{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T14:27:16Z","timestamp":1725719236934},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/cisda.2013.6595430","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T15:56:27Z","timestamp":1379606187000},"page":"72-79","source":"Crossref","is-referenced-by-count":4,"title":["Investigating application behavior in network traffic traces"],"prefix":"10.1109","author":[{"given":"Vahid Aghaei","family":"Foroushani","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"A comparison of unsupervised learning techniques for encrypted traffic identification","author":"bacquet","year":"2010","journal-title":"Journal of Information Assurance and Security"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029211"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2011.5949391"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080183"},{"journal-title":"Flow Attributes for Use in Traffic Characterization","year":"0","author":"montigny-leboeuf","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162679"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254309"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2011.5945941"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.12.002"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2011.5945943"},{"year":"0","key":"23"},{"journal-title":"Introduction to Machine Learning","year":"2004","author":"alpaydin","key":"24"},{"year":"0","key":"25"},{"year":"0","key":"26"},{"year":"0","key":"27"},{"year":"0","key":"28"},{"year":"0","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2006.6"},{"key":"2","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/978-3-540-31966-5_4","article-title":"Toward the accurate identification of network applications","author":"moore","year":"2005","journal-title":"Passive and Active Network Measurement Proceedings of the Passive &Active Measurement Workshop"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129589"},{"year":"0","key":"1"},{"journal-title":"Flow Attributes for Use in Traffic Characterization","year":"2005","author":"de montigny-leboeuf","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988742"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"4","article-title":"Snort-lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proc 13th USENIX Systems Administration Conf (LISA 99)"},{"key":"9","article-title":"BLINC: Multilevel traffic classification in the dark","author":"karagiannis","year":"0","journal-title":"SIGCOMM '05 Proceedings of the 2005 conference on Applications technologies architectures and protocols for computer communications"},{"journal-title":"Discriminators for Use in Flow-based Classification Technical Report RR-05-13 Department of Computer Science Queen Mary University of London September","year":"2005","author":"moore","key":"8"}],"event":{"name":"2013 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)","start":{"date-parts":[[2013,4,16]]},"location":"Singapore","end":{"date-parts":[[2013,4,19]]}},"container-title":["2013 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6588670\/6595418\/06595430.pdf?arnumber=6595430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T22:11:27Z","timestamp":1498083087000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6595430\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/cisda.2013.6595430","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}