{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T08:17:41Z","timestamp":1771661861109,"version":"3.50.1"},"reference-count":25,"publisher":"Zhejiang University Press","issue":"5","license":[{"start":{"date-parts":[[2015,5,1]],"date-time":"2015-05-01T00:00:00Z","timestamp":1430438400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61170286"],"award-info":[{"award-number":["61170286"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61202486"],"award-info":[{"award-number":["61202486"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Frontiers Inf Technol Electronic Eng"],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1631\/fitee.1400267","type":"journal-article","created":{"date-parts":[[2015,5,11]],"date-time":"2015-05-11T22:46:30Z","timestamp":1431384390000},"page":"391-403","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Fine-grained P2P traffic classification by simply counting flows"],"prefix":"10.1631","volume":"16","author":[{"given":"Jie","family":"He","sequence":"first","affiliation":[]},{"given":"Yue-xiang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Qiao","sequence":"additional","affiliation":[]},{"given":"Wen-ping","family":"Deng","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2015,5,13]]},"reference":[{"key":"ref1","article-title":"Global Internet Phenomena Report 1H 2014","volume-title":"Technical Report. Sandvine Incorporated ULC, Waterloo","author":"Sandvine","year":"2014"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31537-4_45"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963018"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/235968.233324"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/tnn.2006.883010"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn.2012.6252672"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367537"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.12.004"},{"issue":"6","key":"ref10","first-page":"921","article-title":"Fuzzy based approach for P2P file sharing detection","volume":"12","author":"Chen","year":"2011","journal-title":"J. Internet Techmol."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2012.6135854"},{"key":"ref12","article-title":"Protocol Identification via Statistical Analysis (PISA)","author":"Dhamankar","year":"2007","journal-title":"White Paper, Tipping Point"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1568613.1568616"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2010.2044046"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/infcom.2010.5462239"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2480741.2480747"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/cc.2013.6674209"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2008.1083"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963023"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1961659.1961661"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.01.020"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080119"},{"key":"ref23","article-title":"Discriminators for Use in Flow-Based Classification","volume-title":"Technical Report, University of London, UK","author":"Moore","year":"2005"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2008.1095"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31966-5_5"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1631\/FITEE.1400267\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1400267.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1400267.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1400267","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:36:15Z","timestamp":1771659375000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1631\/FITEE.1400267"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":25,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,5]]}},"alternative-id":["26"],"URL":"https:\/\/doi.org\/10.1631\/fitee.1400267","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5]]}}}