{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:56:10Z","timestamp":1747810570439,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/cicybs.2011.5949391","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T11:55:21Z","timestamp":1310558121000},"page":"194-201","source":"Crossref","is-referenced-by-count":21,"title":["Genetic optimization and hierarchical clustering applied to encrypted traffic identification"],"prefix":"10.1109","author":[{"given":"Carlos","family":"Bacquet","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]},{"given":"Malcolm I.","family":"Heywood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162679"},{"key":"ref11","first-page":"1","article-title":"Internet Traffic Identification using Machine Learning","author":"erman","year":"2006","journal-title":"Global Telecommunications Conference GLOBECOM '06"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2007.06.014"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242692"},{"journal-title":"IETF","year":"0","key":"ref14"},{"key":"ref15","first-page":"128","article-title":"P2P Traffic Identification using Cluster Analysis","author":"gps","year":"2007","journal-title":"2007 First International Global Information Infrastructure Symposium GIIS"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1109\/GLOCOM.2004.1378239","article-title":"Is p2p dying or just hiding?[p2p traffic measurement]","volume":"3","author":"karagiannis","year":"2004","journal-title":"IEEE Global Telecommunications Conference"},{"key":"ref17","first-page":"365","article-title":"Feature selection in unsupervised learning via evolutionary search","author":"yeongseog","year":"2000","journal-title":"KDD '00 Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1162\/106365602760234117"},{"key":"ref19","first-page":"142","article-title":"On the fly Application Flows Identification by exploiting K-Means based classifiers","volume":"4","author":"maiolini","year":"2009","journal-title":"Journal of Information Assurance and Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04091-7_12"},{"key":"ref3","first-page":"464","article-title":"A comparison of unsupervised learning techniques for encrypted traffic identification","volume":"5","author":"bacquet","year":"2010","journal-title":"Journal of Information Assurance and Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71617-4_17"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1109\/CEC.2010.5586163","article-title":"An analysis of clustering objectives for feature selection applied to encrypted trafc identication","author":"bacquet","year":"2010","journal-title":"Proceedings of IEEE World Congress on Computational Intelligence Barcelona Spain"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1368436.1368445"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129589"},{"key":"ref2","article-title":"An Investigation of a Multi-Objective Genetic Algorithm applied to Encrypted Traffic Identification","author":"bacquet","year":"2010","journal-title":"Master's thesis"},{"journal-title":"Pattern Classification","year":"2001","author":"duda richard","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2007.4414006"},{"year":"0","key":"ref20"},{"year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"ref24","first-page":"163","article-title":"Internet traffic classification using dbscan","volume":"2","author":"caihong","year":"2009","journal-title":"International Conference on Information Science and Engineering"},{"journal-title":"WEKA","year":"0","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2005.35"},{"key":"ref25","first-page":"360","article-title":"Network traffic classification using k-means clustering","author":"yingqiu","year":"2007","journal-title":"Computer and Computational Sciences 2007 IMSCCS 2007 Second International Multi-Symposiums on"}],"event":{"name":"2011 IEEE Symposium On Computational Intelligence In Cyber Security - Part Of 17273 - 2011 Ssci","start":{"date-parts":[[2011,4,11]]},"location":"Paris, France","end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5937004\/5949383\/05949391.pdf?arnumber=5949391","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T19:40:03Z","timestamp":1560368403000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5949391\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/cicybs.2011.5949391","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}