{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:32:23Z","timestamp":1742974343317,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540859833"},{"type":"electronic","value":"9783540859840"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-85984-0_54","type":"book-chapter","created":{"date-parts":[[2008,9,7]],"date-time":"2008-09-07T17:00:48Z","timestamp":1220806848000},"page":"449-458","source":"Crossref","is-referenced-by-count":8,"title":["Improve Flow Accuracy and Byte Accuracy in Network Traffic Classification"],"prefix":"10.1007","author":[{"given":"Haitao","family":"He","sequence":"first","affiliation":[]},{"given":"Chunhui","family":"Che","sequence":"additional","affiliation":[]},{"given":"Feiteng","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Xiaonan","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Jianmin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"54_CR1","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1145\/988672.988742","volume-title":"Proceedings of the 13th international conference on World Wide Web","author":"S. Sen","year":"2004","unstructured":"Sen, S., Spatscheck, O., Wang, D.: Accurate, Scalable In-network Identification of p2p Traffic Using Application Signatures. In: Proceedings of the 13th international conference on World Wide Web, pp. 512\u2013521. ACM, New York (2004)"},{"key":"54_CR2","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1145\/1080173.1080183","volume-title":"Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data","author":"P. Haffner","year":"2005","unstructured":"Haffner, P., Sen, S., Spatscheck, O., Wang, D.: ACAS: Automated Construction of Application Signatures. In: Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data, pp. 197\u2013202. ACM, New York (2005)"},{"key":"54_CR3","unstructured":"Cache Logic, \n                    \n                      http:\/\/www.cachelogic.com"},{"key":"54_CR4","doi-asserted-by":"crossref","unstructured":"Erman, J., Mahanti, A., Arlitt, M., Williamson, C.: Identifying and Discriminating Between Web and Peer to Peer Traffic in the Network Core. In: WWW 2007, Banff, Alberta, Canada (2007)","DOI":"10.1145\/1242572.1242692"},{"key":"54_CR5","doi-asserted-by":"crossref","unstructured":"Erman, J., Mahantix, A., Arlittz, M.: Byte Me: A Case for Byte Accuracy in Traffic Classification. In: MineNet 2007, San Diego, California, USA (2007)","DOI":"10.1145\/1269880.1269890"},{"key":"54_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45014-9_1","volume-title":"Multiple Classifier Systems","author":"T.G. Dietterich","year":"2000","unstructured":"Dietterich, T.G.: Ensemble Methods in Machine Learning. In: Kittler, J., Roli, F. (eds.) MCS 2000. LNCS, vol.\u00a01857, pp. 1\u201315. Springer, Heidelberg (2000)"},{"key":"54_CR7","first-page":"123","volume":"24","author":"L. Breiman","year":"1996","unstructured":"Breiman, L.: Bagging Predictors. Machine Learning\u00a024, 123\u2013140 (1996)","journal-title":"Machine Learning"},{"key":"54_CR8","first-page":"239","volume-title":"Proceeding of 17th International Conference on Machine Learning","author":"C. Drummond","year":"2000","unstructured":"Drummond, C., Holte, R.C.: Exploiting the Cost (In)sensitivity of Decision Tree Splitting Criteria. In: Proceeding of 17th International Conference on Machine Learning, pp. 239\u2013246. Morgan Kaufmann, San Francisco (2000)"},{"key":"54_CR9","first-page":"97","volume-title":"Proceedings of 16th International Conference on Machine Learning","author":"W. Fan","year":"1999","unstructured":"Fan, W., Stolfo, S.J., Zhang, J., Chan, P.K.: AdaCost: Misclassification Cost-sensitive Boosting. In: Proceedings of 16th International Conference on Machine Learning, pp. 97\u2013105. Morgan Kaufmann, San Francisco (1999)"},{"key":"54_CR10","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/3-540-36755-1_23","volume-title":"Machine Learning: ECML 2002","author":"D.D. Margineantu","year":"2002","unstructured":"Margineantu, D.D.: Class Probability Estimation and Cost-Sensitive Classification Decisions. In: Elomaa, T., Mannila, H., Toivonen, H. (eds.) ECML 2002. LNCS (LNAI), vol.\u00a02430, pp. 270\u2013281. Springer, Heidelberg (2002)"},{"key":"54_CR11","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1145\/502512.502540","volume-title":"Proceedings of the seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"B. Zadrozny","year":"2001","unstructured":"Zadrozny, B., Elkan, C.: Learning and Making Decisions When Costs and Probabilities are Both Unknown. In: Proceedings of the seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 204\u2013213. ACM, New York (2001)"},{"key":"54_CR12","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1145\/312129.312220","volume-title":"Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining","author":"P. Domingos","year":"1999","unstructured":"Domingos, P.: MetaCost: A General Method for Making Classifiers Cost-sensitive. In: Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 155\u2013164. ACM, New York (1999)"},{"key":"54_CR13","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/j.comnet.2004.11.012","volume":"48","author":"V.J. Ribeiro","year":"2005","unstructured":"Ribeiro, V.J., Zhang, Z.L., Moon, S., Diot, C.: Small-time Scaling Behavior of Internet Backbone Traffic. Computer Networks: The International Journal of Computer and Telecommunications Networking\u00a048, 315\u2013334 (2005)","journal-title":"Computer Networks: The International Journal of Computer and Telecommunications Networking"},{"key":"54_CR14","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.comnet.2005.02.008","volume":"50","author":"K.C. Lan","year":"2006","unstructured":"Lan, K.C., Heidemann, J.: A Measurement Study of Correlations of Internet Flow Characteristics. Computer Networks: The International Journal of Computer and Telecommunications Networking\u00a050, 46\u201362 (2006)","journal-title":"Computer Networks: The International Journal of Computer and Telecommunications Networking"},{"key":"54_CR15","volume-title":"C4.5: Programs for Machine Learning. The Morgan Kaufmann Series in Machine Learning","author":"J.R. Quinlan","year":"1993","unstructured":"Quinlan, J.R.: C4.5: Programs for Machine Learning. The Morgan Kaufmann Series in Machine Learning. Morgan Kaufmann, San Mateo (1993)"},{"key":"54_CR16","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1162\/neco.1997.9.7.1545","volume":"9","author":"Y. Amit","year":"1997","unstructured":"Amit, Y., Geman, D.: Shape Quantization and Recognition with Randomized Trees. Neural Computation\u00a09, 1545\u20131588 (1997)","journal-title":"Neural Computation"},{"key":"54_CR17","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/S0004-3702(02)00190-X","volume":"137","author":"Z.H. Zhou","year":"2002","unstructured":"Zhou, Z.H., Wu, J., Tang, W.: Ensembling Neural Networks: Many Could Be Better Than All. Artificial Intelligence\u00a0137, 239\u2013263 (2002)","journal-title":"Artificial Intelligence"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85984-0_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,30]],"date-time":"2020-01-30T05:41:47Z","timestamp":1580362907000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85984-0_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540859833","9783540859840"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85984-0_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}