{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:39:03Z","timestamp":1771699143941,"version":"3.50.1"},"reference-count":0,"publisher":"International Academy Publishing (IAP)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.6.6.1009-1016","type":"journal-article","created":{"date-parts":[[2011,6,3]],"date-time":"2011-06-03T13:21:48Z","timestamp":1307107308000},"source":"Crossref","is-referenced-by-count":10,"title":["Realtime Encrypted Traffic Identification using Machine Learning"],"prefix":"10.17706","volume":"6","author":[{"given":"Chengjie","family":"Gu","sequence":"first","affiliation":[]},{"given":"Shunyi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yanfei","family":"Sun","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2011,6,3]]},"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T11:21:01Z","timestamp":1442316061000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/4170"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,3]]},"references-count":0,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2011,6,3]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.6.6.1009-1016","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2011,6,3]]}}}