{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T22:13:14Z","timestamp":1764713594610,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,8,27]],"date-time":"2007-08-27T00:00:00Z","timestamp":1188172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,8,27]]},"DOI":"10.1145\/1321753.1321771","type":"proceedings-article","created":{"date-parts":[[2007,11,30]],"date-time":"2007-11-30T14:39:06Z","timestamp":1196433546000},"page":"299-304","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["Lightweight application classification for network management"],"prefix":"10.1145","author":[{"given":"Hongbo","family":"Jiang","sequence":"first","affiliation":[{"name":"Case Western Reserve Univ., Cleveland, OH"}]},{"given":"Andrew W.","family":"Moore","sequence":"additional","affiliation":[{"name":"University of Cambridge"}]},{"given":"Zihui","family":"Ge","sequence":"additional","affiliation":[{"name":"Adverplex Inc., Wakefield, MA"}]},{"given":"Shudong","family":"Jin","sequence":"additional","affiliation":[{"name":"Case Western Reserve Univ., Cleveland, OH"}]},{"given":"Jia","family":"Wang","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs Research, Florham Park, NJ"}]}],"member":"320","published-online":{"date-parts":[[2007,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"July","author":"Logg C.","year":"2003","unstructured":"C. Logg and L. Cottrell . Characterization of the traffic between SLAC and the Internet , July 2003 . http:\/\/www.slac.stanford.edu\/comp\/net\/slac-netflow\/html\/SLAC-netflow.html. C. Logg and L. Cottrell. Characterization of the traffic between SLAC and the Internet, July 2003. http:\/\/www.slac.stanford.edu\/comp\/net\/slac-netflow\/html\/SLAC-netflow.html."},{"key":"e_1_3_2_1_2_1","volume-title":"Netflow white papers","author":"IOS.","year":"2006","unstructured":"Cisco IOS. Netflow white papers , 2006 . http:\/\/www.cisco.com\/en\/US\/products\/ps6601\/prod_white_papers_list.html. Cisco IOS. Netflow white papers, 2006. http:\/\/www.cisco.com\/en\/US\/products\/ps6601\/prod_white_papers_list.html."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/1080091.1080119"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/1015467.1015492"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/1080091.1080118"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of Passive &amp; Active Measurement Workshop 2003 (PAM2003)","author":"Moore A.","year":"2003","unstructured":"A. Moore , J. Hall , C. Kreibich , E. Harris , and I. Pratt . Architecture of a network monitor . In Proceedings of Passive &amp; Active Measurement Workshop 2003 (PAM2003) , La Jolla, CA , Apr. 2003 . A. Moore, J. Hall, C. Kreibich, E. Harris, and I. Pratt. Architecture of a network monitor. In Proceedings of Passive &amp; Active Measurement Workshop 2003 (PAM2003), La Jolla, CA, Apr. 2003."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1007\/978-3-540-31966-5_4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/1064212.1064220"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the LISA 2001 15th Systems Administration Conference","author":"Moore D.","year":"2001","unstructured":"D. Moore , K. Keys , R. Koga , E. Lagache , and K. C. Claffy . CoralReef software suite as a tool for system and network administrators . In Proceedings of the LISA 2001 15th Systems Administration Conference , Dec. 2001 . D. Moore, K. Keys, R. Koga, E. Lagache, and K. C. Claffy. CoralReef software suite as a tool for system and network administrators. In Proceedings of the LISA 2001 15th Systems Administration Conference, Dec. 2001."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1016\/S1389-1286(99)00112-7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/1028788.1028805"},{"key":"e_1_3_2_1_12_1","volume-title":"Data Mining","author":"Witten I. H.","year":"2000","unstructured":"I. H. Witten and E. Frank . Data Mining . Morgan Kaufmann Publishers , 2000 . I. H. Witten and E. Frank. Data Mining. Morgan Kaufmann Publishers, 2000."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/1080091.1080112"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1007\/978-3-540-31966-5_26"}],"event":{"sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"acronym":"SIGCOMM07","name":"SIGCOMM07: ACM SIGCOMM 2007 Conference","location":"Kyoto Japan"},"container-title":["Proceedings of the 2007 SIGCOMM workshop on Internet network management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1321753.1321771","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1321753.1321771","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:39:07Z","timestamp":1750253947000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1321753.1321771"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,8,27]]},"references-count":14,"alternative-id":["10.1145\/1321753.1321771","10.1145\/1321753"],"URL":"https:\/\/doi.org\/10.1145\/1321753.1321771","relation":{},"subject":[],"published":{"date-parts":[[2007,8,27]]},"assertion":[{"value":"2007-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}