{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:18:00Z","timestamp":1725520680969},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540881803"},{"type":"electronic","value":"9783540881810"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-88181-0_26","type":"book-chapter","created":{"date-parts":[[2008,10,20]],"date-time":"2008-10-20T11:31:09Z","timestamp":1224502269000},"page":"203-210","source":"Crossref","is-referenced-by-count":7,"title":["A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification"],"prefix":"10.1007","author":[{"given":"Riyad","family":"Alshammari","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"Alpaydin, E.: Introduction to Machine Learning. MIT Press, Cambridge; ISBN: 0- 262-01211-1"},{"key":"26_CR2","unstructured":"Zhang, Y., Paxson, V.: Detecting back doors. In: Proceedings of the 9th USENIX Security Symposium, pp. 157\u2013170 (2000)"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Early, J., Brodley, C., Rosenberg, C.: Behavioral authentication of server flows. In: Proceedings of the ACSAC, pp. 46\u201355 (2003)","DOI":"10.1109\/CSAC.2003.1254309"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Moore, A.W., Zuev, D.: Internet Traffic Classification Using Bayesian Analysis Techniques. In: Proceedings of the ACM SIGMETRICS, pp. 50\u201360 (2005)","DOI":"10.1145\/1064212.1064220"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Papagiannaki, K., Faloutsos, M.: BLINC: Multilevel Traffic Classification in the Dark. In: Proceedings of the ACM SIGCOMM, pp. 229\u2013240 (2006)","DOI":"10.1145\/1090191.1080119"},{"key":"26_CR6","first-page":"2745","volume":"7","author":"C.V. Wright","year":"2006","unstructured":"Wright, C.V., Monrose, F., Masson, G.M.: On Inferring Application Protocol Behaviors in Encrypted Network Traffic. Journal of Machine Learning Research\u00a07, 2745\u20132769 (2006)","journal-title":"Journal of Machine Learning Research"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Bernaille, L., Teixeira, R.: Early Recognition of Encrypted Applications. In: Passive and Active Measurement Conference (PAM), Louvain-la-neuve, Belgium (April 2007)","DOI":"10.1007\/978-3-540-71617-4_17"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Haffner, P., Sen, S., Spatscheck, O., Wang, D.: ACAS: Automated Construction of Application Signatures. In: Proceedings of the ACM SIGCOMM, pp. 197\u2013202 (2005)","DOI":"10.1145\/1080173.1080183"},{"issue":"5","key":"26_CR9","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1163593.1163596","volume":"36","author":"N. Williams","year":"2006","unstructured":"Williams, N., Zander, S., Armitage, G.: A Prelimenary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Comparison. ACM SIGCOMM Computer Communication Review\u00a036(5), 7\u201315 (2006)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Alshammari, R., Zincir-Heywood, A.N.: A flow based approach for SSH traffic detection, IEEE SMC, pp. 296\u2013301 (2007)","DOI":"10.1109\/ICSMC.2007.4414006"},{"key":"26_CR11","unstructured":"NetMate (last accessed, January 2008), http:\/\/www.ip-measurement.org\/tools\/netmate\/"},{"key":"26_CR12","unstructured":"IETF (last accessed January 2008), http:\/\/www3.ietf.org\/proceedings\/97apr\/97apr-final\/xrtftr70.htm"},{"key":"26_CR13","unstructured":"PacketShaper (last accessed, January 2008), http:\/\/www.packeteer.com\/products\/packetshaper\/"},{"key":"26_CR14","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1613\/jair.1199","volume":"19","author":"G.M. Weiss","year":"2003","unstructured":"Weiss, G.M., Provost, F.J.: Learning When Training Data are Costly: The Effect of Class Distribution on Tree Induction. Journal of Artificial Intelligence Research\u00a019, 315\u2013354 (2003)","journal-title":"Journal of Artificial Intelligence Research"},{"key":"26_CR15","unstructured":"WEKA Software (last accessed, January 2008), http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/"}],"container-title":["Advances in Soft Computing","Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS\u201908"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88181-0_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:57:02Z","timestamp":1619524622000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88181-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540881803","9783540881810"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88181-0_26","relation":{},"ISSN":["1867-5662","1860-0794"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1860-0794"}],"subject":[]}}