{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T10:03:10Z","timestamp":1768471390558,"version":"3.49.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/cisda.2011.5945941","type":"proceedings-article","created":{"date-parts":[[2011,7,21]],"date-time":"2011-07-21T11:14:59Z","timestamp":1311246899000},"page":"107-114","source":"Crossref","is-referenced-by-count":45,"title":["A Comparison of three machine learning techniques for encrypted network traffic analysis"],"prefix":"10.1109","author":[{"given":"Daniel J.","family":"Arndt","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","author":"zander","year":"2009","journal-title":"Netai 0 1"},{"key":"16","year":"2009","journal-title":"Blue Coat PacketShaper"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1162\/106365602760234117"},{"key":"14","author":"zander","year":"2009","journal-title":"Netmate 0 9 5"},{"key":"11","author":"quinlan","year":"1993","journal-title":"C4 5 Programs for Machine Learning"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/347090.347169"},{"key":"3","article-title":"An investigation of multi-objective genetic algorithms for encrypted traffic identification","volume":"63","author":"bacquet","year":"2009","journal-title":"International Workshop on Computational Intelligence in Security for Information Systems"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356534"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"1","year":"0"},{"key":"7","year":"1999","journal-title":"DARPA Intrusion Detection Evaluation Data Set"},{"key":"6","year":"0","journal-title":"Amp Special Traces"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1071690.1064220"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2007.06.014"},{"key":"9","article-title":"Traffic flow measurement: Meter MIB","author":"brownlee","year":"1999","journal-title":"RFC 2720 (Proposed Standard) Internet Engineering Task Force"},{"key":"8","year":"2006","journal-title":"Mawi Working Group Traffic Samplepoint-f"}],"event":{"name":"2011 Ieee Symposium On Computational Intelligence For Security And Defence Applications - Part Of 17273 - 2011 Ssci","location":"Paris, France","start":{"date-parts":[[2011,4,11]]},"end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5937061\/5945936\/05945941.pdf?arnumber=5945941","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T01:49:55Z","timestamp":1490060995000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5945941\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/cisda.2011.5945941","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}