{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:29:49Z","timestamp":1729654189133,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/cec.2011.5949799","type":"proceedings-article","created":{"date-parts":[[2011,7,20]],"date-time":"2011-07-20T16:51:24Z","timestamp":1311180684000},"page":"1543-1550","source":"Crossref","is-referenced-by-count":1,"title":["Is machine learning losing the battle to produce transportable signatures against VoIP traffic?"],"prefix":"10.1109","author":[{"given":"Riyad","family":"Alshammari","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Characterizing and detecting relayed traffic: A case study using skype","author":"suh","year":"2006","journal-title":"INFOCOM 06 Proceedings of the 25th IEEE International Conference on Computer Communications"},{"year":"0","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEWS.2008.4488161"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1997.5.1.1"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIAS.2006.295422"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1613\/jair.1199","article-title":"Learning when training data are costly: The effect of class distribution on tree induction","volume":"19","author":"weiss","year":"2003","journal-title":"J Artif Intell Res (JAIR)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282386"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1496046.1496065"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1162\/evco.2007.15.1.61"},{"key":"ref13","first-page":"266","article-title":"Gp Classification under Imbalanced Data Sets: Active Sub-sampling and AUC Approximation","author":"doucette","year":"0","journal-title":"European Conference on Genetic Programming volume 4971 of Lecture Notes in Computer Science"},{"key":"ref14","first-page":"8389","article-title":"Analysis and signature of skype voip session traffic","author":"ehlert","year":"2006","journal-title":"in CIIT 2006 4th lASTED International Conference on Communications Internet and Information Technology"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162679"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242692"},{"key":"ref17","first-page":"89","author":"freire","year":"2008","journal-title":"Detecting skype flows in web traffic"},{"key":"ref18","first-page":"771","article-title":"A short introduction to boosting","volume":"14","author":"freund","year":"1999","journal-title":"Journal of Japanese Society for Artificial Intelligence"},{"key":"ref19","article-title":"An experimental study of the skype peer-to-peer voip system","author":"guha","year":"2006","journal-title":"IPTPS'06 The 5th International Workshop on Peer-to-Peer Systems"},{"journal-title":"Introduction to Machine Learning","year":"2004","author":"alpaydin","key":"ref4"},{"year":"2011","author":"quinlan","key":"ref28"},{"journal-title":"Skype reaches 10 million concurrent users","year":"0","key":"ref3"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.81"},{"key":"ref6","article-title":"Can encrypted traffic be identified without port numbers, ip addresses and payload inspection?","author":"alshammari","year":"2010","journal-title":"Computer Networks"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2010.5586288"},{"year":"2010","author":"quinlan","key":"ref29"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129589"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.312"},{"year":"0","key":"ref2"},{"year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2008.2008927"},{"year":"0","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080119"},{"key":"ref21","first-page":"338","article-title":"Estimating continuous distributions in bayesian classifiers","author":"john","year":"0","journal-title":"Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1389095.1389162"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2007.2"},{"year":"2008","key":"ref26"},{"year":"0","key":"ref25"}],"event":{"name":"2011 IEEE Congress on Evolutionary Computation (CEC)","start":{"date-parts":[[2011,6,5]]},"location":"New Orleans, LA, USA","end":{"date-parts":[[2011,6,8]]}},"container-title":["2011 IEEE Congress of Evolutionary Computation (CEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5936494\/5949581\/05949799.pdf?arnumber=5949799","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T00:49:07Z","timestamp":1560386947000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5949799\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/cec.2011.5949799","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}