{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T22:13:14Z","timestamp":1764713594498,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,6]]},"DOI":"10.1109\/wowmom.2007.4351725","type":"proceedings-article","created":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T19:38:41Z","timestamp":1193168321000},"page":"1-8","source":"Crossref","is-referenced-by-count":37,"title":["Accurate Traffic Classification"],"prefix":"10.1109","author":[{"given":"Geza","family":"Szabo","sequence":"first","affiliation":[]},{"given":"Istvan","family":"Szabo","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Orincsay","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Net-Entropy An Entropy Checker for Ciphered Network Connections","year":"0","key":"ref4"},{"journal-title":"Message Stream Encryption","year":"0","key":"ref3"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1145\/1071690.1064220","article-title":"Internet Traffic Classification UsingBayesian Analysis Techniques","author":"moore","year":"2005","journal-title":"Proc SIGMETRICS"},{"journal-title":"A Book He Wrote","year":"1999","author":"expert","key":"ref6"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1145\/1090191.1080112","article-title":"Profiling Internet Backbone Traffic: Behavior Models and Applications","author":"xu","year":"2005","journal-title":"Proc ACM Sigcomm"},{"key":"ref5","first-page":"1","article-title":"Some related article I wrote","volume":"99","author":"author","year":"1999","journal-title":"Some FineJournal"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2005.35"},{"key":"ref8","article-title":"BLINC: Multilevel Traffic Classification in the Dark","author":"karagiannis","year":"2005","journal-title":"Proc ACMSIGComm"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028804"},{"journal-title":"IANA TCP and UDP port numbers","year":"0","key":"ref2"},{"key":"ref9","article-title":"Flow Clustering Using Machine Learning Techniques","author":"mcgregor","year":"2004","journal-title":"Proc PAM"},{"journal-title":"Application Specific Bit Strings","year":"0","key":"ref1"}],"event":{"name":"2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks","start":{"date-parts":[[2007,6,18]]},"location":"Espoo, Finland","end":{"date-parts":[[2007,6,21]]}},"container-title":["2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4351671\/4351672\/04351725.pdf?arnumber=4351725","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T00:02:39Z","timestamp":1497744159000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4351725\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/wowmom.2007.4351725","relation":{},"subject":[],"published":{"date-parts":[[2007,6]]}}}