{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:22:01Z","timestamp":1766136121894},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642131929"},{"type":"electronic","value":"9783642131936"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13193-6_32","type":"book-chapter","created":{"date-parts":[[2010,4,27]],"date-time":"2010-04-27T07:54:59Z","timestamp":1272354899000},"page":"373-385","source":"Crossref","is-referenced-by-count":68,"title":["Realtime Classification for Encrypted Traffic"],"prefix":"10.1007","author":[{"given":"Roni","family":"Bar - Yanai","sequence":"first","affiliation":[]},{"given":"Michael","family":"Langberg","sequence":"additional","affiliation":[]},{"given":"David","family":"Peleg","sequence":"additional","affiliation":[]},{"given":"Liam","family":"Roditty","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Basher, N., Mahanti, A., Mahanti, A., Williamson, C.L., Arlitt, M.F.: A comparative analysis of web and peer-to-peer traffic. In: Proc. 17th WWW, pp. 287\u2013296 (2008)","DOI":"10.1145\/1367497.1367537"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Bernaille, L., Teixeira, R., Salamatian, K.: Early application identification. In: Proc. ACM CoNEXT, p. 6 (2006)","DOI":"10.1145\/1368436.1368445"},{"key":"32_CR3","unstructured":"BitTorrent. Tracker peer obfuscation, http:\/\/bittorrent.org\/beps\/bep_0008.html"},{"issue":"1","key":"32_CR4","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1198255.1198257","volume":"37","author":"M. Crotti","year":"2007","unstructured":"Crotti, M., Dusi, M., Gringoli, F., Salgarelli, L.: Traffic classification through simple statistical fingerprinting. Computer Commun. Review\u00a037(1), 5\u201316 (2007)","journal-title":"Computer Commun. Review"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Dewes, C., Wichmann, A., Feldmann, A.: An analysis of Internet chat systems. In: Proc. 3rd ACM SIGCOMM Internet Measurement Conf. (IMC), pp. 51\u201364 (2003)","DOI":"10.1145\/948205.948214"},{"key":"32_CR6","unstructured":"Endace. The dag tool, http:\/\/www.endace.com\/"},{"issue":"14","key":"32_CR7","doi-asserted-by":"publisher","first-page":"2476","DOI":"10.1016\/j.comnet.2009.05.003","volume":"53","author":"A. Este","year":"2009","unstructured":"Este, A., Gringoli, F., Salgarelli, L.: Support Vector Machines for TCP traffic classification. Computer Networks\u00a053(14), 2476\u20132490 (2009)","journal-title":"Computer Networks"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Gummadi, P.K., Dunn, R.J., Saroiu, S., Gribble, S.D., Levy, H.M., Zahorjan, J.: Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. In: Proc. SOSP, pp. 314\u2013329 (2003)","DOI":"10.1145\/945445.945475"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Papagiannaki, K., Faloutsos, M.: BLINC: multilevel traffic classification in the dark. In: Proc. ACM SIGCOMM, pp. 229\u2013240 (2005)","DOI":"10.1145\/1080091.1080119"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Kim, H., Claffy, K.C., Fomenkov, M., Barman, D., Faloutsos, M., Lee, K.-Y.: Internet traffic classification demystified: myths, caveats, and the best practices. In: Proc. ACM CoNEXT, p. 11 (2008)","DOI":"10.1145\/1544012.1544023"},{"key":"32_CR11","unstructured":"Madhukar, A., Williamson, C.L.: A Longitudinal Study of P2P Traffic Classification. In: Proc. IEEE MASCOTS, pp. 179\u2013188 (2006)"},{"key":"32_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/978-3-540-24668-8_21","volume-title":"Passive and Active Network Measurement","author":"A. McGregor","year":"2004","unstructured":"McGregor, A., Hall, M., Lorier, P., Brunskill, J.: Flow Clustering Using Machine Learning Techniques. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol.\u00a03015, pp. 205\u2013214. Springer, Heidelberg (2004)"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Moore, A.W., Zuev, D.: Internet traffic classification using bayesian analysis techniques. In: Proc. ACM SIGMETRICS, pp. 50\u201360 (2005)","DOI":"10.1145\/1064212.1064220"},{"key":"32_CR14","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"T.T. Nguyen","year":"2008","unstructured":"Nguyen, T.T., Armitage, G.J.: A survey of techniques for internet traffic classification using machine learning. IEEE Comm. Surv. & Tutor.\u00a010, 56\u201376 (2008)","journal-title":"IEEE Comm. Surv. & Tutor."},{"issue":"4","key":"32_CR15","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/90.330413","volume":"2","author":"V. Paxson","year":"1994","unstructured":"Paxson, V.: Empirically derived analytic models of wide-area TCP connections. IEEE\/ACM Trans. Networking\u00a02(4), 316\u2013336 (1994)","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"32_CR16","doi-asserted-by":"crossref","unstructured":"Roughan, M., Sen, S., Spatscheck, O., Duffield, N.G.: Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification. In: Proc. 4th ACM SIGCOMM Internet Measurement Conf. (IMC), pp. 135\u2013148 (2004)","DOI":"10.1145\/1028788.1028805"},{"key":"32_CR17","doi-asserted-by":"crossref","unstructured":"Sen, S., Spatscheck, O., Wang, D.: Accurate, scalable in-network identification of p2p traffic using application signatures. In: Proc. 13th WWW, pp. 512\u2013521 (2004)","DOI":"10.1145\/988672.988742"},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Zander, S., Nguyen, T.T., Armitage, G.J.: Automated Traffic Classification and Application Identification using Machine Learning. In: Proc. 30th IEEE LCN, pp. 250\u2013257 (2005)","DOI":"10.1109\/LCN.2005.35"},{"key":"32_CR19","volume-title":"Pattern Classification","author":"R.O. Duda","year":"2001","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. Wiley, Chichester (2001)"},{"key":"32_CR20","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.1162\/153244303322753616","volume":"3","author":"I. Guyon","year":"2003","unstructured":"Guyon, I., Elisseeff, A.: An Introduction to Variable and Feature Selection. J. Machine Learning Research\u00a03, 1157\u20131182 (2003)","journal-title":"J. Machine Learning Research"}],"container-title":["Lecture Notes in Computer Science","Experimental Algorithms"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13193-6_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T22:02:37Z","timestamp":1606168957000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13193-6_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642131929","9783642131936"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13193-6_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}