{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:38:02Z","timestamp":1742938682889,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319017778"},{"type":"electronic","value":"9783319017785"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-01778-5_39","type":"book-chapter","created":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T12:07:08Z","timestamp":1375099628000},"page":"379-390","source":"Crossref","is-referenced-by-count":7,"title":["Selection of On-line Features for Peer-to-Peer Network Traffic Classification"],"prefix":"10.1007","author":[{"given":"Haitham A.","family":"Jamil","sequence":"first","affiliation":[]},{"given":"Aliyu","family":"Mohammed","sequence":"additional","affiliation":[]},{"given":"A.","family":"Hamza","sequence":"additional","affiliation":[]},{"given":"Sulaiman M.","family":"Nor","sequence":"additional","affiliation":[]},{"given":"Muhammad Nadzir","family":"Marsono","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"39_CR1","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1109\/TNN.2006.883010","volume":"18","author":"T. Auld","year":"2007","unstructured":"Auld, T., Moore, A.W., Gull, S.F.: Bayesian neural networks for internet traffic classification. IEEE Transactions on Neural Networks\u00a018(1), 223\u2013239 (2007)","journal-title":"IEEE Transactions on Neural Networks"},{"issue":"2","key":"39_CR2","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/1129582.1129589","volume":"36","author":"L. Bernaille","year":"2006","unstructured":"Bernaille, L., et al.: Traffic classification on the fly. ACM SIGCOMM Computer Communication Review\u00a036(2), 23\u201326 (2006)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"1","key":"39_CR3","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/S0004-3702(03)00079-1","volume":"151","author":"M. Dash","year":"2003","unstructured":"Dash, M., Liu, H.: Consistency-based search in feature selection. Artificial Intelligence\u00a0151(1), 155\u2013176 (2003)","journal-title":"Artificial Intelligence"},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"Erman, J., et al.: Semi-supervised network traffic classification. In: ACM SIGMETRICS Performance Evaluation Review. ACM (2007)","DOI":"10.1145\/1254882.1254934"},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Gomes, J.V.P., et al.: The Nature of Peer-to-Peer Traffic. In: Handbook of Peer-to-Peer Networking 2010, pp. 1231\u20131252. Springer (2010)","DOI":"10.1007\/978-0-387-09751-0_44"},{"key":"39_CR6","unstructured":"Gomes, J.V.P., et al.: Detection and Classification of Peer-to-Peer Traffic: A Survey (accessed April 2011)"},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"Jamil, H.A., Zarei, R., Fadlelssied, N.O., Aliyu, M., Nor, S.M., Marsono, M.N.: Analysis of Features Selection for P2P Traffic Detection Using Support Vector Machine. In: ICoICT, March 20-22, IEEE (2013)","DOI":"10.1109\/ICoICT.2013.6574558"},{"issue":"3","key":"39_CR8","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/S0165-0114(03)00021-6","volume":"141","author":"R. Jensen","year":"2004","unstructured":"Jensen, R., Shen, Q.: Fuzzyrough attribute reduction with application to web categorization. Fuzzy Sets and Systems\u00a0141(3), 469\u2013485 (2004)","journal-title":"Fuzzy Sets and Systems"},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"Jun, L., et al.: P2P traffic identification technique. In: 2007 International Conference on Computational Intelligence and Security. IEEE (2007)","DOI":"10.1109\/CIS.2007.81"},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Lei, D., Xiaochun, Y., Jun, X.: Optimizing traffic classification using hybrid feature selection. In: The Ninth International Conference on Web-Age Information Management Web-Age Information Management, WAIM 2008. IEEE (2008)","DOI":"10.1109\/WAIM.2008.30"},{"key":"39_CR11","unstructured":"Liu, H., Setiono, R.: Chi2: Feature selection and discretization of numeric attributes. In: Proceedings of the Seventh International Conference on Tools with Artificial Intelligence. IEEE (1995)"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Moore, A.W., Zuev, D.: Internet traffic classification using bayesian analysis techniques. ACM (2005)","DOI":"10.1145\/1064212.1064220"},{"key":"39_CR13","unstructured":"Moore, A.W., Zuev, D., Crogan, M.: Discriminators for use in flow-based classification, Technical report, Intel Research, Cambridge (2005)"},{"issue":"12","key":"39_CR14","doi-asserted-by":"publisher","first-page":"2011","DOI":"10.1016\/S0031-3203(99)00005-9","volume":"32","author":"M.R. Rezaee","year":"1999","unstructured":"Rezaee, M.R., et al.: Fuzzy feature selection. Pattern Recognition\u00a032(12), 2011\u20132019 (1999)","journal-title":"Pattern Recognition"},{"key":"39_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-540-79232-1_8","volume-title":"Passive and Active Network Measurement","author":"G. Szab\u00f3","year":"2008","unstructured":"Szab\u00f3, G., Orincsay, D., Malomsoky, S., Szab\u00f3, I.: On the validation of traffic classification algorithms. In: Claypool, M., Uhlig, S. (eds.) PAM 2008. LNCS, vol.\u00a04979, pp. 72\u201381. Springer, Heidelberg (2008)"},{"issue":"1","key":"39_CR16","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1023\/B:MACH.0000035476.95130.99","volume":"57","author":"P. Van Der Putten","year":"2004","unstructured":"Van Der Putten, P., Van Someren, M.: A bias-variance analysis of a real world learning problem: The CoIL challenge 2000. Machine Learning\u00a057(1), 177\u2013195 (2004)","journal-title":"Machine Learning"},{"key":"39_CR17","unstructured":"Witten, I.H., Frank, E.: Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann (2005)"},{"key":"39_CR18","doi-asserted-by":"crossref","unstructured":"Yang, Y., et al.: Solving P2P traffic identification problems Via optimized support vector machines. In: IEEE\/ACS International Conference on Computer Systems and Applications, 2007. AICCSA 2007. IEEE (2007)","DOI":"10.1109\/AICCSA.2007.370879"},{"key":"39_CR19","series-title":"AISC","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-642-32063-7_40","volume-title":"Intelligent Informatics","author":"R. Zarei","year":"2013","unstructured":"Zarei, R., Monemi, A., Marsono, M.N.: Retraining Mechanism for On-Line Peer-to-Peer Traffic Classification. In: Abraham, A., Thampi, S.M. (eds.) Intelligent Informatics. AISC, vol.\u00a0182, pp. 373\u2013382. Springer, Heidelberg (2013)"},{"issue":"12","key":"39_CR20","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1016\/j.comcom.2012.04.012","volume":"35","author":"H.L. Zhang","year":"2012","unstructured":"Zhang, H.L., et al.: Feature selection for optimizing traffic classification. Computer Communications\u00a035(12), 1457\u20131471 (2012)","journal-title":"Computer Communications"},{"issue":"suppl.","key":"39_CR21","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/S1005-8885(08)60158-2","volume":"15","author":"J.-J. Zhao","year":"2008","unstructured":"Zhao, J.-J., et al.: Real-time feature selection in traffic classification. The Journal of China Universities of Posts and Telecommunications\u00a015(suppl.), 68\u201372 (2008)","journal-title":"The Journal of China Universities of Posts and Telecommunications"},{"key":"39_CR22","doi-asserted-by":"publisher","first-page":"1338","DOI":"10.1016\/j.phpro.2012.05.220","volume":"33","author":"L. Zhen","year":"2012","unstructured":"Zhen, L., Qiong, L.: A new feature selection method for internet traffic classification using ml. Physics Procedia\u00a033, 1338\u20131345 (2012)","journal-title":"Physics Procedia"},{"key":"39_CR23","unstructured":"Cambridge data sets, \n                    http:\/\/www.cl.cam.ac.uk\/research\/srg\/netos\/nprobe\/data\/papers\/sigmetrics\/index.html\n                   (cited November 18, 2012)"},{"key":"39_CR24","unstructured":"Universit\u00e9 Brescia data sets, \n                    http:\/\/www.ing.unibs.it\/ntw\/tools\/traces\/download\/\n                   (cited November 19, 2012)"},{"key":"39_CR25","unstructured":"WEKA. Data Mining Software in Java (2012), \n                    http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/"}],"container-title":["Advances in Intelligent Systems and Computing","Recent Advances in Intelligent Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-01778-5_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T00:38:35Z","timestamp":1676335115000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-01778-5_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319017778","9783319017785"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-01778-5_39","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}