{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T03:57:37Z","timestamp":1769918257319,"version":"3.49.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,15]]},"DOI":"10.1109\/syscon48628.2021.9447076","type":"proceedings-article","created":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T21:20:08Z","timestamp":1623273608000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["Enhancing The Performance of Network Traffic Classification Methods Using Efficient Feature Selection Models"],"prefix":"10.1109","author":[{"given":"Farzana","family":"Alam","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rasha","family":"Kashef","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Muhammad","family":"Jaseemuddin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3175684.3175726"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3026310"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.treng.2020.100013"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/app10217748"},{"key":"ref34","first-page":"1","article-title":"Predicting the Demand in Bitcoin Using Data Charts: A Convolutional Neural Networks Prediction Model","author":"ibrahim","year":"2020","journal-title":"2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)"},{"key":"ref10","article-title":"Detecting anomalous packets in network transfers: investigations using PCA","author":"kiran","year":"2020","journal-title":"autoencoder and isolation forest in TCP"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1109\/TKDE.2005.39","article-title":"An extended Chi2 algorithm for discretization of real value attributes","volume":"17","author":"su","year":"2005","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75175-5_30"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2008.2005601"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.02.057"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.100613.00161"},{"key":"ref16","year":"2020","journal-title":"Iana port numbers"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061972"},{"key":"ref18","author":"bhatia","year":"2016","journal-title":"Identifying P2P traffic A survey"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31966-5_4"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.019"},{"key":"ref4","volume":"57","author":"rezaei","year":"2019","journal-title":"Deep learning for encrypted traffic classification An overview"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2263-3"},{"key":"ref3","author":"lotfollahi","year":"2018","journal-title":"Deep packet A novel approach for encrypted traffic classification using deep learning"},{"key":"ref6","article-title":"A Review of Feature Selection and Its Methods","author":"bachu","year":"2019","journal-title":"Article in Cybernetics and Information Technologies"},{"key":"ref29","first-page":"407","article-title":"Characterization of Encrypted and VPN Traffic Using Time-Related Features","author":"gil","year":"0","journal-title":"Proceedings of the 2nd International Conference on Information Systems Security and Privacy(ICISSP 2016)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000035476.95130.99"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/34.574797"},{"key":"ref7","author":"moore","year":"2004","journal-title":"Discriminators for use in flow-based classification"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM46954.2019.9012662"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.04.005"},{"key":"ref1","article-title":"Shine a light on the darkening Internet: How to thrive despite Encryption - an exploration of the impact of encryption on ANI use cases","year":"2018","journal-title":"Sandvine Whitepaper"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2006.6"},{"key":"ref22","author":"liu","year":"2012","journal-title":"A Survey of Machine Learning Based Packet Classification"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787502"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2017.7876241"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2009.5360759"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2013.3704"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/sym12020301"}],"event":{"name":"2021 IEEE International Systems Conference (SysCon)","location":"Vancouver, BC, Canada","start":{"date-parts":[[2021,4,15]]},"end":{"date-parts":[[2021,5,15]]}},"container-title":["2021 IEEE International Systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9447020\/9447051\/09447076.pdf?arnumber=9447076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:42:22Z","timestamp":1652197342000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9447076\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,15]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/syscon48628.2021.9447076","relation":{},"subject":[],"published":{"date-parts":[[2021,4,15]]}}}