{"id":"https://openalex.org/W2110257349","doi":"https://doi.org/10.1109/wkdd.2009.116","title":"A Novel P2P Traffic Identification Scheme Based on Support Vector Machine Fuzzy Network","display_name":"A Novel P2P Traffic Identification Scheme Based on Support Vector Machine Fuzzy Network","publication_year":2009,"publication_date":"2009-01-01","ids":{"openalex":"https://openalex.org/W2110257349","doi":"https://doi.org/10.1109/wkdd.2009.116","mag":"2110257349"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/wkdd.2009.116","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110064419","display_name":"Zhong Gao","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhong Gao","raw_affiliation_strings":["Coll. of Telecommun. & Inf. Eng., Nanjing Univ. of Posts & Telecommun., Nanjing"],"affiliations":[{"raw_affiliation_string":"Coll. of Telecommun. & Inf. Eng., Nanjing Univ. of Posts & Telecommun., Nanjing","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065519164","display_name":"Guanming Lu","orcid":"https://orcid.org/0000-0003-4860-8229"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guanming Lu","raw_affiliation_strings":["Coll. of Telecommun. & Inf. Eng., Nanjing Univ. of Posts & Telecommun., Nanjing"],"affiliations":[{"raw_affiliation_string":"Coll. of Telecommun. & Inf. Eng., Nanjing Univ. of Posts & Telecommun., Nanjing","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103543626","display_name":"Daquan Gu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210163363","display_name":"PLA Army Engineering University","ror":"https://ror.org/05mgp8x93","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210163363"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Daquan Gu","raw_affiliation_strings":["Coll. of Meteorol., PLA Univ. of Sci. & Technol., Nanjing"],"affiliations":[{"raw_affiliation_string":"Coll. of Meteorol., PLA Univ. of Sci. & Technol., Nanjing","institution_ids":["https://openalex.org/I4210163363"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.537,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":9,"citation_normalized_percentile":{"value":0.693148,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":83,"max":84},"biblio":{"volume":null,"issue":null,"first_page":"909","last_page":"912"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9948,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.77858055},{"id":"https://openalex.org/keywords/identification-scheme","display_name":"Identification scheme","score":0.6053118},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic Analysis","score":0.542747},{"id":"https://openalex.org/keywords/botnet-detection","display_name":"Botnet Detection","score":0.536721},{"id":"https://openalex.org/keywords/encrypted-traffic","display_name":"Encrypted Traffic","score":0.517679},{"id":"https://openalex.org/keywords/internet-traffic","display_name":"Internet Traffic","score":0.507383},{"id":"https://openalex.org/keywords/bot-detection","display_name":"Bot Detection","score":0.506831}],"concepts":[{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.77858055},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.74950016},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.67691404},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.66848177},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.6243573},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6077807},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6063491},{"id":"https://openalex.org/C2778922385","wikidata":"https://www.wikidata.org/wiki/Q3475620","display_name":"Identification scheme","level":3,"score":0.6053118},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.5053616},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.46722683},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3812711},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.37370193},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36428756},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30127412},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.087447435},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07390228},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/wkdd.2009.116","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":9,"referenced_works":["https://openalex.org/W1559810148","https://openalex.org/W1563088657","https://openalex.org/W1563524306","https://openalex.org/W2041855183","https://openalex.org/W2109943925","https://openalex.org/W2139212933","https://openalex.org/W2144098589","https://openalex.org/W2156909104","https://openalex.org/W2169610"],"related_works":["https://openalex.org/W52733585","https://openalex.org/W2800872028","https://openalex.org/W2388464034","https://openalex.org/W2387272121","https://openalex.org/W2378650763","https://openalex.org/W2372764048","https://openalex.org/W2164808481","https://openalex.org/W2133994567","https://openalex.org/W2100694577","https://openalex.org/W2092530219"],"abstract_inverted_index":{"With":[0],"the":[1,5,7,31,34,68,86,90,101],"rapid":[2],"development":[3],"of":[4,17,33,92,100],"Internet,":[6],"P2P":[8,35,53],"(Peer-to-Peer)":[9],"technology":[10],"which":[11,56],"is":[12,39],"characterized":[13],"by":[14],"no":[15],"utilization":[16],"any":[18],"servers":[19],"with":[20,78],"centralized":[21],"functions":[22],"has":[23],"kept":[24],"advancing":[25],"apace.":[26],"However,":[27],"how":[28],"to":[29,66,98,106],"improve":[30],"accuracy":[32,91],"traffic":[36,54],"identification":[37,69,93],"efficiently":[38],"still":[40],"a":[41,49,58],"challenging":[42],"problem.":[43],"In":[44],"this":[45],"paper,":[46],"we":[47],"propose":[48],"new":[50],"approach":[51],"for":[52],"identification,":[55],"uses":[57],"novel":[59],"Support":[60],"Vector":[61],"Machine":[62],"Fuzzy":[63],"Network":[64],"(SVMFN)":[65],"make":[67],"more":[70],"suitable":[71],"and":[72,89,104],"accurate":[73],"in":[74],"various":[75],"network":[76],"environments":[77],"different":[79],"rates.":[80],"The":[81],"experimental":[82],"results":[83],"show":[84],"that":[85,99],"generalization":[87],"performance":[88],"are":[94],"improved":[95],"significantly":[96],"compared":[97],"traditional":[102],"methods,":[103],"adapt":[105],"engineering":[107],"applications.":[108]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2110257349","counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2024-12-05T03:55:13.521078","created_date":"2016-06-24"}