{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T17:43:09Z","timestamp":1732038189398},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/iwqos.2018.8624124","type":"proceedings-article","created":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T22:26:02Z","timestamp":1551392762000},"source":"Crossref","is-referenced-by-count":64,"title":["MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints"],"prefix":"10.1109","author":[{"given":"Chang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Zigang","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Gaopeng","family":"Gou","sequence":"additional","affiliation":[]},{"given":"Siu-Ming","family":"Yiu","sequence":"additional","affiliation":[]},{"given":"Longtao","family":"He","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1126\/science.287.5461.2115a"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2996758.2996768"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2516020"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098049"},{"key":"ref13","first-page":"781","article-title":"Markov chain fingerprinting to classify encrypted traffic","author":"korczynski","year":"2013","journal-title":"IEEE Conference on Computer Communications"},{"key":"ref14","first-page":"1","article-title":"Certificate-aware encrypted traffic classification using second-order markov chain","author":"shen","year":"2016","journal-title":"IEEE\/ACM International Symposium on Quality of Service"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2692682"},{"key":"ref16","author":"freier","year":"2011","journal-title":"The Secure Sockets Layer (SSL) Protocol Version 3 0"},{"key":"ref17","author":"dierks","year":"2008","journal-title":"The Transport Layer Security (TLS) Protocol Version 1 2"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/978-3-540-31966-5_4","article-title":"Toward the accurate identification of network applications","author":"moore","year":"2005","journal-title":"Proceedings of International Conference on Passive and Active Network Measurement"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988742"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140423"},{"key":"ref4","first-page":"1","article-title":"Payload signature structure for accurate application traffic classification","author":"goo","year":"2016","journal-title":"Asia-Pacific Network Operations and Management Symposium"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2016.21"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WISES.2008.4623292"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004872"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.39"},{"key":"ref5","first-page":"1","article-title":"Performance improvement of payload signature-based traffic classification system using application traffic temporal locality","author":"park","year":"2013","journal-title":"Asia-Pacific Network Operations and Management Symposium"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098163"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2737970"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2014.6996569"},{"key":"ref9","author":"anderson","year":"2016","journal-title":"Deciphering Malware's use of TLS (without Decryption)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2006.34"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028805"},{"key":"ref22","first-page":"102","article-title":"Improved svm method for internet traffic classification based on feature weight learning","author":"hao","year":"2015","journal-title":"Int Conf on Control Automation and Information Sciences"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1901"},{"key":"ref24","first-page":"78","article-title":"Network traffic classification with improved random forest","author":"wang","year":"2016","journal-title":"International Conference on Computational Intelligence and Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223675"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.219"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2478741"}],"event":{"name":"2018 IEEE\/ACM 26th International Symposium on Quality of Service (IWQoS)","location":"Banff, AB, Canada","start":{"date-parts":[[2018,6,4]]},"end":{"date-parts":[[2018,6,6]]}},"container-title":["2018 IEEE\/ACM 26th International Symposium on Quality of Service (IWQoS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8613196\/8624116\/08624124.pdf?arnumber=8624124","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T05:56:28Z","timestamp":1598248588000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8624124\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/iwqos.2018.8624124","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}