{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T10:24:17Z","timestamp":1774952657376,"version":"3.50.1"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/nof.2018.8598055","type":"proceedings-article","created":{"date-parts":[[2019,1,3]],"date-time":"2019-01-03T18:06:41Z","timestamp":1546538801000},"page":"68-75","source":"Crossref","is-referenced-by-count":23,"title":["A Multi-level Internet Traffic Classifier Using Deep Learning"],"prefix":"10.1109","author":[{"given":"Ola","family":"Salman","sequence":"first","affiliation":[]},{"given":"Imad H.","family":"Elhajj","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[]},{"given":"Ayman","family":"Kayssi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","year":"0","journal-title":"Sickit-learn"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref30","article-title":"Going deeper with convolutions","author":"szegedy","year":"2014"},{"key":"ref36","year":"0","journal-title":"ISCX TOR-non-TOR dataset"},{"key":"ref35","year":"0"},{"key":"ref34","year":"0","journal-title":"Imbalanced Learning"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-015-0114-6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.05.003"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198257"},{"key":"ref14","article-title":"Early Recognition of Encrypted Applications","author":"bernaille","year":"2007","journal-title":"Proc 8th International Conference Passive and Active Measurement Conference"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2016.7737226"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2017.7876241"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2016.7785327"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2012.6167418"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0077"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref4","article-title":"Toward the accurate identification of network applications","author":"moore","year":"2005","journal-title":"Proc Passive and Active Measurement Workshop (PAM2005)"},{"key":"ref27","year":"0","journal-title":"dpkt python library"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIM.2015.7381869"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2320577"},{"key":"ref29","article-title":"ImageNet Classification with Deep Convolutional Neural Networks","author":"krizhevsky","year":"2012","journal-title":"Proc Neural Information and Processing Systems"},{"key":"ref5","article-title":"Internet traffic classification ? based on flows&#x2019; statistical properties with machine learning","volume":"27","author":"vl?du?u","year":"2017","journal-title":"International Journal of Network Management"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162679"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.08.021"},{"key":"ref2","article-title":"Challenges in Network Application Identification","author":"tongaonkar","year":"2012","journal-title":"USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2012.11.004"},{"key":"ref1","article-title":"Cisco visual networking index, the zettabyte era&#x2014;Trends and analysis","year":"2017","journal-title":"Cisco white paper"},{"key":"ref20","article-title":"The applications of deep learning on traffic identification","author":"wang","year":"2015","journal-title":"BlackHat USA"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004872"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"ref24","article-title":"Deep Packet: A Novel Approach for Encrypted Traffic Classification Using Deep Learning","author":"lotfollahi","year":"2017"},{"key":"ref23","year":"0","journal-title":"ISCX VPN-non-VPN dataset"},{"key":"ref26","year":"0","journal-title":"TensorFlow&#x2122;"},{"key":"ref25","year":"0"}],"event":{"name":"2018 9th International Conference on the Network of the Future (NOF)","location":"Poznan","start":{"date-parts":[[2018,11,19]]},"end":{"date-parts":[[2018,11,21]]}},"container-title":["2018 9th International Conference on the Network of the Future (NOF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8592609\/8597588\/08598055.pdf?arnumber=8598055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T19:55:23Z","timestamp":1643140523000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8598055\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/nof.2018.8598055","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}