{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:27:35Z","timestamp":1729610855754,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/glocom.2008.ecp.287","type":"proceedings-article","created":{"date-parts":[[2010,12,8]],"date-time":"2010-12-08T14:51:12Z","timestamp":1291819872000},"page":"1-6","source":"Crossref","is-referenced-by-count":12,"title":["Online Identification of Applications Using Statistical Behavior Analysis"],"prefix":"10.1109","author":[{"given":"Jin","family":"Cao","sequence":"first","affiliation":[]},{"given":"Aiyou","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Indra","family":"Widjaja","sequence":"additional","affiliation":[]},{"given":"Nengfeng","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"year":"0","key":"17"},{"journal-title":"The New S Language","year":"1988","author":"becker","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198257"},{"journal-title":"Wireshark","year":"0","key":"16"},{"key":"13","article-title":"finding peer-to-peer file-sharing using coarse network behaviors","author":"collins","year":"0","journal-title":"Proceedings of the 2006 European Symposium on Research in Computer Security (ESORICS) Conference"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1368436.1368445"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2005.75"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/GI.2007.4301431"},{"key":"3","article-title":"incentives build robustness in bittorrent","author":"cohen'","year":"2003","journal-title":"Workshop on Economics of Peer-to-Peer Systems"},{"key":"2","volume":"6","author":"lightreading","year":"2006","journal-title":"Deep Packet Inspection Taming the P2P Traffic Beast"},{"journal-title":"Dueling Data Volume of P2P Traffic","year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028804"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988742"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2004.1268997"},{"journal-title":"TCP and UDP port numbers","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028805"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1145\/1090191.1080119","article-title":"blinc: multilevel traffic classification in the dark","author":"karagiannis","year":"2005","journal-title":"ACM SIGCOMM"}],"event":{"name":"IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference","start":{"date-parts":[[2008,11,30]]},"location":"New Orleans, LA, USA","end":{"date-parts":[[2008,12,4]]}},"container-title":["IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4697774\/4697775\/04698062.pdf?arnumber=4698062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T16:59:36Z","timestamp":1497891576000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4698062\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/glocom.2008.ecp.287","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}