{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T19:59:26Z","timestamp":1762545566001,"version":"build-2065373602"},"reference-count":48,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB4500800"],"award-info":[{"award-number":["2022YFB4500800"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["42071431"],"award-info":[{"award-number":["42071431"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1016\/j.comnet.2025.111495","type":"journal-article","created":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T04:43:50Z","timestamp":1751431430000},"page":"111495","update-policy":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["ESTK-JC: Encrypted malicious traffic detection fusing spatio-temporal features and JointCloud entity knowledge for JointCloud environment"],"prefix":"10.1016","volume":"270","author":[{"given":"Rongwei","family":"Yu","sequence":"first","affiliation":[]},{"given":"Zijian","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yuhao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Lina","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qiyun","family":"Shao","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2025.111495_b1","series-title":"2017 IEEE 37th International Conference on Distributed Computing Systems","first-page":"1846","article-title":"Jointcloud: A cross-cloud cooperation architecture for integrated internet service customization","author":"Wang","year":"2017"},{"issue":"3","key":"10.1016\/j.comnet.2025.111495_b2","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1109\/JIOT.2019.2942006","article-title":"The inherent mechanism and a case study of the constructional evolution of the jointcloud ecosystem","volume":"7","author":"Shi","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2025.111495_b3","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2024.110716","article-title":"Service recommendation in JointCloud environments: An efficient regret theory-based qos-aware approach","volume":"254","author":"Shi","year":"2024","journal-title":"Comput. Netw."},{"issue":"1","key":"10.1016\/j.comnet.2025.111495_b4","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1109\/COMST.2022.3208196","article-title":"Machine learning-powered encrypted network traffic analysis: A comprehensive survey","volume":"25","author":"Shen","year":"2022","journal-title":"IEEE Commun. Surv. Tutor."},{"year":"2023","series-title":"High-Performance Computing (HPC) Security: Architecture, Threat Analysis, and Security Posture","author":"Guo","key":"10.1016\/j.comnet.2025.111495_b5"},{"key":"10.1016\/j.comnet.2025.111495_b6","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/978-3-030-33432-1_6","article-title":"Autonomous security mechanisms for high-performance computing systems: review and analysis","author":"Hou","year":"2020","journal-title":"Adapt. Auton. Secur. Cyber Syst."},{"key":"10.1016\/j.comnet.2025.111495_b7","first-page":"1","article-title":"HTTPS traffic analysis and client identification using passive SSL\/TLS fingerprinting","volume":"2016","author":"Hus\u00e1k","year":"2016","journal-title":"EURASIP J. Inf. Secur."},{"issue":"1","key":"10.1016\/j.comnet.2025.111495_b8","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2021.100033","article-title":"Towards privacy-preserving dynamic deep packet inspection over outsourced middleboxes","volume":"2","author":"Li","year":"2022","journal-title":"High-Confid. Comput."},{"key":"10.1016\/j.comnet.2025.111495_b9","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.eswa.2019.01.064","article-title":"Feature analysis of encrypted malicious traffic","volume":"125","author":"Shekhawat","year":"2019","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.comnet.2025.111495_b10","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/j.jpdc.2019.09.013","article-title":"En-ABC: An ensemble artificial bee colony based anomaly detection scheme for cloud environment","volume":"135","author":"Garg","year":"2020","journal-title":"J. Parallel Distrib. Comput."},{"issue":"3","key":"10.1016\/j.comnet.2025.111495_b11","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1007\/s41315-022-00239-x","article-title":"An effective optimization enabled deep learning based malicious behaviour detection in cloud computing","volume":"7","author":"Bhingarkar","year":"2023","journal-title":"Int. J. Intell. Robot. Appl."},{"issue":"3","key":"10.1016\/j.comnet.2025.111495_b12","first-page":"1653","article-title":"GOSVM: Gannet optimization based support vector machine for malicious attack detection in cloud environment","volume":"15","author":"Arunkumar","year":"2023","journal-title":"Int. J. Inf. Technol."},{"key":"10.1016\/j.comnet.2025.111495_b13","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.comcom.2023.12.024","article-title":"Malicious traffic detection for cloud-edge-end networks: A deep learning approach","volume":"215","author":"Liu","year":"2024","journal-title":"Comput. Commun."},{"key":"10.1016\/j.comnet.2025.111495_b14","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103299","article-title":"Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks","volume":"131","author":"S\u00e1ez-de C\u00e1mara","year":"2023","journal-title":"Comput. Secur."},{"key":"10.1016\/j.comnet.2025.111495_b15","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.104083","article-title":"GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism","volume":"147","author":"Chen","year":"2024","journal-title":"Comput. Secur."},{"key":"10.1016\/j.comnet.2025.111495_b16","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103465","article-title":"Network intrusion detection based on the temporal convolutional model","volume":"135","author":"Lopes","year":"2023","journal-title":"Comput. Secur."},{"key":"10.1016\/j.comnet.2025.111495_b17","article-title":"Fedsbs: Federated-learning participant-selection method for intrusion detection systems","volume":"244","author":"Neto","year":"2024","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2025.111495_b18","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2023.109662","article-title":"Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks","volume":"225","author":"Syed","year":"2023","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2025.111495_b19","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103878","article-title":"Exhaustive distributed intrusion detection system for UAVs attacks detection and security enforcement (E-DIDS)","volume":"142","author":"Tlili","year":"2024","journal-title":"Comput. Secur."},{"key":"10.1016\/j.comnet.2025.111495_b20","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2023.109982","article-title":"Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things","volume":"235","author":"Wang","year":"2023","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2025.111495_b21","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102542","article-title":"Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study","volume":"113","author":"Wang","year":"2022","journal-title":"Comput. Secur."},{"key":"10.1016\/j.comnet.2025.111495_b22","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103143","article-title":"Feature mining for encrypted malicious traffic detection with deep learning and other machine learning algorithms","volume":"128","author":"Wang","year":"2023","journal-title":"Comput. Secur."},{"key":"10.1016\/j.comnet.2025.111495_b23","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2023.110120","article-title":"PETNet: Plaintext-aware encrypted traffic detection network for identifying Cobalt Strike HTTPS traffics","volume":"238","author":"Yang","year":"2024","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2025.111495_b24","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2024.110598","article-title":"Encrypted malicious traffic detection based on natural language processing and deep learning","author":"Zang","year":"2024","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2025.111495_b25","doi-asserted-by":"crossref","first-page":"80072","DOI":"10.1109\/ACCESS.2023.3279120","article-title":"Identification of malicious encrypted traffic through feature fusion","volume":"11","author":"Zheng","year":"2023","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.comnet.2025.111495_b26","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1186\/s13677-023-00430-w","article-title":"Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural network","volume":"12","author":"Zhou","year":"2023","journal-title":"J. Cloud Comput."},{"key":"10.1016\/j.comnet.2025.111495_b27","series-title":"Fourth International Congress on Information and Communication Technology: ICICT 2019, London, Volume 2","first-page":"99","article-title":"Against malicious SSL\/TLS encryption: identify malicious traffic based on random forest","author":"Fang","year":"2020"},{"key":"10.1016\/j.comnet.2025.111495_b28","doi-asserted-by":"crossref","unstructured":"T. Van Ede, R. Bortolameotti, A. Continella, J. Ren, D.J. Dubois, M. Lindorfer, D. Choffnes, M. Van Steen, A. Peter, Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic, in: Network and Distributed System Security Symposium, NDSS, vol. 27, 2020.","DOI":"10.14722\/ndss.2020.24412"},{"key":"10.1016\/j.comnet.2025.111495_b29","article-title":"ERNN: Error-resilient RNN for encrypted traffic detection towards network-induced phenomena","author":"Zhao","year":"2023","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"10.1016\/j.comnet.2025.111495_b30","doi-asserted-by":"crossref","DOI":"10.1109\/TIFS.2023.3300521","article-title":"CBSeq: A channel-level behavior sequence for encrypted malware traffic detection","author":"Cui","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"17","key":"10.1016\/j.comnet.2025.111495_b31","doi-asserted-by":"crossref","first-page":"9588","DOI":"10.3390\/app13179588","article-title":"Towards an intelligent intrusion detection system to detect malicious activities in cloud computing","volume":"13","author":"Attou","year":"2023","journal-title":"Appl. Sci."},{"key":"10.1016\/j.comnet.2025.111495_b32","series-title":"2024 International Joint Conference on Neural Networks","first-page":"1","article-title":"ProDiffAD: Progressively distilled diffusion models for multivariate time series anomaly detection in JointCloud environment","author":"Tian","year":"2024"},{"key":"10.1016\/j.comnet.2025.111495_b33","series-title":"International Conference on Knowledge Science, Engineering and Management","first-page":"28","article-title":"Dynamic splitting of diffusion models for multivariate time series anomaly detection in a JointCloud environment","author":"Chen","year":"2024"},{"issue":"7","key":"10.1016\/j.comnet.2025.111495_b34","doi-asserted-by":"crossref","first-page":"977","DOI":"10.3390\/electronics11070977","article-title":"Deep-forest-based encrypted malicious traffic detection","volume":"11","author":"Zhang","year":"2022","journal-title":"Electronics"},{"key":"10.1016\/j.comnet.2025.111495_b35","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103580","article-title":"A malicious network traffic detection model based on bidirectional temporal convolutional network with multi-head self-attention mechanism","volume":"136","author":"Cai","year":"2024","journal-title":"Comput. Secur."},{"key":"10.1016\/j.comnet.2025.111495_b36","article-title":"ATVITSC: A novel encrypted traffic classification method based on deep learning","author":"Liu","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"year":"2020","series-title":"An image is worth 16x16 words: Transformers for image recognition at scale","author":"Dosovitskiy","key":"10.1016\/j.comnet.2025.111495_b37"},{"key":"10.1016\/j.comnet.2025.111495_b38","doi-asserted-by":"crossref","unstructured":"A. Srinivas, T.-Y. Lin, N. Parmar, J. Shlens, P. Abbeel, A. Vaswani, Bottleneck transformers for visual recognition, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 16519\u201316529.","DOI":"10.1109\/CVPR46437.2021.01625"},{"key":"10.1016\/j.comnet.2025.111495_b39","article-title":"Attention is all you need","author":"Vaswani","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."},{"year":"2018","series-title":"An empirical evaluation of generic convolutional and recurrent networks for sequence modeling","author":"Bai","key":"10.1016\/j.comnet.2025.111495_b40"},{"year":"2015","series-title":"Prometheus: A {Next-Generation} monitoring system (talk)","author":"Rabenstein","key":"10.1016\/j.comnet.2025.111495_b41"},{"key":"10.1016\/j.comnet.2025.111495_b42","series-title":"2020 International Conference on Computer Vision, Image and Deep Learning","first-page":"206","article-title":"Monitoring system of openstack cloud platform based on prometheus","author":"Chen","year":"2020"},{"key":"10.1016\/j.comnet.2025.111495_b43","series-title":"2017 IFIP\/IEEE Symposium on Integrated Network and Service Management","first-page":"400","article-title":"CloudSim plus: a cloud computing simulation framework pursuing software engineering principles for improved modularity, extensibility and correctness","author":"Silva Filho","year":"2017"},{"key":"10.1016\/j.comnet.2025.111495_b44","article-title":"Time-distributed feature learning for internet of things network traffic classification","author":"Manjunath","year":"2024","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"3","key":"10.1016\/j.comnet.2025.111495_b45","doi-asserted-by":"crossref","first-page":"1369","DOI":"10.1109\/TNET.2022.3215507","article-title":"A novel multimodal deep learning framework for encrypted traffic classification","volume":"31","author":"Lin","year":"2022","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"10.1016\/j.comnet.2025.111495_b46","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119229","article-title":"Graph based encrypted malicious traffic detection with hybrid analysis of multi-view features","volume":"644","author":"Hong","year":"2023","journal-title":"Inform. Sci."},{"issue":"4","key":"10.1016\/j.comnet.2025.111495_b47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3613960","article-title":"TLS-MHSA: An efficient detection model for encrypted malicious traffic based on multi-head self-attention mechanism","volume":"26","author":"Chen","year":"2023","journal-title":"ACM Trans. Priv. Secur."},{"issue":"13","key":"10.1016\/j.comnet.2025.111495_b48","doi-asserted-by":"crossref","first-page":"11773","DOI":"10.1109\/JIOT.2023.3244544","article-title":"CMTSNN: A deep learning model for multiclassification of abnormal and encrypted traffic of Internet of Things","volume":"10","author":"Zhu","year":"2023","journal-title":"IEEE Internet Things J."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S1389128625004621?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S1389128625004621?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T19:57:09Z","timestamp":1762545429000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128625004621"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":48,"alternative-id":["S1389128625004621"],"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/j.comnet.2025.111495","relation":{},"ISSN":["1389-1286"],"issn-type":[{"type":"print","value":"1389-1286"}],"subject":[],"published":{"date-parts":[[2025,10]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"ESTK-JC: Encrypted malicious traffic detection fusing spatio-temporal features and JointCloud entity knowledge for JointCloud environment","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/j.comnet.2025.111495","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 The Authors. Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"111495"}}