{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:57:50Z","timestamp":1742389070366,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,12]]},"DOI":"10.1109\/pccc.2008.4745138","type":"proceedings-article","created":{"date-parts":[[2009,1,16]],"date-time":"2009-01-16T11:04:49Z","timestamp":1232103889000},"page":"201-208","source":"Crossref","is-referenced-by-count":15,"title":["Analysis of Peer-to-Peer Traffic Using a Behavioural Method Based on Entropy"],"prefix":"10.1109","author":[{"given":"Joao V. P.","family":"Gomes","sequence":"first","affiliation":[]},{"given":"Pedro R. M.","family":"Inacio","sequence":"additional","affiliation":[]},{"given":"Mario M.","family":"Freire","sequence":"additional","affiliation":[]},{"given":"Manuela","family":"Pereira","sequence":"additional","affiliation":[]},{"given":"Paulo P.","family":"Monteiro","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.4304\/jcm.1.7.36-46"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.826277"},{"key":"15","article-title":"are file swapping networks cacheable? characterizing p2p traffic","author":"leibowitz","year":"2002","journal-title":"Proc 10th Int'l Workshop Web Content Caching and Distribution"},{"key":"16","article-title":"a traffic identification method and evaluations for a pure p2p application","author":"ohzahata","year":"2005","journal-title":"Proceedings of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028804"},{"key":"14","first-page":"229","article-title":"blinc: multilevel traffic classification in the dark","volume":"35","author":"karagiannis","year":"2005","journal-title":"Proceedings of the ACM SIGCOMM '05 Conference on Applications Technologies Architectures and Protocols for Computer Communications"},{"article-title":"file-sharing in the internet: a characterization of p2p traffic in the backbone","year":"2003","author":"karagiannis","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2004.1378239"},{"key":"21","first-page":"12","article-title":"a measurement-based traffic profile of the edonkey filesharing service","volume":"3015","author":"tutschku","year":"2004","journal-title":"LNCS"},{"year":"0","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402983"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","first-page":"383","article-title":"the evolution of the peer-to-peer file sharing industry and the security risks for users","author":"johnson","year":"2008","journal-title":"Proceedings of the 41st Hawaii International Conference on System Sciences"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2006.34"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CCCM.2008.382"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282386"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129589"},{"key":"9","article-title":"traffic measurements of p2p systems","author":"ilie","year":"2004","journal-title":"Proceedings of 2nd Swedish National Computer Networking Workshop"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254309"}],"event":{"name":"2008 IEEE International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2008,12,7]]},"location":"Austin, TX, USA","end":{"date-parts":[[2008,12,9]]}},"container-title":["2008 IEEE International Performance, Computing and Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4712735\/4745069\/04745138.pdf?arnumber=4745138","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T15:52:02Z","timestamp":1489765922000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4745138\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/pccc.2008.4745138","relation":{},"subject":[],"published":{"date-parts":[[2008,12]]}}}