{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:10:28Z","timestamp":1765887028453,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,10]]},"DOI":"10.1109\/icsmc.2007.4414006","type":"proceedings-article","created":{"date-parts":[[2008,1,4]],"date-time":"2008-01-04T20:52:49Z","timestamp":1199479969000},"page":"296-301","source":"Crossref","is-referenced-by-count":45,"title":["A flow based approach for SSH traffic detection"],"prefix":"10.1109","author":[{"given":"Riyad","family":"Alshammari","sequence":"first","affiliation":[]},{"given":"A.","family":"Nur Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"NetMate","year":"0","key":"19"},{"key":"17","first-page":"771","article-title":"A Short Introduction to Boosting","volume":"14","author":"freund","year":"1999","journal-title":"Journal of Japanese Society for Artificial Intelligence"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/505282.505283"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"journal-title":"Introduction to Machine Learning","year":"0","author":"alpaydin","key":"16"},{"key":"13","first-page":"2745","article-title":"On Inferring Application Protocol Behaviors in Encrypted Network Traffic","volume":"7","author":"wright","year":"2006","journal-title":"Journal of Machine Learning Research"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"key":"11","first-page":"257","article-title":"Dynamic application layer protocol analysis for network intrusion detection","author":"dreger","year":"2006","journal-title":"Proceedings of the 15th USENIX Security Symposium"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254309"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1992.263523"},{"key":"20","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1145\/115994.116003","article-title":"Characteristics of widearea TCP\/IP conversations, of ACM","author":"caceres","year":"1991","journal-title":"SIGCOMM"},{"journal-title":"Measurement-Specs","year":"0","key":"22"},{"journal-title":"NeTraMet","year":"0","key":"23"},{"journal-title":"Netflow","year":"0","key":"24"},{"year":"0","key":"25"},{"journal-title":"Internet Traffic Characterization","year":"1994","author":"claffy","key":"26"},{"year":"0","key":"27"},{"year":"0","key":"28"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1071690.1064220"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080183"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICMMT.2012.6230295"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029211"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162679"},{"year":"0","key":"6"},{"key":"5","first-page":"229","article-title":"BLINC: Multilevel Traffic Classification in the Dark","author":"karagiannis","year":"2006","journal-title":"Proceedings of the ACM SIGCOMM"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-31966-5_4","article-title":"Toward the Accurate Identification of Network Applications","author":"moore","year":"2005","journal-title":"Proceedings of the Passive & Active Measurement Workshop"},{"year":"0","key":"9"},{"year":"0","key":"8"}],"event":{"name":"2007 IEEE International Conference on Systems, Man and Cybernetics","start":{"date-parts":[[2007,10,7]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2007,10,10]]}},"container-title":["2007 IEEE International Conference on Systems, Man and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4413560\/4413561\/04414006.pdf?arnumber=4414006","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T02:40:33Z","timestamp":1497753633000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4414006\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2007.4414006","relation":{},"subject":[],"published":{"date-parts":[[2007,10]]}}}