{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T05:40:32Z","timestamp":1776145232052,"version":"3.50.1"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,7]]},"DOI":"10.1109\/cisda.2009.5356534","type":"proceedings-article","created":{"date-parts":[[2009,12,24]],"date-time":"2009-12-24T18:27:59Z","timestamp":1261679279000},"page":"1-8","source":"Crossref","is-referenced-by-count":126,"title":["Machine learning based encrypted traffic classification: Identifying SSH and Skype"],"prefix":"10.1109","author":[{"given":"Riyad","family":"Alshammari","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2008.2008927"},{"key":"ref32","first-page":"8389","article-title":"Analysis and signature of skype VoIP session traffic","author":"ehlert","year":"2006","journal-title":"CIIT 2006 4th IASTEDInternational Conference on Communications Internet and Information Technology"},{"key":"ref31","article-title":"Characterizing and detecting relayed traffic: A case study using skype","author":"suh","year":"2006","journal-title":"INFOCOM 06 Proceedings of the 25th IEEE International Conference on Computer Communications"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.312"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575121"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.81"},{"key":"ref10","first-page":"2745","article-title":"On Inferring Application Protocol Behaviors in Encrypted Network Traffic","author":"wright","year":"2006","journal-title":"Journal of Machine Learning Research"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71617-4_17"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2007.4414006"},{"key":"ref13","year":"0","journal-title":"NLANR"},{"key":"ref14","year":"0","journal-title":"MAWI"},{"key":"ref15","article-title":"1999 DARPA intrusion detection evaluation data","year":"0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129589"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162679"},{"key":"ref18","year":"0","journal-title":"PacketShaper"},{"key":"ref19","year":"0","journal-title":"17-Filter"},{"key":"ref28","year":"0","journal-title":"WEKA Software"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-31966-5_4","article-title":"Toward the Accurate Identification of Network Applications","author":"moore","year":"2005","journal-title":"Proceedings of the Passive & Active Measurement Workshop"},{"key":"ref27","article-title":"Flow Attributes For Use In Traffic Characterization","author":"montigny-leboeuf","year":"2005","journal-title":"Journal of CRC Technical Note No CRC-TN-2005&#x2013;003 Ottawa ON Canada"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"ref6","first-page":"157","article-title":"Detecting back doors","author":"zhang","year":"2000","journal-title":"Proceedings of the 9th Usenix Security Symposium"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2008.15"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254309"},{"key":"ref7","first-page":"257","article-title":"Dynamic application layer protocol analysis for network intrusion detection","author":"dreger","year":"2006","journal-title":"Proceedings of the 15th USENIX Security Symposium"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080183"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080119"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029211"},{"key":"ref20","year":"0","journal-title":"NetMate"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009715923555"},{"key":"ref21","year":"0","journal-title":"IETF"},{"key":"ref24","first-page":"338","article-title":"Estimating Continuous Distributions in Bayesian Classifiers","author":"john","year":"1995","journal-title":"Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence"},{"key":"ref23","article-title":"Introduction to Machine Learning","author":"alpaydin","year":"0"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"key":"ref25","article-title":"C4.5: Programs for Machine Learning","author":"quinlan","year":"1993"}],"event":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)","location":"Ottawa, ON, Canada","start":{"date-parts":[[2009,7,8]]},"end":{"date-parts":[[2009,7,10]]}},"container-title":["2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5351161\/5356514\/05356534.pdf?arnumber=5356534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T03:13:12Z","timestamp":1497841992000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5356534\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/cisda.2009.5356534","relation":{},"subject":[],"published":{"date-parts":[[2009,7]]}}}