{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T03:47:59Z","timestamp":1767066479146,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/cec.2010.5586288","type":"proceedings-article","created":{"date-parts":[[2010,9,29]],"date-time":"2010-09-29T19:54:29Z","timestamp":1285790069000},"page":"1-8","source":"Crossref","is-referenced-by-count":15,"title":["Unveiling Skype encrypted tunnels using GP"],"prefix":"10.1109","author":[{"given":"Riyad","family":"Alshammari","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"WEKA Software","year":"0","key":"ref32"},{"journal-title":"IETF","year":"0","key":"ref31"},{"journal-title":"NetMate","year":"0","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1389095.1389162"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78671-9_25"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.312"},{"key":"ref13","article-title":"Characterizing and detecting relayed traffic: A case study using skype","author":"suh","year":"2006","journal-title":"INFOCOM 06 Proceedings of the 25th IEEE International Conference on Computer Communications"},{"key":"ref14","first-page":"8389","article-title":"Analysis and signature of skype voip session traffic","author":"ehlert","year":"2006","journal-title":"CIIT 2006 4th lASTED International Conference on Communications Internet and Information Technology"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2008.2008927"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.81"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282386"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1570256.1570358"},{"journal-title":"Skype","year":"0","key":"ref19"},{"journal-title":"Skype Traces","year":"2009","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CONGRESS.2009.22"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356534"},{"journal-title":"17-Filter","year":"2008","key":"ref27"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254309"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1613\/jair.1199","article-title":"Learning when training data are costly: The effect of class distribution on tree induction","volume":"19","author":"weiss","year":"2003","journal-title":"J Artif Intell Res (JAIR)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2009.4925105"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080183"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2008.15"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2007.4414006"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"key":"ref20","first-page":"203","article-title":"A preliminary performance comparison of two feature sets for encrypted traffic classification","author":"alshammari","year":"2009","journal-title":"Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS'08"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10710-008-9067-9"},{"journal-title":"Introduction to Machine Learning","year":"2004","author":"alpaydin","key":"ref21"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1007\/978-3-540-78671-9_23","article-title":"Gp Classification under Imbalanced Data Sets: Active Sub-sampling and AUC Approximation","author":"doucette","year":"2008","journal-title":"European Conference on Genetic Programming"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1162\/evco.2007.15.1.61"},{"journal-title":"PacketShaper","year":"2008","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1997.5.1.1"}],"event":{"name":"2010 IEEE Congress on Evolutionary Computation (CEC)","start":{"date-parts":[[2010,7,18]]},"location":"Barcelona, Spain","end":{"date-parts":[[2010,7,23]]}},"container-title":["IEEE Congress on Evolutionary Computation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5573635\/5585910\/05586288.pdf?arnumber=5586288","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T04:26:56Z","timestamp":1559708816000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5586288\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/cec.2010.5586288","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}