{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:49:45Z","timestamp":1729619385116,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/cisda.2011.5945943","type":"proceedings-article","created":{"date-parts":[[2011,7,21]],"date-time":"2011-07-21T11:14:59Z","timestamp":1311246899000},"page":"115-122","source":"Crossref","is-referenced-by-count":11,"title":["An investigation on identifying SSL traffic"],"prefix":"10.1109","author":[{"given":"Curtis","family":"McCarthy","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2010.01.001"},{"key":"17","first-page":"146","article-title":"Towards a flow-based internet traffic classification for bandwidth optimization","volume":"3","author":"mohd","year":"2009","journal-title":"International Journal of Computer Science and Security"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-008-9131-2"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2005.1430574"},{"key":"16","article-title":"Tunneling activities detection using machine learning techniques","author":"allard","year":"2010","journal-title":"NATO Research and Technology Organization Symposium on Information Assurance and Cyber Defence"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/PADS.2008.15"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ITCS.2009.307"},{"journal-title":"T IETF","year":"0","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1177\/0037549709341292"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.09.010"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.1020"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/CONGRESS.2009.22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2008.15"},{"key":"24","article-title":"Flow attributes for use in traffic characterization","author":"montigny-leboeuf","year":"2005","journal-title":"Journal of CRC Technical Note"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"journal-title":"SSH the Secure Shell The Definitive Guide","year":"2001","author":"barrett","key":"26"},{"key":"27","first-page":"2745","article-title":"On inferring application protocol behaviors in encrypted network traffic","volume":"7","author":"wright","year":"2006","journal-title":"Journal of Machine Learning Research"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/65.75840"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2009.4925105"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2008.15"},{"journal-title":"Network Security with OpenSSL","year":"2002","author":"viega","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356534"},{"key":"30","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/3-540-59119-2_166","article-title":"A decision-theoretic generalization of on-line learning and an application to boosting","author":"freund","year":"1995","journal-title":"Proceedings of the Second European Conference on Computational Learning Theory"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.02.002"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2007.06.014"},{"journal-title":"C4 5 Programs for Machine Learning","year":"1993","author":"quinlan","key":"32"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.05.003"},{"journal-title":"Artificial Intelligence A Modern Approach","year":"2003","author":"russell","key":"31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/AINAW.2007.212"},{"journal-title":"Stunnel Ssl Tunnel","year":"0","author":"trojnara","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71617-4_17"}],"event":{"name":"2011 Ieee Symposium On Computational Intelligence For Security And Defence Applications - Part Of 17273 - 2011 Ssci","start":{"date-parts":[[2011,4,11]]},"location":"Paris, France","end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5937061\/5945936\/05945943.pdf?arnumber=5945943","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T23:27:45Z","timestamp":1497914865000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5945943\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/cisda.2011.5945943","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}