{"created":"2025-02-05T06:05:58.769477+00:00","id":2000256,"links":{},"metadata":{"_buckets":{"deposit":"b7cbac77-08ce-43f7-b4ce-be8957d651e2"},"_deposit":{"created_by":7,"id":"2000256","owner":"7","owners":[7],"pid":{"revision_id":0,"type":"depid","value":"2000256"},"status":"published"},"_oai":{"id":"oai:kitakyushu.repo.nii.ac.jp:02000256","sets":["6:1738724499022"]},"author_link":[],"item_1697693263333":{"attribute_name":"bibliographic_information","attribute_value_mlt":[{"bibliographicIssueNumber":"50","bibliographic_titles":[{"bibliographic_title":"北九州工業高等専門学校研究報告第50号","bibliographic_titleLang":"ja"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2025-02-05"}],"filename":"6_E_(磯崎)p39-44.pdf","filesize":[{"value":"1.3 MB"}],"format":"application/pdf","url":{"url":"https://kitakyushu.repo.nii.ac.jp/record/2000256/files/6_E_(磯崎)p39-44.pdf"},"version_id":"605f20f9-b03b-4012-810d-691aed3d4bdf"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_researcher":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"磯﨑 裕臣","creatorNameLang":"ja"}]},{"creatorNames":[{"creatorName":"小川 千恵","creatorNameLang":"ja"}]},{"creatorNames":[{"creatorName":"塩月 宏次朗","creatorNameLang":"ja"}]},{"creatorNames":[{"creatorName":"山本 神瑛","creatorNameLang":"ja"}]},{"creatorNames":[{"creatorName":"狩野 悠貴","creatorNameLang":"ja"}]},{"creatorNames":[{"creatorName":"和田 成紀","creatorNameLang":"ja"}]}]},"item_title":"トラヒックの特徴を用いたアプリケーションの識別手法の検討","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"トラヒックの特徴を用いたアプリケーションの識別手法の検討","subitem_title_language":"ja"},{"subitem_title":"Identication method of application based on characteristics of traffic","subitem_title_language":"en"}]},"item_type_id":"10007","owner":"7","path":["1738724499022"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2017-01-31"},"publish_date":"2017-01-31","publish_status":"0","recid":"2000256","relation_version_is_last":true,"title":["トラヒックの特徴を用いたアプリケーションの識別手法の検討"],"weko_creator_id":"7","weko_shared_id":-1},"updated":"2025-02-06T07:25:26.929635+00:00"}