{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T08:11:16Z","timestamp":1744186276266,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/sds.2018.8370427","type":"proceedings-article","created":{"date-parts":[[2018,6,4]],"date-time":"2018-06-04T23:25:33Z","timestamp":1528154733000},"page":"87-92","source":"Crossref","is-referenced-by-count":6,"title":["Pushing intelligence to the network edge"],"prefix":"10.1109","author":[{"given":"Ola","family":"Salman","sequence":"first","affiliation":[]},{"given":"Louma","family":"Chaddad","sequence":"additional","affiliation":[]},{"given":"Imad H.","family":"Elhajj","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[]},{"given":"Ayman","family":"Kayssi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref33"},{"year":"0","key":"ref32"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/SNPD.2017.8022711"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.procs.2016.06.047","article-title":"&#x2018;Random Forest Modeling for Network Intrusion Detection System","volume":"89","author":"farnaaz","year":"2016","journal-title":"Procedia Computer Science"},{"year":"0","key":"ref35"},{"year":"0","key":"ref34"},{"key":"ref10","article-title":"Internet traffic classification based on flows' statistical properties with machine learning","volume":"27","author":"vladu?u","year":"2017","journal-title":"International Journal of Network Management"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TNET.2014.2320577"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1016\/j.comnet.2015.08.021"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/1162678.1162679"},{"key":"ref14","article-title":"Internet traffic identification using machine learning techniques","author":"erman","year":"2006","journal-title":"Proc of 49th IEEE Global Telecommunications Conference (GLOBECOM 2006)"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1016\/j.jcss.2012.11.004"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/s11235-015-0114-6"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1016\/j.comnet.2009.05.003"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/1163593.1163596"},{"key":"ref19","article-title":"Automatically extracting fields from unknown network protocols","author":"gopalratnam","year":"2006","journal-title":"First Workshop on Tackling Computer Systems Problems with Machine Learning Techniques (SysML06)"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/978-3-319-11227-5_23","article-title":"&#x2018;Classification Mechanism for IoT Devices towards Creating a Security Framework","volume":"321","author":"jincy","year":"2015","journal-title":"Intelligent Distributed Computing"},{"key":"ref4","article-title":"Toward the accurate identification of network applications","author":"moore","year":"2005","journal-title":"Proc Passive Active Meas (PAM) Workshop"},{"year":"2017","author":"hafeez","journal-title":"&#x2018;Toward Secure Edge Networks Taming Device-to-Device (D2D) Communication in IoT","key":"ref27"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/ICDIM.2015.7381869"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ICCNC.2017.7876241"},{"key":"ref29","first-page":"635","article-title":"Network Intrusion Detection Based on Random Forest and Support Vector Machine","author":"chang","year":"2017","journal-title":"2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/APNOMS.2016.7737226"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ICCNC.2012.6167418"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ICNP.2016.7785327"},{"key":"ref2","article-title":"Challenges in Network Application Identification","author":"tongaonkar","year":"2012","journal-title":"USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TrustCom.2016.0077"},{"year":"2017","journal-title":"Cisco Visual Networking Index The Zettabyte Era&#x2014;Trends and Analysis","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/1198255.1198257"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/1368436.1368445"},{"key":"ref21","article-title":"Early Recognition of Encrypted Applications","author":"bernaille","year":"2007","journal-title":"Proc 8th International Conference Passive and Active Measurement Conference"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/ARES.2016.64"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/ICDCS.2017.284"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/ISNCC.2016.7746067"},{"year":"2017","author":"meidan","journal-title":"&#x2018;Detection of Unauthorized IoT Devices Using Machine Learning Techniques","key":"ref25"}],"event":{"name":"2018 Fifth International Conference on Software Defined Systems (SDS)","start":{"date-parts":[[2018,4,23]]},"location":"Barcelona","end":{"date-parts":[[2018,4,26]]}},"container-title":["2018 Fifth International Conference on Software Defined Systems (SDS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8362835\/8370402\/08370427.pdf?arnumber=8370427","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T02:53:06Z","timestamp":1643165586000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8370427\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/sds.2018.8370427","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}