{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T18:35:57Z","timestamp":1768415757642,"version":"3.49.0"},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T00:00:00Z","timestamp":1716249600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T00:00:00Z","timestamp":1716249600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100009532","name":"Ministry of the Interior of the Czech Republic","doi-asserted-by":"publisher","award":["VJ02010024"],"award-info":[{"award-number":["VJ02010024"]}],"id":[{"id":"10.13039\/100009532","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,21]]},"DOI":"10.23919\/tma62044.2024.10559009","type":"proceedings-article","created":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T17:23:26Z","timestamp":1718904206000},"page":"1-4","source":"Crossref","is-referenced-by-count":2,"title":["Towards Reusable Models in Traffic Classification"],"prefix":"10.23919","author":[{"given":"Jan","family":"Luxemburk","sequence":"first","affiliation":[{"name":"FIT CTU &#x0026; CESNET,Prague,Czech Republic"}]},{"given":"Karel","family":"Hynek","sequence":"additional","affiliation":[{"name":"FIT CTU &#x0026; CESNET,Prague,Czech Republic"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3561954.3561958"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3630050.3630176"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2883147"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"106944","DOI":"10.1016\/j.comnet.2019.106944","article-title":"MIMETIC: Mobile encrypted traffic classification using multimodal deep learning","volume":"165","author":"Aceto","year":"2019","journal-title":"Computer Networks"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3447382"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109467"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.23919\/TMA58422.2023.10199052"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2023.108888"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-56249-5_7"},{"key":"ref10","first-page":"625","article-title":"Rosetta: Enabling robust TLS encrypted traffic classification in diverse network environments with TCP-Aware traffic augmentation","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Xie"}],"event":{"name":"2024 8th Network Traffic Measurement and Analysis Conference (TMA)","location":"Dresden, Germany","start":{"date-parts":[[2024,5,21]]},"end":{"date-parts":[[2024,5,24]]}},"container-title":["2024 8th Network Traffic Measurement and Analysis Conference (TMA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10558852\/10558886\/10559009.pdf?arnumber=10559009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T19:17:35Z","timestamp":1719343055000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10559009\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,21]]},"references-count":10,"URL":"https:\/\/doi.org\/10.23919\/tma62044.2024.10559009","relation":{},"subject":[],"published":{"date-parts":[[2024,5,21]]}}}