{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T23:55:52Z","timestamp":1730246152852,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1109\/icin.2015.7073812","type":"proceedings-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T15:20:29Z","timestamp":1428074429000},"page":"89-94","source":"Crossref","is-referenced-by-count":1,"title":["A decision theory based tool for detection of encrypted WebRTC traffic"],"prefix":"10.1109","author":[{"given":"Mario","family":"Di Mauro","sequence":"first","affiliation":[]},{"given":"Maurizio","family":"Longo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2014.6986975"},{"year":"0","key":"ref11"},{"year":"0","key":"ref12"},{"year":"0","key":"ref13"},{"year":"0","key":"ref14"},{"year":"0","key":"ref15"},{"year":"0","key":"ref16"},{"key":"ref17","first-page":"1","article-title":"WTC 2014","author":"zeidan","year":"2014","journal-title":"WebRTC enabled multimedia conferencing and collaboration solution"},{"key":"ref18","first-page":"225","article-title":"Design and realization of chatting tool based on web","author":"shi","year":"2013","journal-title":"CECNet13 Proceedings"},{"year":"0","key":"ref19"},{"article-title":"Data Mining, practical Machine Learning Tools and Techniques","year":"2005","author":"witten","key":"ref28"},{"article-title":"Real-time communication with WebRTC","year":"2014","author":"loreto","key":"ref4"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1201\/b17320","article-title":"Data classification: algorithms and applications","author":"aggarwal","year":"2014"},{"key":"ref3","first-page":"863","article-title":"Study on signatures of P2P protocols based on regular expressions","author":"song","year":"0","journal-title":"ICAL 2008"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"ref29","article-title":"An Empirical comparison of Supervised learning algorithms in disease detection","volume":"1","author":"aruna","year":"2001","journal-title":"IJITCS"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISCSCT.2008.368"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.412"},{"year":"0","key":"ref2","article-title":"Port numbers"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WICOM.2009.5302133"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575121"},{"key":"ref20","first-page":"247","article-title":"Machine Learning Approach for Attack Prediction and Classification using Supervised Learning Algorithms","author":"meera gandhi","year":"2010","journal-title":"International Journal of Computer Science and Communication"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/69.991727"},{"article-title":"C4.5: Programs for Machine Learning","year":"1993","author":"quinlan","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6849-3"},{"key":"ref23","first-page":"249","article-title":"Supervised Machine Learning: A review of Classification Techniques","author":"kotsiantis","year":"2007","journal-title":"Informatica 31"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/34.589207"},{"article-title":"Classification and Regression Trees","year":"1984","author":"breiman","key":"ref25"}],"event":{"name":"2015 18th International Conference on Intelligence in Next-Generation Networks (ICIN)","start":{"date-parts":[[2015,2,17]]},"location":"Paris","end":{"date-parts":[[2015,2,19]]}},"container-title":["2015 18th International Conference on Intelligence in Next Generation Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7070910\/7073795\/07073812.pdf?arnumber=7073812","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T22:02:15Z","timestamp":1601416935000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7073812\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icin.2015.7073812","relation":{},"subject":[],"published":{"date-parts":[[2015]]}}}