{"id":"https://openalex.org/W4285111199","doi":"https://doi.org/10.1109/tdsc.2022.3186665","title":"Network Traffic Content Identification Based on Time-Scale Signal Modeling","display_name":"Network Traffic Content Identification Based on Time-Scale Signal Modeling","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4285111199","doi":"https://doi.org/10.1109/tdsc.2022.3186665"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2022.3186665","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3186665","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101799508","display_name":"Liang Yu","orcid":"https://orcid.org/0000-0002-5439-8769"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yu Liang","raw_affiliation_strings":["School of Computer Science and Engineering (and the GuangDong Province Key Laboratory of Information Security Technology), Sun Yat-sen University, Guangzhou, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering (and the GuangDong Province Key Laboratory of Information Security Technology), Sun Yat-sen University, Guangzhou, P.R. China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006633399","display_name":"Yi Xie","orcid":"https://orcid.org/0000-0002-8899-4032"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Xie","raw_affiliation_strings":["School of Computer Science and Engineering (and the GuangDong Province Key Laboratory of Information Security Technology), Sun Yat-sen University, Guangzhou, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering (and the GuangDong Province Key Laboratory of Information Security Technology), Sun Yat-sen University, Guangzhou, P.R. China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019439179","display_name":"Shensheng Tang","orcid":"https://orcid.org/0000-0002-1889-2794"},"institutions":[{"id":"https://openalex.org/I173963315","display_name":"St. Cloud State University","ror":"https://ror.org/016czhx14","country_code":"US","type":"education","lineage":["https://openalex.org/I173963315","https://openalex.org/I91221267"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shensheng Tang","raw_affiliation_strings":["Dept. of Electrical and Computer Engineering, St Cloud State University, St Cloud, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical and Computer Engineering, St Cloud State University, St Cloud, USA","institution_ids":["https://openalex.org/I173963315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100768971","display_name":"Shun\u2010Zheng Yu","orcid":"https://orcid.org/0000-0002-7797-9224"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shunzheng Yu","raw_affiliation_strings":["School of Computer Science and Engineering (and the GuangDong Province Key Laboratory of Information Security Technology), Sun Yat-sen University, Guangzhou, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering (and the GuangDong Province Key Laboratory of Information Security Technology), Sun Yat-sen University, Guangzhou, P.R. China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044610505","display_name":"Xingcheng Liu","orcid":"https://orcid.org/0000-0003-1836-2205"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingcheng Liu","raw_affiliation_strings":["School of Electronics and Information Technology, Sun Yat-sen University, Guangzhou, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Information Technology, Sun Yat-sen University, Guangzhou, P.R. China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075234257","display_name":"Jiankun Hu","orcid":"https://orcid.org/0000-0003-0230-1432"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]},{"id":"https://openalex.org/I40053085","display_name":"Australian Defence Force Academy","ror":"https://ror.org/02j5s7g39","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571","https://openalex.org/I40053085","https://openalex.org/I4394709116"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jiankun Hu","raw_affiliation_strings":["School of Engineering and Information Technology, University of New South Wales at the Australian Defence Force Academy, Canberra, Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Information Technology, University of New South Wales at the Australian Defence Force Academy, Canberra, Australia","institution_ids":["https://openalex.org/I40053085","https://openalex.org/I31746571"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101799508"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.4142,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.61460946,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"19"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8522182703018188},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.627486526966095},{"id":"https://openalex.org/keywords/hidden-markov-model","display_name":"Hidden Markov model","score":0.4390985071659088},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.4243597984313965},{"id":"https://openalex.org/keywords/wavelet","display_name":"Wavelet","score":0.41803205013275146},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4024696350097656},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3809897005558014},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.26005953550338745},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.17137417197227478}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8522182703018188},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.627486526966095},{"id":"https://openalex.org/C23224414","wikidata":"https://www.wikidata.org/wiki/Q176769","display_name":"Hidden Markov model","level":2,"score":0.4390985071659088},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.4243597984313965},{"id":"https://openalex.org/C47432892","wikidata":"https://www.wikidata.org/wiki/Q831390","display_name":"Wavelet","level":2,"score":0.41803205013275146},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4024696350097656},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3809897005558014},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.26005953550338745},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.17137417197227478}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2022.3186665","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3186665","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W1498436455","https://openalex.org/W1524496078","https://openalex.org/W1972428331","https://openalex.org/W1975205701","https://openalex.org/W2019448438","https://openalex.org/W2019774807","https://openalex.org/W2041855183","https://openalex.org/W2043360390","https://openalex.org/W2051000513","https://openalex.org/W2134929491","https://openalex.org/W2137831706","https://openalex.org/W2148346742","https://openalex.org/W2243508467","https://openalex.org/W2359965765","https://openalex.org/W2487561892","https://openalex.org/W2511505324","https://openalex.org/W2515835885","https://openalex.org/W2532581038","https://openalex.org/W2541398239","https://openalex.org/W2597801525","https://openalex.org/W2611159092","https://openalex.org/W2764080192","https://openalex.org/W2771013472","https://openalex.org/W2787953552","https://openalex.org/W2792383985","https://openalex.org/W2794833484","https://openalex.org/W2795340004","https://openalex.org/W2804559716","https://openalex.org/W2809684781","https://openalex.org/W2892062861","https://openalex.org/W2899948414","https://openalex.org/W2900853407","https://openalex.org/W2912386632","https://openalex.org/W2918992226","https://openalex.org/W2919493784","https://openalex.org/W2942890744","https://openalex.org/W2962996477","https://openalex.org/W2981318525","https://openalex.org/W2989178978","https://openalex.org/W3007184303","https://openalex.org/W3014644090","https://openalex.org/W3017387519","https://openalex.org/W3026902724","https://openalex.org/W3033916366","https://openalex.org/W3045016378","https://openalex.org/W3083285969","https://openalex.org/W3109491787","https://openalex.org/W3192435828","https://openalex.org/W6631506987","https://openalex.org/W6765917737"],"related_works":["https://openalex.org/W2364370872","https://openalex.org/W2053269318","https://openalex.org/W2025614924","https://openalex.org/W2294335174","https://openalex.org/W2097963413","https://openalex.org/W2995886640","https://openalex.org/W1591475660","https://openalex.org/W2001275470","https://openalex.org/W3145575561","https://openalex.org/W2164162849"],"abstract_inverted_index":{"Identifying":[0],"the":[1,18,33,43,65,73,83,113,126,130,138,142,146,155,168,193],"nature":[2],"of":[3,45,86,112,122,129,164],"data":[4,69,88,169],"flows":[5,170],"can":[6],"help":[7],"improve":[8],"network":[9,103],"service":[10],"and":[11,23,76,90,145,157,176,198],"security.":[12],"Most":[13],"existing":[14],"solutions":[15],"usually":[16],"simplify":[17],"traffic":[19],"classification":[20],"to":[21,42,62,81,105,136,191],"protocol":[22],"application":[24],"identification":[25,180],"based":[26],"on":[27],"some":[28],"uniqueness":[29],"assumptions.":[30],"However,":[31],"in":[32],"real":[34,187],"world":[35],"these":[36,107],"assumptions":[37],"aren&#x2019;t":[38],"always":[39],"reasonable":[40],"due":[41],"abuse":[44],"multiplexing":[46],"techniques.":[47],"In":[48],"this":[49],"work,":[50],"a":[51,57,68,92,116,172,182],"new":[52,93,152],"scheme":[53],"is":[54,134],"proposed":[55,194],"from":[56],"different":[58],"perspective":[59],"that":[60],"aims":[61],"directly":[63],"identify":[64],"content":[66,179],"inside":[67],"flow":[70,89],"without":[71],"considering":[72],"external":[74],"protocols":[75],"applications.":[77],"We":[78,150],"use":[79],"wavelet":[80],"obtain":[82],"time-scale":[84,127,148],"signals":[85],"each":[87,162],"develop":[91],"hidden":[94,110,123],"Markov":[95],"tree":[96],"(HMT)":[97],"with":[98,200],"an":[99,159],"embedding":[100],"deep":[101],"neural":[102],"(DNN)":[104],"model":[106,156],"signals.":[108,149],"Each":[109],"state":[111],"HMT":[114],"represents":[115],"specific":[117],"signal":[118,131],"generation":[119],"pattern.":[120],"Transition":[121],"states":[124],"describes":[125],"context":[128],"patterns.":[132],"DNN":[133],"used":[135],"describe":[137],"probabilistic":[139],"relationship":[140],"between":[141],"implicit":[143],"patterns":[144],"observed":[147],"derive":[151],"algorithms":[153],"for":[154,161],"create":[158],"instance":[160],"type":[163],"traffic,":[165],"which":[166],"projects":[167],"into":[171],"multi-dimensional":[173],"decision":[174],"space":[175],"achieves":[177],"their":[178],"through":[181],"classifier.":[183],"Numerical":[184],"experiments":[185],"using":[186],"datasets":[188],"are":[189,203],"presented":[190],"validate":[192],"scheme.":[195],"Performance-related":[196],"issues":[197],"comparisons":[199],"related":[201],"works":[202],"discussed.":[204]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
