{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:10:40Z","timestamp":1742393440150},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/lcn.2010.5735770","type":"proceedings-article","created":{"date-parts":[[2011,3,22]],"date-time":"2011-03-22T15:07:36Z","timestamp":1300806456000},"page":"536-543","source":"Crossref","is-referenced-by-count":6,"title":["Rapid Identification of BitTorrent traffic"],"prefix":"10.1109","author":[{"given":"Jason","family":"But","sequence":"first","affiliation":[]},{"given":"Philip","family":"Branch","sequence":"additional","affiliation":[]},{"given":"Tung","family":"Le","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2007.6"},{"key":"ref11","first-page":"474","article-title":"Empirical Analysis of Application-Level Traffic Classification Using Supervised Machine Learning","author":"park","year":"2008","journal-title":"Proceedings of the 11th Asia-Pacific Symposium on Network Operations and Management (APNOMS08)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.03.001"},{"key":"ref13","article-title":"A Novel Self-Learning Architecture for p2p Traffic Classification in High Speed Networks","author":"keralapura","year":"2009","journal-title":"Computer Networks vol In Press Corrected Proof"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1326257.1326279"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1542245.1542266"},{"journal-title":"Traffic Measurement Data Repository","year":"2010","key":"ref16"},{"key":"ref4","article-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"witten","year":"2005","journal-title":"Morgan Kaufmann Series in Data Management Systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2006.322122"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2005.35"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129589"},{"key":"ref8","first-page":"265","article-title":"Towards the Detection of Encrypted BitTorrent Traffic Through Deep Packet Inspection","author":"david","year":"2009","journal-title":"International Conference on Security Technology (SecTech 2009)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"journal-title":"Internet Study 2008\/2009","year":"2010","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689209"},{"article-title":"Incentives Build Robustness in BitTorrent","year":"0","author":"cohen","key":"ref1"}],"event":{"name":"2010 IEEE 35th Conference on Local Computer Networks (LCN 2010)","start":{"date-parts":[[2010,10,10]]},"location":"Denver, CO, USA","end":{"date-parts":[[2010,10,14]]}},"container-title":["IEEE Local Computer Network Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5729427\/5735635\/05735770.pdf?arnumber=5735770","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T02:11:54Z","timestamp":1490062314000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5735770\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/lcn.2010.5735770","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}