{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:22:24Z","timestamp":1730233344426,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/icccn.2012.6289243","type":"proceedings-article","created":{"date-parts":[[2012,9,7]],"date-time":"2012-09-07T15:57:53Z","timestamp":1347033473000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["The Impact of Evasion on the Generalization of Machine Learning Algorithms to Classify VoIP Traffic"],"prefix":"10.1109","author":[{"given":"Riyad","family":"Alshammari","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"See5-comparison","year":"0","author":"quinlan","key":"19"},{"journal-title":"WEKA Software","year":"0","key":"35"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.61"},{"journal-title":"See5-info","year":"0","author":"quinlan","key":"18"},{"journal-title":"Improved Noise Weighting in Celp Coding of Speech - Applying the Vorbis Psychoacoustic Model to Speex","year":"2006","author":"valin","key":"33"},{"year":"0","key":"15"},{"journal-title":"Switch Audio Converter for Mac","year":"0","key":"34"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.312"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2008.2008927"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282386"},{"key":"11","first-page":"8389","article-title":"Analysis and signature of skype voip session traffic","author":"ehlert","year":"2006","journal-title":"CIIT 2006 4th IASTED International Conference on Communications Internet and Information Technology"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.81"},{"journal-title":"Introduction to Machine Learning","year":"2004","author":"alpaydin","key":"21"},{"key":"20","first-page":"771","article-title":"A short introduction to boosting","volume":"14","author":"freund","year":"1999","journal-title":"Journal of Japanese Society for Artificial Intelligence"},{"year":"0","key":"22"},{"journal-title":"NetMate","year":"0","key":"23"},{"journal-title":"PacketShaper","year":"0","key":"24"},{"journal-title":"Skype Traces","year":"0","key":"25"},{"year":"0","key":"26"},{"journal-title":"NetPeeker","year":"0","key":"27"},{"journal-title":"Speech Codec Wav Samples","year":"0","key":"28"},{"journal-title":"The Zfone Project","year":"0","author":"zimmermann","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180437"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.12.002"},{"journal-title":"ZRTP Media Path Key Agreement for Secure RTP","year":"2010","author":"zimmermann","key":"30"},{"key":"7","article-title":"Traffic morphing: An efficient defense against statistical traffic analysis","author":"wright","year":"0","journal-title":"Proceedings of the Network and Distributed Security Symposium - NDSS '09 February 2009"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.11.005"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3261"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080183"},{"journal-title":"Primus Softphone Client","year":"0","key":"31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129589"},{"key":"9","article-title":"Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob?","author":"wright","year":"2007","journal-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2006.264991"}],"event":{"name":"2012 21st International Conference on Computer Communications and Networks - ICCCN 2012","start":{"date-parts":[[2012,7,30]]},"location":"Munich, Germany","end":{"date-parts":[[2012,8,2]]}},"container-title":["2012 21st International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6287204\/6289167\/06289243.pdf?arnumber=6289243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T20:32:06Z","timestamp":1490128326000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6289243\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/icccn.2012.6289243","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}