{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T15:51:53Z","timestamp":1764172313650,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/pccc.2017.8280479","type":"proceedings-article","created":{"date-parts":[[2018,2,5]],"date-time":"2018-02-05T17:31:28Z","timestamp":1517851888000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Auto-identification of background traffic based on autonomous periodic interaction"],"prefix":"10.1109","author":[{"given":"Chang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Lingwu","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Junzheng","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"S.M.","family":"Yiu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EBISS.2010.5473532"},{"key":"ref11","first-page":"38","article-title":"Http botnet detection using adaptive learning rate multilayer feed-forward neural network","author":"venkatesh","year":"2012","journal-title":"IFIP International Workshop on Information Security Theory and Practice"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/RAICS.2013.6745439"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE.2015.7298339"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISCI.2013.6612403"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISTEL.2012.6483133"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815713"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684212"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398813"},{"key":"ref19","first-page":"1","article-title":"The impact of background network traffic on foreground network traffic","author":"nychis","year":"2001","journal-title":"Proc IEEE Global Telecomm Conf GLOBECOM"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5198605"},{"key":"ref3","first-page":"1","article-title":"Characterizing the utility of smartphone background traffic","author":"lei meng","year":"2014","journal-title":"23rd International Conference on Computer Communication and Networks ICCCN 2014"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WiCOM.2012.6478491"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2179298.2179332"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CQR.2015.7129082"},{"journal-title":"Qualcomm &#x201C; Network socket request manager (nsrm)","year":"0","key":"ref7"},{"journal-title":"Incapsula","article-title":"Bot traffic report 2016","year":"0","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187844"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417076"},{"key":"ref20","first-page":"25","article-title":"Proposal and simulation of ue-based network control scheme for avoiding lte signaling spike","volume":"114","author":"arai","year":"2014","journal-title":"IEICE Tech Report"},{"key":"ref22","first-page":"12","author":"combs","year":"2007","journal-title":"Wireshark"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26135-5_11"},{"key":"ref23","first-page":"80","article-title":"The universal book of mathematics: From abracadabra to zeno's paradoxes","volume":"39","author":"arney","year":"2005","journal-title":"Mathematics and Computer Education"}],"event":{"name":"2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2017,12,10]]},"location":"San Diego, CA","end":{"date-parts":[[2017,12,12]]}},"container-title":["2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8269763\/8280427\/08280479.pdf?arnumber=8280479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,12]],"date-time":"2018-03-12T17:49:55Z","timestamp":1520876995000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8280479\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/pccc.2017.8280479","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}