{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:00Z","timestamp":1750220340560,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1145\/3508072.3508193","type":"proceedings-article","created":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T17:01:56Z","timestamp":1649869316000},"page":"595-601","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Method for filtering encrypted traffic using a neural network between an Industrial Internet of things system and Digital Twin"],"prefix":"10.1145","author":[{"given":"Ivan","family":"Luksha","sequence":"first","affiliation":[{"name":"Dept. of software engineering and computer science, Bonch-Bruevich Saint Petersburg State University of Telecommunications, Russian Federation"}]},{"given":"Truong","family":"Duy Dinh","sequence":"additional","affiliation":[{"name":"Posts and Telecommunications Institute of Technology, Faculty of Information, Vietnam"}]},{"given":"Evgenii","family":"Karelin","sequence":"additional","affiliation":[{"name":"Dept. of software engineering and computer science, The Bonch-Bruevich Saint Petersburg State University of Telecommunications, Russian Federation"}]},{"given":"Ruslan","family":"Glushakov","sequence":"additional","affiliation":[{"name":"Saint-Petersburg State Pediatric Medical University, Russian Federation"}]},{"given":"Ruslan","family":"Kirichek","sequence":"additional","affiliation":[{"name":"The Bonch-Bruevich Saint Petersburg State University of Telecommunications, Dept. of software engineering and computer science, Russian Federation"}]}],"member":"320","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rcim.2019.101837"},{"key":"e_1_3_2_1_2_1","volume-title":"Rydning John and Gantz John","author":"David Reinsel","year":"2021","unstructured":"Reinsel David , Rydning John and Gantz John . 2021 . Worldwide global datasphere forecast, 2021\u20132025: The world keeps creating more data\u2014now, what do we do with it all. Reinsel David, Rydning John and Gantz John. 2021. Worldwide global datasphere forecast, 2021\u20132025: The world keeps creating more data\u2014now, what do we do with it all."},{"issue":"1","key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/TSMC.2019.2903785","article-title":"Securing data in Internet of Things (IoT) using cryptography and steganography techniques","volume":"50","author":"Manju Khari","year":"2019","unstructured":"Khari Manju , Garg Aditya Kumar , Gandomi Amir H., Gupta Rashmi , Patan Rizwan , and Balusamy Balamurugan . 2019 . Securing data in Internet of Things (IoT) using cryptography and steganography techniques . IEEE Transactions on Systems, Man, and Cybernetics: Systems , 50 ( 1 ), 73 - 80 . Khari Manju, Garg Aditya Kumar, Gandomi Amir H., Gupta Rashmi, Patan Rizwan, and Balusamy Balamurugan. 2019. Securing data in Internet of Things (IoT) using cryptography and steganography techniques. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 50(1), 73-80.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Elhoseny Mohamed and Hassanien Aboul Ella. 2019. Secure data transmission in WSN: an overview. Dynamic wireless sensor networks 115-143.  Elhoseny Mohamed and Hassanien Aboul Ella. 2019. Secure data transmission in WSN: an overview. Dynamic wireless sensor networks 115-143.","DOI":"10.1007\/978-3-319-92807-4_6"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2926625"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2747560"},{"key":"e_1_3_2_1_7_1","volume-title":"2018 IEEE international conference on communications (ICC), IEEE, 1-6.","author":"Tie Luo","year":"2018","unstructured":"Luo Tie , and Nagarajan Sai G. 2018 . Distributed anomaly detection using autoencoder neural networks in WSN for IoT . In 2018 IEEE international conference on communications (ICC), IEEE, 1-6. Luo Tie, and Nagarajan Sai G. 2018. Distributed anomaly detection using autoencoder neural networks in WSN for IoT. In 2018 IEEE international conference on communications (ICC), IEEE, 1-6."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi13120304"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.36548\/jscp.2020.3.007"},{"volume-title":"LIU L., \u00d6ZSU M.T. (eds) Encyclopedia of Database Systems","author":"Hwanjo Yu","key":"e_1_3_2_1_10_1","unstructured":"Yu Hwanjo . 2009. Support Vector Machine . In: LIU L., \u00d6ZSU M.T. (eds) Encyclopedia of Database Systems . Springer , Boston, MA . https:\/\/doi.org\/10.1007\/978-0-387-39940-9_557 10.1007\/978-0-387-39940-9_557 Yu Hwanjo. 2009. Support Vector Machine. In: LIU L., \u00d6ZSU M.T. (eds) Encyclopedia of Database Systems. Springer, Boston, MA. https:\/\/doi.org\/10.1007\/978-0-387-39940-9_557"},{"volume-title":"Principles of data mining","author":"Hand David","key":"e_1_3_2_1_11_1","unstructured":"Hand David , Smyth Padhraic , and Mannila Heikki . 2001. Principles of data mining . MIT Press , Cambridge, MA, USA . Hand David , Smyth Padhraic, and Mannila Heikki. 2001. Principles of data mining. MIT Press, Cambridge, MA, USA."},{"issue":"7","key":"e_1_3_2_1_12_1","first-page":"12002","article-title":"Meta-heuristic algorithms for k-means clustering: A review","volume":"17","author":"Fuad Jahwar Alan","year":"2020","unstructured":"Jahwar Alan Fuad , and Abdulazeez Adnan Mohsin . 2020 . Meta-heuristic algorithms for k-means clustering: A review . PalArch's Journal of Archaeology of Egypt\/Egyptology , 17 ( 7 ), 12002 - 12020 . Jahwar Alan Fuad, and Abdulazeez Adnan Mohsin. 2020. Meta-heuristic algorithms for k-means clustering: A review. PalArch's Journal of Archaeology of Egypt\/Egyptology, 17(7), 12002-12020.","journal-title":"PalArch's Journal of Archaeology of Egypt\/Egyptology"},{"key":"#cr-split#-e_1_3_2_1_13_1.1","doi-asserted-by":"crossref","unstructured":"Lozano Sebastian Guerrero Fernando Onieva Luis and Larraneta Juan. 1998. Kohonen maps for solving a class of location-allocation problems. European Journal of operational research 108(1) 106-117. https:\/\/doi.org\/10.1016\/S0377-2217(97)00046-5. 10.1016\/S0377-2217(97)00046-5","DOI":"10.1016\/S0377-2217(97)00046-5"},{"key":"#cr-split#-e_1_3_2_1_13_1.2","doi-asserted-by":"crossref","unstructured":"Lozano Sebastian Guerrero Fernando Onieva Luis and Larraneta Juan. 1998. Kohonen maps for solving a class of location-allocation problems. European Journal of operational research 108(1) 106-117. https:\/\/doi.org\/10.1016\/S0377-2217(97)00046-5.","DOI":"10.1016\/S0377-2217(97)00046-5"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Mor Bhavya Garhwal Sunita and Kumar Ajay. 2021. A Systematic Review of Hidden Markov Models and Their Applications. Archives of computational methods in engineering 28(3).  Mor Bhavya Garhwal Sunita and Kumar Ajay. 2021. A Systematic Review of Hidden Markov Models and Their Applications. Archives of computational methods in engineering 28(3).","DOI":"10.1007\/s11831-020-09422-4"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2013.05.025"},{"volume-title":"Deep logic networks: Inserting and extracting knowledge from deep belief networks","author":"Tran Son","key":"e_1_3_2_1_16_1","unstructured":"Tran Son N, and Garcez Artur S d' Avila . 2016. Deep logic networks: Inserting and extracting knowledge from deep belief networks . IEEE transactions on neural networks and learning systems, 29(2), 246-258. DOI: 10.1109\/TNNLS.2016.2603784. 10.1109\/TNNLS.2016.2603784 Tran Son N, and Garcez Artur S d'Avila. 2016. Deep logic networks: Inserting and extracting knowledge from deep belief networks. IEEE transactions on neural networks and learning systems, 29(2), 246-258. DOI: 10.1109\/TNNLS.2016.2603784."},{"key":"e_1_3_2_1_17_1","unstructured":"Open Networking Foundation. 2011. OpenFlow\/Software-Defined Networking (SDN). https:\/\/www.opennetworking.org\/.  Open Networking Foundation. 2011. OpenFlow\/Software-Defined Networking (SDN). https:\/\/www.opennetworking.org\/."},{"key":"e_1_3_2_1_18_1","volume-title":"2021 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), IEEE, 236-240","author":"Aleksey Slepnev","year":"2021","unstructured":"Slepnev Aleksey , Karelin Evgenii , Luksha Ivan , Kirichek Ruslan , Zadorozhnyaya Alina , Makarov Eugene . 2021 . Virtualization of Control Systems in IoT using Neural Networks . In 2021 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), IEEE, 236-240 . Slepnev Aleksey, Karelin Evgenii, Luksha Ivan, Kirichek Ruslan, Zadorozhnyaya Alina, Makarov Eugene. 2021. Virtualization of Control Systems in IoT using Neural Networks. In 2021 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), IEEE, 236-240."},{"key":"e_1_3_2_1_19_1","volume-title":"2021 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), IEEE, 230-235","author":"Aleksandr Berezkin","year":"2021","unstructured":"Berezkin Aleksandr , Zadorozhnyaya Alina , Kukunin Dmitry , Matveev Daniil , Kraeva Ekaterina . 2021 . Models and Methods for Decoding of Error-Correcting Codes based on a Neural . In 2021 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), IEEE, 230-235 . Berezkin Aleksandr, Zadorozhnyaya Alina, Kukunin Dmitry, Matveev Daniil, Kraeva Ekaterina. 2021. Models and Methods for Decoding of Error-Correcting Codes based on a Neural. In 2021 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), IEEE, 230-235."},{"volume-title":"Issues and future directions in traffic classification","author":"Alberto Dainotti","key":"e_1_3_2_1_20_1","unstructured":"Dainotti Alberto , Pescape Antonio , and Claffy Kimberly . 2012. Issues and future directions in traffic classification . IEEE network, 26(1), 35-40. Dainotti Alberto, Pescape Antonio, and Claffy Kimberly. 2012. Issues and future directions in traffic classification. IEEE network, 26(1), 35-40."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102538"},{"key":"e_1_3_2_1_22_1","first-page":"8887","article-title":"Survey of Traffic Classification Solution in IoT Networks","volume":"975","author":"Alzahrani Rami","year":"2021","unstructured":"Alzahrani Rami J, and Alzahrani Ahmed . 2021 . Survey of Traffic Classification Solution in IoT Networks . International Journal of Computer Applications , 975 , 8887 . Alzahrani Rami J, and Alzahrani Ahmed. 2021. Survey of Traffic Classification Solution in IoT Networks. International Journal of Computer Applications, 975, 8887.","journal-title":"International Journal of Computer Applications"},{"key":"e_1_3_2_1_23_1","first-page":"194","article-title":"An Efficient Feature Extraction Method for Attack Classification in IoT Networks. In 2021 13th International Congress on Ultra-Modern Telecommunications and Control Systems and Workshops (ICUMT)","author":"Hao Do Phuc","year":"2021","unstructured":"Do Phuc Hao , Dinh Truong Duy , Le Tran Duc , Pham Van Dai , Myrova Lyudmila , Kirichek Ruslan . 2021 . An Efficient Feature Extraction Method for Attack Classification in IoT Networks. In 2021 13th International Congress on Ultra-Modern Telecommunications and Control Systems and Workshops (ICUMT) , IEEE , 194 - 199 . Do Phuc Hao, Dinh Truong Duy, Le Tran Duc, Pham Van Dai, Myrova Lyudmila, Kirichek Ruslan. 2021. An Efficient Feature Extraction Method for Attack Classification in IoT Networks. In 2021 13th International Congress on Ultra-Modern Telecommunications and Control Systems and Workshops (ICUMT), IEEE, 194-199.","journal-title":"IEEE"}],"event":{"name":"ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems","acronym":"ICFNDS 2021","location":"Dubai United Arab Emirates"},"container-title":["The 5th International Conference on Future Networks &amp; Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508193","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508072.3508193","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:30Z","timestamp":1750191150000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508193"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":24,"alternative-id":["10.1145\/3508072.3508193","10.1145\/3508072"],"URL":"https:\/\/doi.org\/10.1145\/3508072.3508193","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]},"assertion":[{"value":"2022-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}