Identifying Known and Unknown Peer-to-Peer Traffic | IEEE Conference Publication | IEEE Xplore