{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:29:27Z","timestamp":1730287767820,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/padsw.2018.8644617","type":"proceedings-article","created":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T23:23:38Z","timestamp":1550791418000},"page":"77-84","source":"Crossref","is-referenced-by-count":2,"title":["Leveraging Inner-Connection of Message Sequence for Traffic Classification: A Deep Learning Approach"],"prefix":"10.1109","author":[{"given":"Renjie","family":"Jin","sequence":"first","affiliation":[]},{"given":"Guangtao","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Lyu","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Sheng","sequence":"additional","affiliation":[]},{"given":"Gongshen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Minglu","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677048"},{"key":"ref12","first-page":"259","article-title":"Revealing Encrypted WebRTC Traffic via Machine Learning Tools","volume":"4","author":"di mauro","year":"2015","journal-title":"12th IEEE International Joint Conference on e-Business and Telecommunications (ICETE&#x2018;15)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.10.061"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2007.06.014"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2017.19"},{"journal-title":"TensorFlow APIs","year":"0","key":"ref16"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-36784-7","author":"biersack","year":"2013","journal-title":"Data Traffic Monitoring and Analysis"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988742"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.09.010"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2012.02.023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700460"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2006.883010"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.09.013"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080119"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC.2010.5584648"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1800067"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.1097"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/978-3-540-31966-5_4","article-title":"Toward the Accurate Identification of Network Applications","author":"moore","year":"2005","journal-title":"International workshop on passive and active network measurement"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.307"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185358"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.1020"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.05.003"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2014.6785298"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162679"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IMSCCS.2007.52"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36784-7_6"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"159","DOI":"10.11591\/eei.v6i2.608","article-title":"Improving K-NN Internet Traffic Classification Using Clustering and Principle Component Analysis","volume":"6","author":"paramita","year":"2017","journal-title":"Bulletin of Electrical Engineering and Informatics"}],"event":{"name":"2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS)","start":{"date-parts":[[2018,12,11]]},"location":"Singapore, Singapore","end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8635632\/8644527\/08644617.pdf?arnumber=8644617","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T08:08:38Z","timestamp":1643270918000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8644617\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/padsw.2018.8644617","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}