{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T04:25:11Z","timestamp":1726719911738},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1109\/noms54207.2022.9789896","type":"proceedings-article","created":{"date-parts":[[2022,6,9]],"date-time":"2022-06-09T21:21:22Z","timestamp":1654809682000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["On Learning Hierarchical Embeddings from Encrypted Network Traffic"],"prefix":"10.1109","author":[{"given":"Nikolas","family":"Wehner","sequence":"first","affiliation":[{"name":"University of W&#x00FC;rzburg,W&#x00FC;rzburg,Germany"}]},{"given":"Markus","family":"Ring","sequence":"additional","affiliation":[{"name":"Coburg University of Applied Sciences and Arts,Coburg,Germany"}]},{"given":"Joshua","family":"Sch\u00fcler","sequence":"additional","affiliation":[{"name":"University of W&#x00FC;rzburg,W&#x00FC;rzburg,Germany"}]},{"given":"Andreas","family":"Hotho","sequence":"additional","affiliation":[{"name":"University of W&#x00FC;rzburg,W&#x00FC;rzburg,Germany"}]},{"given":"Tobias","family":"Ho\u00dffeld","sequence":"additional","affiliation":[{"name":"University of W&#x00FC;rzburg,W&#x00FC;rzburg,Germany"}]},{"given":"Michael","family":"Seufert","sequence":"additional","affiliation":[{"name":"University of W&#x00FC;rzburg,W&#x00FC;rzburg,Germany"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0087-2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2565585.2565600"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987459"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4728-4"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2019.8685901"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/285243.285256"},{"key":"ref16","first-page":"4171","article-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding","author":"devlin","year":"2019","journal-title":"Conference of the North American Chapter of the Association for Computational Linguistics Human Language Technologies (NAACL)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00051"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"article-title":"Distributed representations of words and phrases and their compositionality","year":"2013","author":"mikolov","key":"ref19"},{"key":"ref28","first-page":"1188","article-title":"Distributed Representations of Sentences and Documents","author":"le","year":"2014","journal-title":"International Conference on Machine Learning"},{"journal-title":"Check Point Research Tech Rep","article-title":"Cyber Security Report 2020","year":"2020","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78556-1_19"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2360940"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"year":"2019","key":"ref29","article-title":"Tcp flags"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0630-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2851072"},{"journal-title":"NetMarketShare Tech Rep","article-title":"HTTP vs HTTPS","year":"2021","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2518025.2518033"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref1","article-title":"YoMo: A YouTube Application Comfort Monitoring Tool","author":"staehle","year":"2010","journal-title":"1st Workshop of Quality of Experience for Multimedia Content Sharing (QoEMCS)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939823"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.findings-acl.70"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3414032"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.93"},{"article-title":"Netflow and word2vec -&#x00BF; flow2vec","year":"2016","author":"henry","key":"ref23"},{"article-title":"Packet2vec: Utilizing word2vec for feature extraction in packet data","year":"2020","author":"goodman","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCT.2019.8711412"}],"event":{"name":"NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium","start":{"date-parts":[[2022,4,25]]},"location":"Budapest, Hungary","end":{"date-parts":[[2022,4,29]]}},"container-title":["NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9789703\/9789704\/09789896.pdf?arnumber=9789896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T17:54:09Z","timestamp":1726682049000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9789896\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/noms54207.2022.9789896","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]}}}