{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T09:02:45Z","timestamp":1773738165583,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,29]],"date-time":"2023-11-29T00:00:00Z","timestamp":1701216000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,29]],"date-time":"2023-11-29T00:00:00Z","timestamp":1701216000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,29]]},"DOI":"10.1109\/itnac59571.2023.10368511","type":"proceedings-article","created":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T19:30:40Z","timestamp":1703878240000},"page":"98-104","source":"Crossref","is-referenced-by-count":2,"title":["Meta-TFEN: A Multi-Modal Deep Learning Approach for Encrypted Malicious Traffic Detection"],"prefix":"10.1109","author":[{"given":"RuoYang","family":"Gu","sequence":"first","affiliation":[{"name":"Information Engineering University,Zhengzhou,China"}]},{"given":"JinLong","family":"Fei","sequence":"additional","affiliation":[{"name":"Information Engineering University,Zhengzhou,China"}]},{"given":"Hao","family":"Yu","sequence":"additional","affiliation":[{"name":"Information Engineering University,Zhengzhou,China"}]},{"given":"YueFei","family":"Zhu","sequence":"additional","affiliation":[{"name":"Information Engineering University,Zhengzhou,China"}]},{"given":"Kai","family":"Yang","sequence":"additional","affiliation":[{"name":"Information Engineering University,Zhengzhou,China"}]},{"given":"Fang","family":"Guo","sequence":"additional","affiliation":[{"name":"Information Engineering University,Zhengzhou,China"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Googles Transparency Report","year":"2022"},{"key":"ref2","volume-title":"ThreatLabz State of Encrypted Attacks 2022 Report","year":"2022"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WISES.2008.4623292"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6135854"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988742"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-94029-4_1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3029190"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19214-2_32"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-017-0306-6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3371676.3371697"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106944"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2747560"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2019.05610"},{"key":"ref16","article-title":"An empirical evaluation of generic convolutional and recurrent networks for sequence modeling[J]","author":"Bai","year":"2018","journal-title":"arXiv preprint"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3270101.3270105"},{"key":"ref19","volume-title":"Malware traffic network"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.01.064"}],"event":{"name":"2023 33rd International Telecommunication Networks and Applications Conference (ITNAC)","location":"Melbourne, Australia","start":{"date-parts":[[2023,11,29]]},"end":{"date-parts":[[2023,12,1]]}},"container-title":["2023 33rd International Telecommunication Networks and Applications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10368315\/10368472\/10368511.pdf?arnumber=10368511","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T00:18:54Z","timestamp":1705105134000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10368511\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,29]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/itnac59571.2023.10368511","relation":{},"subject":[],"published":{"date-parts":[[2023,11,29]]}}}