","year":"2017","journal-title":"In International Conference on Advances in Computing Communications and Informatics (ICACCI)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2018.8615300"},{"journal-title":"Understanding Confusion Matrix","year":"0","author":"narkhede","key":"ref24"},{"journal-title":"Text understanding from scratch","year":"2016","author":"zhang","key":"ref23"},{"key":"ref26","article-title":"From distributed machine learning to federated learning: A survey","author":"liu","year":"2021","journal-title":"arXiv preprint arXiv 2104 14362"},{"key":"ref25","article-title":"Interpretable deep learning: Interpretation, interpretability, trustworthiness, and beyond","author":"li","year":"2021","journal-title":"arXiv preprint arXiv 2103 11383"}],"event":{"name":"2021 International Symposium on Networks, Computers and Communications (ISNCC)","start":{"date-parts":[[2021,10,31]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2021,11,2]]}},"container-title":["2021 International Symposium on Networks, Computers and Communications (ISNCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9615623\/9615626\/09615659.pdf?arnumber=9615659","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:52:47Z","timestamp":1652187167000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9615659\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,31]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/isncc52172.2021.9615659","relation":{},"subject":[],"published":{"date-parts":[[2021,10,31]]}}}