{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T04:18:51Z","timestamp":1772252331595,"version":"3.50.1"},"reference-count":34,"publisher":"Wiley","issue":"16","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm. Networks"],"published-print":{"date-parts":[[2016,11,10]]},"DOI":"10.1002\/sec.1557","type":"journal-article","created":{"date-parts":[[2016,7,25]],"date-time":"2016-07-25T06:26:01Z","timestamp":1469427961000},"page":"3509-3526","source":"Crossref","is-referenced-by-count":15,"title":["On detecting unidentified network traffic using pattern-based random walk"],"prefix":"10.1002","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7274-9569","authenticated-orcid":false,"given":"Mehran Alidoost","family":"Nia","sequence":"first","affiliation":[{"name":"Department of Computer Engineering; University of Guilan; Rasht Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9180-8707","authenticated-orcid":false,"given":"Reza Ebrahimi","family":"Atani","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering; University of Guilan; Rasht Iran"}]},{"given":"Benjamin","family":"Fabian","sequence":"additional","affiliation":[{"name":"Information Systems; Humboldt University of Berlin; Berlin Germany"}]},{"given":"Eduard","family":"Babulak","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, VSTE; Czech Republic and Maharishi University of Management; IA USA"}]}],"member":"311","published-online":{"date-parts":[[2016,7,25]]},"reference":[{"key":"10.1002\/sec.1557-BIB0001|sec1557-cit-0001","unstructured":"Goodwin S The harsh reality of cyber protection 2015"},{"key":"10.1002\/sec.1557-BIB0002|sec1557-cit-0002","unstructured":"National Vulnerability Database CVSS severity distribution over time"},{"key":"10.1002\/sec.1557-BIB0003|sec1557-cit-0003","unstructured":"Coull SE Wright CV Monrose F Collinsy MP Reiter MK Playing devil's advocate: inferring sensitive information from anonymized network traces 2007"},{"key":"10.1002\/sec.1557-BIB0004|sec1557-cit-0004","first-page":"2745","article-title":"On inferring application protocol behaviors in encrypted network traffic","volume":"7","author":"Wright","year":"2006","journal-title":"The Journal of Machine Learning Research Archive"},{"key":"10.1002\/sec.1557-BIB0005|sec1557-cit-0005","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511750854","volume-title":"Random Walk: A Modern Introduction","author":"Lawler","year":"2010"},{"key":"10.1002\/sec.1557-BIB0006|sec1557-cit-0006","unstructured":"Kozdron M An introduction to random walks from polya to self-avoidance 1998"},{"key":"10.1002\/sec.1557-BIB0007|sec1557-cit-0007","unstructured":"Slade G Blath J Imkeller P Roelly S The self-avoiding walk: a brief survey 2009"},{"key":"10.1002\/sec.1557-BIB0008|sec1557-cit-0008","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/BF02099530","article-title":"Self-avoiding walk in five or more dimensions I. The critical behaviour","volume":"147","author":"Hara","year":"1992","journal-title":"Journal of Communications in Mathematical Physics"},{"key":"10.1002\/sec.1557-BIB0009|sec1557-cit-0009","volume-title":"Birkh\u00e4user Applied Probability and Statistics, Series Probability and Its Applications","author":"Madras","year":"2013"},{"key":"10.1002\/sec.1557-BIB0010|sec1557-cit-0010","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1016\/j.comnet.2011.09.007","article-title":"Session level flow classification by packet size distribution and session grouping","volume":"56","author":"Lu","year":"2012","journal-title":"Journal of Computer Networks"},{"key":"10.1002\/sec.1557-BIB0011|sec1557-cit-0011","unstructured":"Coull SE Wright CV Keromytisz AD Monrose F Reiter MK Taming the devil: techniques for evaluating anonymized network data 2008"},{"key":"10.1002\/sec.1557-BIB0012|sec1557-cit-0012","unstructured":"Lin WWK Wu RSL Wong AKY Dillon TS A novel internet real-time traffic pattern detection technique for better pervasive computing 2006"},{"issue":"12","key":"10.1002\/sec.1557-BIB0013|sec1557-cit-0013","doi-asserted-by":"crossref","first-page":"2761","DOI":"10.1002\/sec.793","article-title":"On collaborative anonymous communications in lossy networks","volume":"7","author":"Rebollo-Monedero","year":"2014","journal-title":"Journal of Security and Communication Networks"},{"key":"10.1002\/sec.1557-BIB0014|sec1557-cit-0014","doi-asserted-by":"crossref","unstructured":"Chaabane A Manils P Kaafar MA Digging into anonymous traffic: a deep analysis of the Tor anonymizing network 2010","DOI":"10.1109\/NSS.2010.47"},{"key":"10.1002\/sec.1557-BIB0015|sec1557-cit-0015","first-page":"1","article-title":"Random walks on graphs: a survey","volume":"2","author":"Lov\u00e1sz","year":"1993","journal-title":"Journal of Mathematical Studies, Bolyai Society"},{"key":"10.1002\/sec.1557-BIB0016|sec1557-cit-0016","doi-asserted-by":"crossref","unstructured":"Nia MA Karbasi AH Atani RE Stop tracking me: an anti-detection type solution for anonymous data th 2014","DOI":"10.1109\/ICCKE.2014.6993463"},{"key":"10.1002\/sec.1557-BIB0017|sec1557-cit-0017","unstructured":"Wright CV Coull SE Monrose F Traffic morphing: an efficient defense against statistical traffic analysis 2009"},{"key":"10.1002\/sec.1557-BIB0018|sec1557-cit-0018","doi-asserted-by":"crossref","unstructured":"Nia MA Kiaei SK Atani RE Fabian B A software solution for realtime malware detection in distributed systems th 2015","DOI":"10.1109\/ISCISC.2015.7387913"},{"issue":"3","key":"10.1002\/sec.1557-BIB0019|sec1557-cit-0019","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1109\/TKDE.2007.46","article-title":"Random-walk computation of similarities between nodes of a graph, with application to collaborative recommendation","volume":"19","author":"Fouss","year":"2006","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10.1002\/sec.1557-BIB0020|sec1557-cit-0020","volume-title":"Clay Mathematics Proceedings","volume":"15","author":"Bauerschmidt","year":"2012"},{"issue":"3","key":"10.1002\/sec.1557-BIB0021|sec1557-cit-0021","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/SURV.2009.090304","article-title":"A survey on internet traffic identification","volume":"11","author":"Callado","year":"2009","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"3","key":"10.1002\/sec.1557-BIB0022|sec1557-cit-0022","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/j.peva.2005.01.002","article-title":"Random walks in peer-to-peer networks","volume":"63","author":"Gkantsidis","year":"2006","journal-title":"Journal of Performance Evaluation-P2P Computing Systems"},{"key":"10.1002\/sec.1557-BIB0023|sec1557-cit-0023","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.92.118701","volume-title":"Statistical Mechanics, Cornell University Library","author":"Noh","year":"2003"},{"key":"10.1002\/sec.1557-BIB0024|sec1557-cit-0024","doi-asserted-by":"crossref","unstructured":"Dingledine R Mathewson N Syverson N Tor: the second-generation onion router 2004","DOI":"10.21236\/ADA465464"},{"issue":"2","key":"10.1002\/sec.1557-BIB0025|sec1557-cit-0025","doi-asserted-by":"crossref","first-page":"787","DOI":"10.1214\/aop\/1024404419","article-title":"Ladder heights, Gaussian random walks and the Riemann zeta function","volume":"25","author":"Chang","year":"1997","journal-title":"Journal the Annals of Probability"},{"issue":"7","key":"10.1002\/sec.1557-BIB0026|sec1557-cit-0026","doi-asserted-by":"crossref","first-page":"1254","DOI":"10.1109\/49.857925","article-title":"A new random walk model for PCS networks","volume":"18","author":"Akyildiz","year":"2000","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1002\/sec.1557-BIB0027|sec1557-cit-0027","unstructured":"National Vulnerability Database Relative vulnerability type totals by year"},{"issue":"16","key":"10.1002\/sec.1557-BIB0028|sec1557-cit-0028","doi-asserted-by":"crossref","first-page":"2917","DOI":"10.1002\/sec.1219","article-title":"Privacy enhancement in anonymous network channels using multimodality injection","volume":"8","author":"Nia","year":"2015","journal-title":"Security and Communication Networks"},{"issue":"14","key":"10.1002\/sec.1557-BIB0029|sec1557-cit-0029","doi-asserted-by":"crossref","first-page":"2981","DOI":"10.1080\/0143116031000086835","article-title":"Higher-order interpolation of regular grid digital elevation models","volume":"24","author":"Kidner","year":"2003","journal-title":"International Journal of Remote Sensing"},{"issue":"2","key":"10.1002\/sec.1557-BIB0030|sec1557-cit-0030","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/BF02769628","article-title":"Discrete modeling for natural objects","volume":"29","author":"Mallet","year":"1997","journal-title":"Springer Journal of Mathematical Geology"},{"key":"10.1002\/sec.1557-BIB0031|sec1557-cit-0031","series-title":"Volume 293 of the series Communications in Computer and Information Science","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/978-3-642-30507-8_13","volume-title":"Networked Digital Technologies","author":"Syarif","year":"2012"},{"key":"10.1002\/sec.1557-BIB0032|sec1557-cit-0032","doi-asserted-by":"crossref","unstructured":"Ahmed M Mahmood AN Network traffic pattern analysis using improved information theoretic co-clustering based collective anomaly detection 2015","DOI":"10.1007\/978-3-319-23802-9_17"},{"key":"10.1002\/sec.1557-BIB0033|sec1557-cit-0033","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","article-title":"A survey of network anomaly detection techniques","volume":"60","author":"Ahmed","year":"2016","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"10.1002\/sec.1557-BIB0034|sec1557-cit-0034","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2716260","article-title":"Taxonomy and survey of collaborative intrusion detection","volume":"47","author":"Vasilomanolakis","year":"2015","journal-title":"ACM Computing Surveys"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1557","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,7,4]],"date-time":"2021-07-04T05:35:38Z","timestamp":1625376938000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.1557"}},"subtitle":["On detecting unidentified network traffic using random walk"],"short-title":[],"issued":{"date-parts":[[2016,7,25]]},"references-count":34,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2016,11,10]]}},"URL":"https:\/\/doi.org\/10.1002\/sec.1557","archive":["Portico"],"relation":{},"ISSN":["1939-0114"],"issn-type":[{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2016,7,25]]}}}