{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:13:36Z","timestamp":1763468016234,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642203046"},{"type":"electronic","value":"9783642203053"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20305-3_11","type":"book-chapter","created":{"date-parts":[[2011,4,5]],"date-time":"2011-04-05T02:55:14Z","timestamp":1301972114000},"page":"122-135","source":"Crossref","is-referenced-by-count":51,"title":["Early Classification of Network Traffic through Multi-classification"],"prefix":"10.1007","author":[{"given":"Alberto","family":"Dainotti","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Pescap\u00e9","sequence":"additional","affiliation":[]},{"given":"Carlo","family":"Sansone","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"L7-filter, Application Layer Packet Classifier for Linux, \n                    \n                      http:\/\/l7-filter.sourceforge.net","key":"11_CR1"},{"doi-asserted-by":"crossref","unstructured":"Aceto, G., Dainotti, A., de Donato, W., Pescap\u00e9, A.: PortLoad: taking the best of two worlds in traffic classification. In: IEEE INFOCOM 2010 - WiP Track (March 2010)","key":"11_CR2","DOI":"10.1109\/INFCOMW.2010.5466645"},{"key":"11_CR3","first-page":"289","volume-title":"CISDA 2009: Proceedings of the Second IEEE International Conference on Computational Intelligence for Security and Defense Applications","author":"R. Alshammari","year":"2009","unstructured":"Alshammari, R., Zincir-Heywood, A.N.: Machine learning based encrypted traffic classification: identifying ssh and skype. In: CISDA 2009: Proceedings of the Second IEEE International Conference on Computational Intelligence for Security and Defense Applications, pp. 289\u2013296. IEEE Press, Piscataway (2009)"},{"issue":"1","key":"11_CR4","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1109\/TNN.2006.883010","volume":"18","author":"T. Auld","year":"2007","unstructured":"Auld, T., Moore, A.W., Gull, S.F.: Bayesian neural networks for internet traffic classification. IEEE Transactions on Neural Networks\u00a018(1), 223\u2013239 (2007)","journal-title":"IEEE Transactions on Neural Networks"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-540-71617-4_17","volume-title":"Passive and Active Network Measurement","author":"L. Bernaille","year":"2007","unstructured":"Bernaille, L., Teixeira, R.: Early recognition of encrypted applications. In: Uhlig, S., Papagiannaki, K., Bonaventure, O. (eds.) PAM 2007. LNCS, vol.\u00a04427, pp. 165\u2013175. Springer, Heidelberg (2007)"},{"issue":"2","key":"11_CR6","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/1129582.1129589","volume":"36","author":"L. Bernaille","year":"2006","unstructured":"Bernaille, L., Teixeira, R., Akodjenou, I., Soule, A., Salamatian, K.: Traffic classification on the fly. ACM SIGCOMM CCR\u00a036(2), 23\u201326 (2006)","journal-title":"ACM SIGCOMM CCR"},{"doi-asserted-by":"crossref","unstructured":"Bernaille, L., Teixeira, R., Salamatian, K.: Early Application Identification. In: ACM CoNEXT (December 2006)","key":"11_CR7","DOI":"10.1145\/1368436.1368445"},{"issue":"1","key":"11_CR8","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/3468.477860","volume":"26","author":"I. Bloch","year":"1996","unstructured":"Bloch, I.: Information combination operators for data fusion: a comparative review. IEEE Trans. System Man and Cybernetics, Part A\u00a026(1), 52\u201376 (1996)","journal-title":"IEEE Trans. System Man and Cybernetics, Part A"},{"issue":"4","key":"11_CR9","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1016\/j.jnca.2010.02.002","volume":"33","author":"A. Callado","year":"2010","unstructured":"Callado, A., Kelner, J., Sadok, D., Kamienski, C.A., Fernandes, S.: Better network traffic identification through the independent combination of techniques. Journal of Network and Computer Applications\u00a033(4), 433\u2013446 (2010)","journal-title":"Journal of Network and Computer Applications"},{"doi-asserted-by":"crossref","unstructured":"Callado, A., Szab\u00f3, C.K.G., Gero, B.P., Kelner, J., Fernandes, S., Sadok, D.: A Survey on Internet Traffic Identification. IEEE Communications Surveys & Tutorials\u00a011(3) (July 2009)","key":"11_CR10","DOI":"10.1109\/SURV.2009.090304"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-642-12365-8_11","volume-title":"Traffic Monitoring and Analysis","author":"V. Carela-Espa\u00f1ol","year":"2010","unstructured":"Carela-Espa\u00f1ol, V., Barlet-Ros, P., Sol\u00e9-Sim\u00f3, M., Dainotti, A., de Donato, W., Pescap\u00e9, A.: K-dimensional trees for continuous traffic classification. In: Ricciato, F., Mellia, M., Biersack, E. (eds.) TMA 2010. LNCS, vol.\u00a06003, pp. 141\u2013154. Springer, Heidelberg (2010)"},{"issue":"4","key":"11_CR12","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.inffus.2009.03.001","volume":"10","author":"I. Corona","year":"2009","unstructured":"Corona, I., Giacinto, G., Mazzariello, C., Roli, F., Sansone, C.: Information fusion for computer security: State of the art and open issues. Information Fusion\u00a010(4), 274\u2013284 (2009)","journal-title":"Information Fusion"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-642-01645-5_8","volume-title":"Traffic Monitoring and Analysis","author":"A. Dainotti","year":"2009","unstructured":"Dainotti, A., de Donato, W., Pescap\u00e9, A.: Tie: A community-oriented traffic classification platform. In: Papadopouli, M., Owezarski, P., Pras, A. (eds.) TMA 2009. LNCS, vol.\u00a05537, pp. 64\u201374. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Dainotti, A., de Donato, W., Pescap\u00e8, A., Ventre, G.: Tie: A community-oriented traffic classification platform. In: Technical Report TR-DIS-102008-TIE, Dipartimento di Informatica e Sistemistica, Universit\u00e1 degli Studi di Napoli Federico II (October 2008)","key":"11_CR14","DOI":"10.1007\/978-3-642-01645-5_8"},{"key":"11_CR15","first-page":"38","volume-title":"CAMAD","author":"A. Dainotti","year":"2006","unstructured":"Dainotti, A., Pescap\u00e8, A., Ventre, G.: A packet-level characterization of network traffic. In: CAMAD, pp. 38\u201345. IEEE, Los Alamitos (2006)"},{"key":"11_CR16","first-page":"60","volume-title":"LANC 2009: Proceedings of the 5th International Latin American Networking Conference","author":"G. G\u00f3mez Sena","year":"2009","unstructured":"G\u00f3mez Sena, G., Belzarena, P.: Early traffic classification using support vector machines. In: LANC 2009: Proceedings of the 5th International Latin American Networking Conference, pp. 60\u201366. ACM, New York (2009)"},{"key":"11_CR17","first-page":"272","volume-title":"Rule-Based Expert Systems","author":"J. Gordon","year":"1984","unstructured":"Gordon, J., Shortliffe, E.: The dempster-shafer theory of evidence. In: Buchanan, B.G., Shortliffe, E. (eds.) Rule-Based Expert Systems, pp. 272\u2013292. Addison-Wesley, Reading (1984)"},{"key":"11_CR18","first-page":"458","volume-title":"AIC 2008: Proceedings of the 8th Conference on Applied Informatics and Communications","author":"H. He","year":"2008","unstructured":"He, H., Che, C., Ma, F., Zhang, J., Luo, X.: Traffic classification using en-semble learning and co-training. In: AIC 2008: Proceedings of the 8th Conference on Applied Informatics and Communications, pp. 458\u2013463. World Scientific and Engineering Academy and Society (WSEAS), Stevens Point (2008)"},{"issue":"1","key":"11_CR19","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/34.368145","volume":"17","author":"Y.S. Huang","year":"1995","unstructured":"Huang, Y.S., Suen, C.Y.: A method of combining multiple experts for the recognition of unconstrained handwritten numerals. IEEE Trans. Pattern Analysis and Machine Intelligence\u00a017(1), 90\u201394 (1995)","journal-title":"IEEE Trans. Pattern Analysis and Machine Intelligence"},{"key":"11_CR20","first-page":"1","volume-title":"CoNEXT 2008: Proceedings of the 2008 ACM CoNEXT Conference","author":"H. Kim","year":"2008","unstructured":"Kim, H., Claffy, K., Fomenkov, M., Barman, D., Faloutsos, M., Lee, K.: Internet traffic classification demystified: myths, caveats, and the best practices. In: CoNEXT 2008: Proceedings of the 2008 ACM CoNEXT Conference, pp. 1\u201312. ACM, New York (2008)"},{"issue":"2","key":"11_CR21","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/34.667881","volume":"20","author":"J. Kittler","year":"1998","unstructured":"Kittler, J., Hatef, M., Duin, R.P.W., Matas, J.: On combining classifiers. IEEE Trans. Pattern Analysis and Machine Intelligence\u00a020(2), 226\u2013239 (1998)","journal-title":"IEEE Trans. Pattern Analysis and Machine Intelligence"},{"key":"11_CR22","doi-asserted-by":"publisher","DOI":"10.1002\/0471660264","volume-title":"Combining Pattern Classifiers: Methods and Algorithms","author":"L.I. Kuncheva","year":"2004","unstructured":"Kuncheva, L.I.: Combining Pattern Classifiers: Methods and Algorithms. Wiley-Interscience, Hoboken (2004)"},{"issue":"2","key":"11_CR23","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/S0031-3203(99)00223-X","volume":"34","author":"L.I. Kuncheva","year":"2001","unstructured":"Kuncheva, L.I., Bezdek, J.C., Duin, R.P.W.: Decision templates for multiple classifier fusion: an experimental comparison. Pattern Recognition\u00a034(2), 299\u2013314 (2001)","journal-title":"Pattern Recognition"},{"doi-asserted-by":"crossref","unstructured":"Nguyen, T.T., Armitage, G.: A Survey of Techniques for Internet Traffic Classification using Machine Learning. IEEE Communications Surveys and Tutorials (2008) (to appear)","key":"11_CR24","DOI":"10.1109\/SURV.2008.080406"},{"doi-asserted-by":"crossref","unstructured":"Park, J., Tyan, H.R., Kuo, C.C.J.: Ga-based internet traffic classification technique for qos provisioning. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 251\u2013254 (2006)","key":"11_CR25","DOI":"10.1109\/IIH-MSP.2006.264991"},{"doi-asserted-by":"crossref","unstructured":"Szabo, G., Szabo, I., Orincsay, D.: Accurate traffic classification, pp. 1\u20138 (June 2007)","key":"11_CR26","DOI":"10.1109\/WOWMOM.2007.4351725"},{"key":"11_CR27","doi-asserted-by":"publisher","first-page":"497","DOI":"10.2307\/2532305","volume":"48","author":"K.D. Wernecke","year":"1992","unstructured":"Wernecke, K.D.: A coupling procedure for discrimination of mixed data. Biometrics\u00a048, 497\u2013506 (1992)","journal-title":"Biometrics"},{"unstructured":"Williams, N., Zander, S., Armitage, G.: Evaluating machine learning algorithms for automated network application identification. Tech. Rep. 060401B, CAIA, Swinburne Univ. (April 2006)","key":"11_CR28"},{"issue":"5","key":"11_CR29","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1163593.1163596","volume":"36","author":"N. Williams","year":"2006","unstructured":"Williams, N., Zander, S., Armitage, G.: A preliminary performance comparison of five machine learning algorithms for practical ip traffic flow classification. ACM SIGCOMM CCR\u00a036(5), 7\u201315 (2006)","journal-title":"ACM SIGCOMM CCR"},{"key":"11_CR30","first-page":"2745","volume":"7","author":"C.V. Wright","year":"2006","unstructured":"Wright, C.V., Monrose, F., Masson, G.M.: On inferring application protocol behaviors in encrypted network traffic. Journal of Machine Learning Research\u00a07, 2745\u20132769 (2006)","journal-title":"Journal of Machine Learning Research"},{"issue":"3","key":"11_CR31","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1109\/21.155943","volume":"22","author":"L. Xu","year":"1992","unstructured":"Xu, L., Krzyzak, A., Suen, C.Y.: Method of combining multiple classifiers and their application to handwritten numeral recognition. IEEE Trans. Syst. Man Cybernetics\u00a022(3), 418\u2013435 (1992)","journal-title":"IEEE Trans. Syst. Man Cybernetics"}],"container-title":["Lecture Notes in Computer Science","Traffic Monitoring and Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20305-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T14:50:42Z","timestamp":1558536642000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20305-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642203046","9783642203053"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20305-3_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}