{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T03:46:59Z","timestamp":1767066419558,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1109\/cicybs.2009.4925105","type":"proceedings-article","created":{"date-parts":[[2009,5,19]],"date-time":"2009-05-19T15:53:08Z","timestamp":1242748388000},"page":"167-174","source":"Crossref","is-referenced-by-count":19,"title":["Generalization of signatures for SSH encrypted traffic identification"],"prefix":"10.1109","author":[{"given":"Riyad","family":"Alshammari","sequence":"first","affiliation":[]},{"given":"Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71617-4_17"},{"journal-title":"C4 5 Programs for Machine Learning","year":"1993","author":"quinlan","key":"17"},{"key":"18","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1613\/jair.1199","article-title":"learning when training data are costly: the effect of class distribution on tree induction","volume":"19","author":"weiss","year":"2003","journal-title":"Journal of Artificial Intelligence Research"},{"journal-title":"WEKA Software","year":"0","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2007.4414006"},{"key":"13","first-page":"2745","article-title":"on inferring application protocol behaviors in encrypted network traffic","volume":"7","author":"wright","year":"2006","journal-title":"Journal of Machine Learning Research"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"key":"11","first-page":"257","article-title":"dynamic application layer protocol analysis for network intrusion detection","author":"dreger","year":"2006","journal-title":"Proceedings of the 15th USENIX Security Symposium"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254309"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354569"},{"journal-title":"PacketShaper","year":"0","key":"20"},{"year":"0","key":"22"},{"journal-title":"DARPA Intrusion Detection Evaluation Data","year":"1999","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.80"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009715923555"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2008.15"},{"journal-title":"SSH","year":"0","key":"27"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1071690.1064220"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080183"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICMMT.2012.6230295"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029211"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162679"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129589"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080119"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-31966-5_4","article-title":"toward the accurate identification of network applications","author":"moore","year":"2005","journal-title":"Proceedings of the Passive & Active Measurement Workshop"},{"journal-title":"MAWI","year":"0","key":"9"},{"journal-title":"NLANR","year":"0","key":"8"}],"event":{"name":"2009 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","start":{"date-parts":[[2009,3,30]]},"location":"Nashville, TN, USA","end":{"date-parts":[[2009,4,2]]}},"container-title":["2009 IEEE Symposium on Computational Intelligence in Cyber Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4910763\/4925076\/04925105.pdf?arnumber=4925105","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T02:52:06Z","timestamp":1558320726000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4925105\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/cicybs.2009.4925105","relation":{},"subject":[],"published":{"date-parts":[[2009,3]]}}}