{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:19:09Z","timestamp":1725679149177},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/iwcmc.2011.5982807","type":"proceedings-article","created":{"date-parts":[[2011,9,12]],"date-time":"2011-09-12T17:59:27Z","timestamp":1315850367000},"page":"1795-1800","source":"Crossref","is-referenced-by-count":2,"title":["Detecting P2P traffic from the P2P flow graph"],"prefix":"10.1109","author":[{"given":"Jonghyun","family":"Kim","sequence":"first","affiliation":[]},{"given":"Khushboo","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Stephan","family":"Bohacek","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2005.35"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.11.005"},{"key":"ref12","article-title":"Inferring applications at the network layer using collective traffic statistics","author":"jin","year":"2010","journal-title":"ITC 2010"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080119"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298349"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1555349.1555356"},{"journal-title":"L7-filter","year":"0","key":"ref16"},{"journal-title":"Gnutella specification","year":"0","key":"ref17"},{"journal-title":"Limewire","year":"0","key":"ref18"},{"journal-title":"Nevis Networks","year":"0","key":"ref4"},{"journal-title":"Paloalto Networks","year":"0","key":"ref3"},{"key":"ref6","article-title":"Estimating P2P traffic volume at USC","author":"bartlett","year":"2007","journal-title":"Technical Report IST-TR-645"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028804"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162679"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICISP.2006.12"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.31979\/etd.xk6g-hh6t","article-title":"Peer-to-peer botnets: Analysis and detection","author":"morparia","year":"2008"},{"article-title":"Speed Up Your Site: Web Site Optimization","year":"2003","author":"king","key":"ref1"},{"key":"ref9","first-page":"13","article-title":"A new method for P2P traffic identification based on support vector machine","author":"wang","year":"2006","journal-title":"AIML"}],"event":{"name":"2011 7th International Wireless Communications and Mobile Computing Conference (IWCMC 2011)","start":{"date-parts":[[2011,7,4]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2011,7,8]]}},"container-title":["2011 7th International Wireless Communications and Mobile Computing Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5963770\/5982406\/05982807.pdf?arnumber=5982807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,15]],"date-time":"2019-06-15T11:15:33Z","timestamp":1560597333000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5982807\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2011.5982807","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}