{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:03Z","timestamp":1750220463589,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T00:00:00Z","timestamp":1623974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,18]]},"DOI":"10.1145\/3473714.3473724","type":"proceedings-article","created":{"date-parts":[[2021,8,13]],"date-time":"2021-08-13T23:48:41Z","timestamp":1628898521000},"page":"51-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["An anomaly detection method of encrypted traffic based on user behavior"],"prefix":"10.1145","author":[{"given":"Gong","family":"Xin","sequence":"first","affiliation":[{"name":"Information and Communication, Branch of State Grid Shanxi, Electric Power Company"}]},{"given":"Zhao","family":"Xixi","sequence":"additional","affiliation":[{"name":"Information and Communication, Branch of State Grid Shanxi, Electric Power Company"}]},{"given":"Xin","family":"Haoguang","sequence":"additional","affiliation":[{"name":"College of Information and Computer, Taiyuan University of Technology"}]},{"given":"Gu","family":"Liang","sequence":"additional","affiliation":[{"name":"Information and Communication, Branch of State Grid Shanxi, Electric Power Company"}]},{"given":"Meng","family":"Yaning","sequence":"additional","affiliation":[{"name":"Information and Communication, Branch of State Grid Shanxi, Electric Power Company"}]},{"given":"Ma","family":"Xin","sequence":"additional","affiliation":[{"name":"Information and Communication, Branch of State Grid Shanxi, Electric Power Company"}]},{"given":"Dong","family":"Chenni","sequence":"additional","affiliation":[{"name":"Information and Communication, Branch of State Grid Shanxi, Electric Power Company"}]},{"given":"Duan","family":"Xiaorong","sequence":"additional","affiliation":[{"name":"Information and Communication, Branch of State Grid Shanxi, Electric Power Company"}]},{"given":"Sun","family":"Haichuan","sequence":"additional","affiliation":[{"name":"Information and Communication, Branch of State Grid Shanxi, Electric Power Company"}]},{"given":"Wang","family":"Liguo","sequence":"additional","affiliation":[{"name":"Information and Communication, Branch of State Grid Shanxi, Electric Power Company"}]}],"member":"320","published-online":{"date-parts":[[2021,8,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"IoT Needs Next-Generation Infrastructure and the UK Aims to Provide It. [online]. Available: https:\/\/readwrite.com\/2019\/09\/30\/iot-needs-next-generation-infrastructure-and-the-uk-aims-to-provide-it\/  IoT Needs Next-Generation Infrastructure and the UK Aims to Provide It. [online]. Available: https:\/\/readwrite.com\/2019\/09\/30\/iot-needs-next-generation-infrastructure-and-the-uk-aims-to-provide-it\/"},{"key":"e_1_3_2_1_2_1","unstructured":"A router abnormal traffic detection strategy based on active defense.  A router abnormal traffic detection strategy based on active defense."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_4_1","volume-title":"Anomaly detection of network initiated LTE signaling traffic in wireless sensor and actuatornetworks based on a hidden semi-Markov model. Comput Secur 65:108--120","author":"Bang JH","year":"2017","unstructured":"Bang JH , Cho YJ , Kang K ( 2017 ) Anomaly detection of network initiated LTE signaling traffic in wireless sensor and actuatornetworks based on a hidden semi-Markov model. Comput Secur 65:108--120 Bang JH, Cho YJ, Kang K (2017) Anomaly detection of network initiated LTE signaling traffic in wireless sensor and actuatornetworks based on a hidden semi-Markov model. Comput Secur 65:108--120"},{"key":"e_1_3_2_1_5_1","volume-title":"Network Traffic Prediction Using Recurrent Neural Networks [C]\/\/17th IEEE International Conference 0n Machine Learning and Applications (ICMLA)","author":"Nipun R","year":"2018","unstructured":"Nipun R , Tarun S. Network Traffic Prediction Using Recurrent Neural Networks [C]\/\/17th IEEE International Conference 0n Machine Learning and Applications (ICMLA) , 2018 Nipun R, Tarun S. Network Traffic Prediction Using Recurrent Neural Networks [C]\/\/17th IEEE International Conference 0n Machine Learning and Applications (ICMLA), 2018"},{"key":"e_1_3_2_1_6_1","volume-title":"IEEE Computer Society","author":"Kong L","year":"2017","unstructured":"Kong L , Huang G , Wu K. Identification of Abnormal Network Traffic Using Support Vector Machine[C]\/ \/2017 18th Interna-tional Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT) . IEEE Computer Society , 2017 . Kong L, Huang G, Wu K. Identification of Abnormal Network Traffic Using Support Vector Machine[C]\/ \/2017 18th Interna-tional Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT). IEEE Computer Society, 2017."}],"event":{"name":"ICCIR 2021: 2021 International Conference on Control and Intelligent Robotics","sponsor":["Chongqing Univ. Chongqing University"],"location":"Guangzhou China","acronym":"ICCIR 2021"},"container-title":["Proceedings of the 2021 1st International Conference on Control and Intelligent Robotics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3473714.3473724","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3473714.3473724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:15Z","timestamp":1750193295000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3473714.3473724"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,18]]},"references-count":6,"alternative-id":["10.1145\/3473714.3473724","10.1145\/3473714"],"URL":"https:\/\/doi.org\/10.1145\/3473714.3473724","relation":{},"subject":[],"published":{"date-parts":[[2021,6,18]]},"assertion":[{"value":"2021-08-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}