{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T08:17:35Z","timestamp":1775031455697,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T00:00:00Z","timestamp":1701734400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Ministero dell'Universit\u00e0 e della Ricerca","doi-asserted-by":"publisher","award":["PE00000014"],"award-info":[{"award-number":["PE00000014"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,8]]},"DOI":"10.1145\/3630049.3630175","type":"proceedings-article","created":{"date-parts":[[2023,11,29]],"date-time":"2023-11-29T19:30:21Z","timestamp":1701286221000},"page":"31-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Exploring Temporal GNN Embeddings for Darknet Traffic Analysis"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8258-8626","authenticated-orcid":false,"given":"Luca","family":"Gioacchini","sequence":"first","affiliation":[{"name":"Politecnico di Torino, Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1226-3926","authenticated-orcid":false,"given":"Andrea","family":"Cavallo","sequence":"additional","affiliation":[{"name":"Politecnico di Torino, Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1859-6693","authenticated-orcid":false,"given":"Marco","family":"Mellia","sequence":"additional","affiliation":[{"name":"Politecnico di Torino, Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2920-1856","authenticated-orcid":false,"given":"Luca","family":"Vassio","sequence":"additional","affiliation":[{"name":"Politecnico di Torino, Turin, Italy"}]}],"member":"320","published-online":{"date-parts":[[2023,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106944"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","unstructured":"G. Aceto D. Ciuonzo A. Montieri and A. Pescap\u00e8. 2019. Mobile Encrypted Traffic Classification Using Deep Learning: Experimental Evaluation Lessons Learned and Challenges. IEEE Transactions on Network and Service Management (2019). https:\/\/doi.org\/10.1109\/TNSM.2019.2899085","DOI":"10.1109\/TNSM.2019.2899085"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2110.09726"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"J. Ceron K. Steding-Jessen C. Hoepers L. Granville and C. Margi. 2019. Improving IoT Botnet Investigation Using an Adaptive Network Layer. Sensors (2019). https:\/\/doi.org\/10.3390\/s19030727","DOI":"10.3390\/s19030727"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14--1179"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2003.02575"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485983.3494863"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","unstructured":"L. Gioacchini L. Vassio M. Mellia I. Drago Z.B. Houidi and D. Rossi. 2023. i-DarkVec: Incremental Embeddings for Darknet Traffic Analysis. ACM Transactions on Internet Technology (2023). https:\/\/doi.org\/10.1145\/3595378","DOI":"10.1145\/3595378"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563766.3564108"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106531"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","unstructured":"T. Huoh Y. Luo P. Li and T. Zhang. 2023. Flow-Based Encrypted Network Traffic Classification With Graph Neural Networks. IEEE Transactions on Network and Service Management (2023). https:\/\/doi.org\/10.1109\/TNSM.2022.3227500","DOI":"10.1109\/TNSM.2022.3227500"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2017.57"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3211644"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1609.02907"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","unstructured":"Y. Liu M. Jin S. Pan C. Zhou Y. Zheng F. Xia and S.Y. Philip. 2022. Graph self-supervised learning: A survey. IEEE Transactions on Knowledge and Data Engineering (2022). https:\/\/doi.org\/10.1109\/TKDE.2022.3172903","DOI":"10.1109\/TKDE.2022.3172903"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1709.02656"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1301.3781"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2883147"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1812.09761"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.93"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","unstructured":"F. Scarselli M. Gori A.C. Tsoi M. Hagenbuchner and G. Monfardini. 2009. The Graph Neural Network Model. IEEE Transactions on Neural Networks (2009). https:\/\/doi.org\/10.1109\/TNN.2008.2005605","DOI":"10.1109\/TNN.2008.2005605"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","unstructured":"F. Soro T. Favale D. Giordano L. Vassio Z.B. Houidi and I. Drago. 2021. The New Abnormal: Network Anomalies in the AI Era. Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning (2021). https:\/\/doi.org\/10.1002\/9781119675525.ch11","DOI":"10.1002\/9781119675525.ch11"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","unstructured":"B. Sun W. Yang M. Yan D. Wu Y. Zhu and Z. Bai. 2020. An Encrypted Traffic Classification Method Combining Graph Convolutional Network and Autoencoder. In 2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC). https:\/\/doi.org\/10.1109\/IPCCC50635.2020.9391542","DOI":"10.1109\/IPCCC50635.2020.9391542"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","unstructured":"L. Zhao Y. Song C. Zhang Y. Liu P. Wang T. Lin M. Deng and H. Li. 2020. T-GCN: A Temporal Graph Convolutional Network for Traffic Prediction. IEEE Transactions on Intelligent Transportation Systems (2020). https:\/\/doi.org\/10.1109\/TITS.2019.2935152","DOI":"10.1109\/TITS.2019.2935152"}],"event":{"name":"CoNEXT 2023: The 19th International Conference on emerging Networking EXperiments and Technologies","location":"Paris France","acronym":"CoNEXT 2023","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2nd on Graph Neural Networking Workshop 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3630049.3630175","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3630049.3630175","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T20:25:51Z","timestamp":1755980751000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3630049.3630175"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,5]]},"references-count":24,"alternative-id":["10.1145\/3630049.3630175","10.1145\/3630049"],"URL":"https:\/\/doi.org\/10.1145\/3630049.3630175","relation":{},"subject":[],"published":{"date-parts":[[2023,12,5]]},"assertion":[{"value":"2023-12-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}