{"id":"https://openalex.org/W4405305196","doi":"https://doi.org/10.1109/icis61260.2024.10778376","title":"A Survey of Encrypted Traffic Classification: Datasets, Representation, Approaches and Future Thinking","display_name":"A Survey of Encrypted Traffic Classification: Datasets, Representation, Approaches and Future Thinking","publication_year":2024,"publication_date":"2024-09-20","ids":{"openalex":"https://openalex.org/W4405305196","doi":"https://doi.org/10.1109/icis61260.2024.10778376"},"language":"en","primary_location":{"id":"doi:10.1109/icis61260.2024.10778376","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icis61260.2024.10778376","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE/ACIS 24th International Conference on Computer and Information Science (ICIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100461016","display_name":"Zhihong Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I1302611135","display_name":"Ministry of Public Security of the People's Republic of China","ror":"https://ror.org/00bt9we26","country_code":"CN","type":"government","lineage":["https://openalex.org/I1302611135"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhihong Wang","raw_affiliation_strings":["The Third Research Institute of Ministry of Public Security,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"The Third Research Institute of Ministry of Public Security,Shanghai,China","institution_ids":["https://openalex.org/I1302611135"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103137421","display_name":"Ying Yang","orcid":"https://orcid.org/0000-0003-0166-1241"},"institutions":[{"id":"https://openalex.org/I1302611135","display_name":"Ministry of Public Security of the People's Republic of China","ror":"https://ror.org/00bt9we26","country_code":"CN","type":"government","lineage":["https://openalex.org/I1302611135"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying Yang","raw_affiliation_strings":["The Third Research Institute of Ministry of Public Security,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"The Third Research Institute of Ministry of Public Security,Shanghai,China","institution_ids":["https://openalex.org/I1302611135"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100670532","display_name":"Yongjian Wang","orcid":"https://orcid.org/0000-0001-9356-3782"},"institutions":[{"id":"https://openalex.org/I1302611135","display_name":"Ministry of Public Security of the People's Republic of China","ror":"https://ror.org/00bt9we26","country_code":"CN","type":"government","lineage":["https://openalex.org/I1302611135"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongjian Wang","raw_affiliation_strings":["The Third Research Institute of Ministry of Public Security,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"The Third Research Institute of Ministry of Public Security,Shanghai,China","institution_ids":["https://openalex.org/I1302611135"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100461016"],"corresponding_institution_ids":["https://openalex.org/I1302611135"],"apc_list":null,"apc_paid":null,"fwci":2.1849,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.89843769,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"113","last_page":"120"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9484000205993652,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6876922845840454},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6678820848464966},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.6215999126434326},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4593847393989563},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.45735469460487366},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.4570295214653015},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3628849983215332},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3231777548789978},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16703400015830994}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6876922845840454},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6678820848464966},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.6215999126434326},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4593847393989563},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.45735469460487366},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.4570295214653015},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3628849983215332},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3231777548789978},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16703400015830994},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icis61260.2024.10778376","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icis61260.2024.10778376","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE/ACIS 24th International Conference on Computer and Information Science (ICIS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":80,"referenced_works":["https://openalex.org/W1495633614","https://openalex.org/W1603200341","https://openalex.org/W1964234701","https://openalex.org/W1968696574","https://openalex.org/W1982728146","https://openalex.org/W1992562179","https://openalex.org/W1993568446","https://openalex.org/W2000756828","https://openalex.org/W2055130908","https://openalex.org/W2060312080","https://openalex.org/W2062401262","https://openalex.org/W2073089243","https://openalex.org/W2086288008","https://openalex.org/W2096118443","https://openalex.org/W2098260898","https://openalex.org/W2119271160","https://openalex.org/W2121973001","https://openalex.org/W2135579486","https://openalex.org/W2150779517","https://openalex.org/W2154541283","https://openalex.org/W2158215699","https://openalex.org/W2315603838","https://openalex.org/W2343828539","https://openalex.org/W2486050448","https://openalex.org/W2534437878","https://openalex.org/W2555248751","https://openalex.org/W2586119175","https://openalex.org/W2604062557","https://openalex.org/W2605422749","https://openalex.org/W2606697812","https://openalex.org/W2620689220","https://openalex.org/W2743678626","https://openalex.org/W2784189535","https://openalex.org/W2785889759","https://openalex.org/W2794194105","https://openalex.org/W2906762511","https://openalex.org/W2908025692","https://openalex.org/W2908297277","https://openalex.org/W2911301616","https://openalex.org/W2915004662","https://openalex.org/W2917091861","https://openalex.org/W2919493784","https://openalex.org/W2924962435","https://openalex.org/W2935899418","https://openalex.org/W2960741711","https://openalex.org/W2963516518","https://openalex.org/W2963704216","https://openalex.org/W2966556534","https://openalex.org/W2969295985","https://openalex.org/W2971532963","https://openalex.org/W2976836186","https://openalex.org/W2978828483","https://openalex.org/W2981318525","https://openalex.org/W3009850146","https://openalex.org/W3017387519","https://openalex.org/W3046021859","https://openalex.org/W3047014424","https://openalex.org/W3090440163","https://openalex.org/W3133789493","https://openalex.org/W3159273500","https://openalex.org/W3166930713","https://openalex.org/W3200276839","https://openalex.org/W4210991982","https://openalex.org/W4213219213","https://openalex.org/W4214599792","https://openalex.org/W4285326675","https://openalex.org/W4293088549","https://openalex.org/W4312893735","https://openalex.org/W4312935532","https://openalex.org/W4319966459","https://openalex.org/W4360993886","https://openalex.org/W4365452757","https://openalex.org/W4379054627","https://openalex.org/W4379279904","https://openalex.org/W4379514257","https://openalex.org/W4380634646","https://openalex.org/W4383560183","https://openalex.org/W4387547059","https://openalex.org/W4389154999","https://openalex.org/W4392939489"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W4289281780","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W4237598585","https://openalex.org/W2359552542","https://openalex.org/W2374897487","https://openalex.org/W4205163163"],"abstract_inverted_index":{"Traffic":[0],"classification":[1,34],"technologies":[2],"have":[3,19,50],"evolved":[4],"as":[5],"a":[6,52,63,114],"key":[7],"component":[8],"for":[9,133],"modern":[10],"network":[11],"protection":[12],"and":[13,29,89,110,131],"management":[14],"systems.":[15],"However,":[16],"encryption":[17],"algorithms":[18],"been":[20],"adopted":[21],"in":[22,69,86,136],"traffic":[23,33,56,77,102,105,138],"transmission":[24],"to":[25],"enhance":[26],"communication":[27],"security":[28],"privacy":[30],"protection.":[31],"Traditional":[32],"methods":[35],"that":[36],"rely":[37],"on":[38,54,66],"valuable":[39],"information":[40],"from":[41,122],"payloads":[42],"gradually":[43],"become":[44],"ineffective.":[45],"To":[46,79],"this":[47,59,87],"end,":[48],"researchers":[49],"conducted":[51,121],"lot":[53],"encrypted":[55,76,101,137],"classification.":[57,139],"In":[58],"paper,":[60],"we":[61,82,95,127],"present":[62],"comprehensive":[64,115],"survey":[65],"recent":[67],"achievements":[68],"traditional-machine-learning":[70],"(TML)":[71],"or":[72],"deep-learning":[73],"(DL)":[74],"powered":[75],"analysis.":[78],"begin":[80],"with,":[81],"review":[83,116],"the":[84,91,97],"literature":[85],"area":[88],"summarize":[90],"analysis":[92,108],"goals.":[93],"Secondly,":[94],"abstract":[96],"overall":[98],"framework":[99],"of":[100,117],"classification,":[103],"including":[104],"collection,":[106],"representation,":[107],"methods,":[109],"performance":[111],"evaluation.":[112],"Then":[113],"existing":[118],"research":[119,135],"was":[120],"these":[123],"four":[124],"aspects.":[125],"Lastly,":[126],"conclude":[128],"with":[129],"challenges":[130],"directions":[132],"future":[134]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
