{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T15:56:35Z","timestamp":1761580595457},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540792314"},{"type":"electronic","value":"9783540792321"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-79232-1_8","type":"book-chapter","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T11:32:33Z","timestamp":1209382353000},"page":"72-81","source":"Crossref","is-referenced-by-count":47,"title":["On the Validation of Traffic Classification Algorithms"],"prefix":"10.1007","author":[{"given":"G\u00e9za","family":"Szab\u00f3","sequence":"first","affiliation":[]},{"given":"D\u00e1niel","family":"Orincsay","sequence":"additional","affiliation":[]},{"given":"Szabolcs","family":"Malomsoky","sequence":"additional","affiliation":[]},{"given":"Istv\u00e1n","family":"Szab\u00f3","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"IANA.TCP and UDP port\u00a0numbers, http:\/\/www.iana.org\/assignments\/port-numbers"},{"key":"8_CR2","unstructured":"MSN Messenger, http:\/\/join.msn.com\/messenger\/overview2000"},{"key":"8_CR3","unstructured":"RFC 2113, http:\/\/www.networksorcery.com\/enp\/rfc\/rfc2113.txt"},{"key":"8_CR4","unstructured":"RFC 2246, http:\/\/www.ietf.org\/rfc\/rfc2246.txt"},{"key":"8_CR5","unstructured":"RFC 4251, http:\/\/www.ietf.org\/rfc\/rfc4251.txt"},{"key":"8_CR6","unstructured":"Skype, http:\/\/www.skype.com"},{"key":"8_CR7","unstructured":"The measurement created for this article, http:\/\/pics.etl.hu\/~szabog\/measurement.tar"},{"key":"8_CR8","unstructured":"uTorrent, http:\/\/www.utorrent.com"},{"key":"8_CR9","unstructured":"World of Warcraft, http:\/\/www.worldofwarcraft.com\/index.xml"},{"key":"8_CR10","first-page":"23","volume-title":"Traffic classification on the fly","author":"L. Bernaille","year":"2006","unstructured":"Bernaille, L., Teixeira, R., Akodkenou, I., Soule, A., Salamatian, K.: Traffic classification on the fly, vol.\u00a036, pp. 23\u201326. ACM Press, New York, USA (2006)"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Erman, J., Arlitt, M., Mahanti, A.: Traffic classification using clustering algorithms. In: Proc. MineNet 2006, New York, USA (2006)","DOI":"10.1145\/1162678.1162679"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Papagiannaki, K., Faloutsos, M.: BLINC: Multilevel Traffic Classification in the Dark. In: Proc. ACM SIGCOMM, Philadelphia, Pennsylvania, USA (August 2005)","DOI":"10.1145\/1080091.1080119"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"McGregor, A., Hall, M., Lorier, P., Brunskill, A.: Flow Clustering Using Machine Learning Techniques. In: Proc. PAM, Antibes Juan-les-Pins, France (April 2004)","DOI":"10.1007\/978-3-540-24668-8_21"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Moore, A.W., Zuev, D.: Internet Traffic Classification Using Bayesian Analysis Techniques. In: Proc. SIGMETRICS, Banff, Alberta, Canada (June 2005)","DOI":"10.1145\/1064212.1064220"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Perenyi, M., Molnar, S.: Enhanced skype traffic identification. In: Proc. Valuetools 2007 (2007)","DOI":"10.4108\/valuetools.2007.1782"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Sen, S., Wang, J.: Analyzing peer-to-peer traffic across large networks. In: Proc. Second Annual ACM Internet Measurement Workshop (November 2002)","DOI":"10.1145\/637201.637222"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Szab\u00f3, G., Szab\u00f3, I., Orincsay, D.: Accurate traffic classification. In: Proc. IEEE WOWMoM, Helsinki, Finnland (June 2007)","DOI":"10.1109\/WOWMOM.2007.4351725"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Xu, K., Zhang, Z., Bhattacharyya, S.: Profiling Internet Backbone Traffic: Behavior Models and Applications. In: Proc. ACM SIGCOMM, Philadelphia, Pennsylvania, USA (August 2005)","DOI":"10.1145\/1080091.1080112"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Zander, S., Nguyen, T., Armitage, G.: Automated Traffic Classification and Application Identification Using Machine Learning. In: Proc. IEEE LCN, Sydney, Australia (November 2005)","DOI":"10.1109\/LCN.2005.35"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Network Measurement"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-79232-1_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:14:42Z","timestamp":1619522082000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-79232-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540792314","9783540792321"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-79232-1_8","relation":{},"subject":[]}}