{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T05:23:26Z","timestamp":1739424206057,"version":"3.37.0"},"reference-count":28,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1016\/j.future.2024.107603","type":"journal-article","created":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T14:02:50Z","timestamp":1731506570000},"page":"107603","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["BCBA: An IIoT encrypted traffic classifier based on a serial network model"],"prefix":"10.1016","volume":"164","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5420-1463","authenticated-orcid":false,"given":"Maoli","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7381-3661","authenticated-orcid":false,"given":"Chuanxin","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0915-0318","authenticated-orcid":false,"given":"Xinchang","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3898-2640","authenticated-orcid":false,"given":"Haitao","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.future.2024.107603_b1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.future.2022.08.003","article-title":"A data skew-based unknown traffic classification approach for tls applications","volume":"138","author":"He","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.future.2024.107603_b2","series-title":"NOMS 2024-2024 IEEE Network Operations and Management Symposium","first-page":"1","article-title":"Encrypted traffic classification at line rate in programmable switches with machine learning","author":"Akem","year":"2024"},{"key":"10.1016\/j.future.2024.107603_b3","series-title":"The 16th Asia-Pacific Network Operations and Management Symposium","first-page":"1","article-title":"UDP traffic classification using most distinguished port","author":"Zhang","year":"2014"},{"issue":"5","key":"10.1016\/j.future.2024.107603_b4","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MCOM.2019.1800819","article-title":"Deep learning for encrypted traffic classification: An overview","volume":"57","author":"Rezaei","year":"2019","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"10.1016\/j.future.2024.107603_b5","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/JIOT.2021.3121517","article-title":"IoT network traffic classification using machine learning algorithms: An experimental analysis","volume":"9","author":"Kumar","year":"2021","journal-title":"IEEE Internet Things J."},{"year":"2018","series-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","key":"10.1016\/j.future.2024.107603_b6"},{"key":"10.1016\/j.future.2024.107603_b7","series-title":"Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016)","first-page":"407","article-title":"Characterization of encrypted and VPN traffic using time-related features","author":"Gil","year":"2016"},{"key":"10.1016\/j.future.2024.107603_b8","article-title":"LEOEdge: A satellite-ground cooperation platform for the AI Inference in Large LEO Constellation","author":"Yao","year":"2024","journal-title":"IEEE J. Selected Areas in Commun."},{"key":"10.1016\/j.future.2024.107603_b9","first-page":"1","article-title":"Link traffic-delay mapping model learning based on multi-class samples in software-defined networks","author":"Zhang","year":"2024","journal-title":"IEEE Trans. Services Comput."},{"issue":"12","key":"10.1016\/j.future.2024.107603_b10","doi-asserted-by":"crossref","first-page":"3485","DOI":"10.1109\/JSAC.2022.3213358","article-title":"Blockchain-empowered collaborative task offloading for cloud-edge-device computing","volume":"40","author":"Yao","year":"2022","journal-title":"IEEE J. Selected Areas Commun."},{"key":"10.1016\/j.future.2024.107603_b11","series-title":"2019 IEEE Symposium on Computers and Communications","first-page":"1","article-title":"Integrating machine learning with off-the-shelf traffic flow features for http\/https traffic classification","author":"Khatouni","year":"2019"},{"issue":"2","key":"10.1016\/j.future.2024.107603_b12","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1080\/23742917.2017.1321891","article-title":"Comparison of machine-learning algorithms for classification of vpn network traffic flow using time-related features","volume":"1","author":"Bagui","year":"2017","journal-title":"J. Cyber Secur. Technol."},{"key":"10.1016\/j.future.2024.107603_b13","series-title":"2017 IEEE International Conference on Intelligence and Security Informatics","first-page":"43","article-title":"End-to-end encrypted traffic classification with one-dimensional convolution neural networks","author":"Wang","year":"2017"},{"key":"10.1016\/j.future.2024.107603_b14","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.107974","article-title":"TSCRNN: A novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of iIoT","volume":"190","author":"Lin","year":"2021","journal-title":"Comput. Netw."},{"key":"10.1016\/j.future.2024.107603_b15","doi-asserted-by":"crossref","unstructured":"H. Zhang, L. Yu, X. Xiao, Q. Li, F. Mercaldo, X. Luo, Q. Liu, TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification, in: Proceedings of the ACM Web Conference 2023, 2023, pp. 2066\u20132075.","DOI":"10.1145\/3543507.3583227"},{"key":"10.1016\/j.future.2024.107603_b16","series-title":"2020 ITU Kaleidoscope: Industry-Driven Digital Transformation (ITU K)","first-page":"1","article-title":"PERT: Payload encoding representation from transformer for encrypted traffic classification","author":"He","year":"2020"},{"key":"10.1016\/j.future.2024.107603_b17","doi-asserted-by":"crossref","unstructured":"X. Lin, G. Xiong, G. Gou, Z. Li, J. Shi, J. Yu, Et-bert: A contextualized datagram representation with pre-training transformers for encrypted traffic classification, in: Proceedings of the ACM Web Conference 2022, 2022, pp. 633\u2013642.","DOI":"10.1145\/3485447.3512217"},{"key":"10.1016\/j.future.2024.107603_b18","doi-asserted-by":"crossref","DOI":"10.1145\/3308558.3313738","article-title":"Exploiting diversity in android TLS implementations for mobile app traffic classification","author":"Sengupta","year":"2019","journal-title":"World Wide Web Conf."},{"year":"2018","series-title":"Deep contextualized word representations","author":"Peters","key":"10.1016\/j.future.2024.107603_b19"},{"year":"2013","series-title":"Efficient estimation of word representations in vector space","author":"Mikolov","key":"10.1016\/j.future.2024.107603_b20"},{"year":"2019","series-title":"UER: An open-source toolkit for pre-training models","author":"Zhao","key":"10.1016\/j.future.2024.107603_b21"},{"year":"2014","series-title":"Adam: A method for stochastic optimization","author":"Kingma","key":"10.1016\/j.future.2024.107603_b22"},{"key":"10.1016\/j.future.2024.107603_b23","series-title":"2015 IEEE 16th International Symposium on High Assurance Systems Engineering","first-page":"118","article-title":"A proxy identifier based on patterns in traffic flows","author":"Aghaei-Foroushani","year":"2015"},{"key":"10.1016\/j.future.2024.107603_b24","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1007\/s11036-018-0999-x","article-title":"Internet traffic classification based on incremental support vector machines","volume":"23","author":"Sun","year":"2018","journal-title":"Mob. Netw. Appl."},{"issue":"1","key":"10.1016\/j.future.2024.107603_b25","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1109\/TBDATA.2019.2940675","article-title":"Identification of encrypted traffic through attention mechanism based long short term memory","volume":"8","author":"Yao","year":"2019","journal-title":"IEEE Trans. Big Data"},{"key":"10.1016\/j.future.2024.107603_b26","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1016\/j.ins.2020.05.035","article-title":"Attention-based bidirectional GRU networks for efficient HTTPS traffic classification","volume":"541","author":"Liu","year":"2020","journal-title":"Inform. Sci."},{"key":"10.1016\/j.future.2024.107603_b27","series-title":"2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS)","first-page":"329","article-title":"Encrypted traffic classification with a convolutional long short-term memory neural network","author":"Zou","year":"2018"},{"key":"10.1016\/j.future.2024.107603_b28","article-title":"CoTNeT: Contextual transformer network for encrypted traffic classification","volume":"26","author":"Huang","year":"2024","journal-title":"Egypt. Inform. J."}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X24005673?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X24005673?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T14:03:53Z","timestamp":1739369033000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X24005673"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":28,"alternative-id":["S0167739X24005673"],"URL":"https:\/\/doi.org\/10.1016\/j.future.2024.107603","relation":{},"ISSN":["0167-739X"],"issn-type":[{"type":"print","value":"0167-739X"}],"subject":[],"published":{"date-parts":[[2025,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"BCBA: An IIoT encrypted traffic classifier based on a serial network model","name":"articletitle","label":"Article Title"},{"value":"Future Generation Computer Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.future.2024.107603","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"107603"}}