{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:11:59Z","timestamp":1725538319588},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642040900"},{"type":"electronic","value":"9783642040917"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04091-7_12","type":"book-chapter","created":{"date-parts":[[2009,9,26]],"date-time":"2009-09-26T05:52:07Z","timestamp":1253944327000},"page":"93-100","source":"Crossref","is-referenced-by-count":5,"title":["An Investigation of Multi-objective Genetic Algorithms for Encrypted Traffic Identification"],"prefix":"10.1007","author":[{"given":"Carlos","family":"Bacquet","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]},{"given":"Malcolm I.","family":"Heywood","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Alshammari, R., Zincir-Heywood, N.: Generalization of Signatures for SSH Traffic Identification. In: IEEE Symposium Series on Computational Intelligence (2009)","DOI":"10.1109\/CICYBS.2009.4925105"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Alshammari, R., Zincir-Heywood, N.: Investigating two different approaches for encrypted traffic classification. In: Sixth Annual Conference on Privacy, Security and Trust, pp. 156\u2013166 (2008)","DOI":"10.1109\/PST.2008.15"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Alshammari, R., Zincir-Heywood, N.: A flow based approach for SSH traffic detection. ISIC. In: IEEE International Conference on Systems, Man and Cybernetics, pp. 296\u2013301 (2007)","DOI":"10.1109\/ICSMC.2007.4414006"},{"issue":"2","key":"12_CR4","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/1129582.1129589","volume":"36","author":"L. Bernaille","year":"2006","unstructured":"Bernaille, L., Teixeira, R., Akodkenou, I., Soule, A., Salamatian, K.: Traffic classification on the fly. SIGCOMM Comput. Commun. Rev.\u00a036(2), 23\u201326 (2006)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1145\/1162678.1162679","volume-title":"SIGCOMM Workshop on Mining Network Data","author":"J. Erman","year":"2006","unstructured":"Erman, J., Arlitt, M., Mahanti, A.: Traffic classification using clustering algorithms. In: SIGCOMM Workshop on Mining Network Data, pp. 281\u2013286. ACM, New York (2006)"},{"key":"12_CR6","first-page":"365","volume-title":"Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"K. YeongSeog","year":"2000","unstructured":"YeongSeog, K., Street, W.N., Menczer, F.: Feature selection in unsupervised learning via evolutionary search. In: Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 365\u2013369. ACM, New York (2000)"},{"issue":"3","key":"12_CR7","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1162\/106365602760234117","volume":"10","author":"R. Kumar","year":"2002","unstructured":"Kumar, R., Rockett, P.: Improved sampling of the pareto-front in multiobjective genetic optimizations by steady-state evolution: A pareto converging genetic algorithm. Evol. Comput.\u00a010(3), 283\u2013314 (2002)","journal-title":"Evol. Comput."},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Siqueira Junior, G.P., Bessa Maia, J.E., Holanda, R., Neuman de Sousa, J.: P2P traffic identification using cluster analysis. In: First International Global Information Infrastructure Symposium (GIIS), pp. 128\u2013133 (2007)","DOI":"10.1109\/GIIS.2007.4404178"},{"key":"12_CR9","first-page":"2745","volume":"7","author":"C. Wright","year":"2006","unstructured":"Wright, C., Monrose, F., Masson, G.: On inferring application protocol behaviors in encrypted network traffic. J. Mach. Learn. Res.\u00a07, 2745\u20132769 (2006)","journal-title":"J. Mach. Learn. Res."},{"key":"12_CR10","first-page":"360","volume-title":"Second International Multi-Symposiums on Computer and Computational Sciences (IMSCCS)","author":"L. Yingqiu","year":"2007","unstructured":"Yingqiu, L., Wei, L., Yun-Chun, L.: Network traffic classification using K-means clustering. In: Second International Multi-Symposiums on Computer and Computational Sciences (IMSCCS), pp. 360\u2013365. IEEE Computer Society, Washington (2007)"},{"key":"12_CR11","unstructured":"NetMate, http:\/\/www.ip-measurement.org\/tools\/netmate\/"},{"key":"12_CR12","unstructured":"WEKA Software, http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/"},{"key":"12_CR13","unstructured":"IETF, http:\/\/www3.ietf.org\/proceedings\/97apr\/97apr-final\/xrtftr70.htm"},{"key":"12_CR14","unstructured":"PacketShaper, http:\/\/www.packeteer.com\/products\/packetshaper"}],"container-title":["Advances in Intelligent and Soft Computing","Computational Intelligence in Security for Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04091-7_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:39:00Z","timestamp":1606185540000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04091-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642040900","9783642040917"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04091-7_12","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2009]]}}}