{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:43:50Z","timestamp":1775069030624,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.23919\/cnsm46954.2019.9012662","type":"proceedings-article","created":{"date-parts":[[2020,2,28]],"date-time":"2020-02-28T04:56:25Z","timestamp":1582865785000},"page":"1-5","source":"Crossref","is-referenced-by-count":9,"title":["A Framework &amp; System for Classification of Encrypted Network Traffic using Machine Learning"],"prefix":"10.23919","author":[{"given":"Nabil","family":"Seddigh","sequence":"first","affiliation":[]},{"given":"Biswajit","family":"Nandy","sequence":"additional","affiliation":[]},{"given":"Don","family":"Bennett","sequence":"additional","affiliation":[]},{"given":"Yonglin","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Serge","family":"Dolgikh","sequence":"additional","affiliation":[]},{"given":"Colin","family":"Zeidler","sequence":"additional","affiliation":[]},{"given":"Juhandre","family":"Knoetze","sequence":"additional","affiliation":[]},{"given":"Naveen Sai","family":"Muthyala","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-014-9324-6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.18178\/JACN.2016.4.1.198"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40367-0_33"},{"key":"ref13","year":"2017","journal-title":"5 Traffic Management Trends that will Shape the Mobile Industry"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5220\/0007384203970404"},{"key":"ref15","article-title":"Amazon SageMaker Ground Truth","year":"2019"},{"key":"ref4","article-title":"Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?","volume":"55","author":"alshammari","year":"2011","journal-title":"Journal of Computer Networks"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962736"},{"key":"ref6","article-title":"Shine a light on the darkening Internet: How to thrive despite Encryption - an exploration of the impact of encryption on ANI use cases","year":"2018","journal-title":"Sandvine Whitepaper"},{"key":"ref5","author":"barto","year":"2013","journal-title":"Classification of Encrypted Web Traffic Using Machine Learning Algorithms"},{"key":"ref8","author":"bujlow","year":"2013","journal-title":"Comparison of Deep Packet Inspection (DPI) Tools for Traffic Classification"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PDCAT.2012.105"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13193-6_32"},{"key":"ref1","article-title":"GT: Picking up the Truth from the Ground for Internet Traffic","volume":"39","author":"gingoli","year":"2009","journal-title":"ACM Computer Communication Review"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6786614"}],"event":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","location":"Halifax, NS, Canada","start":{"date-parts":[[2019,10,21]]},"end":{"date-parts":[[2019,10,25]]}},"container-title":["2019 15th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8977268\/9012657\/09012662.pdf?arnumber=9012662","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T23:55:59Z","timestamp":1586476559000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9012662\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.23919\/cnsm46954.2019.9012662","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}