{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T21:37:03Z","timestamp":1764020223179,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/iwcmc.2018.8450406","type":"proceedings-article","created":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T22:00:16Z","timestamp":1535666416000},"page":"542-547","source":"Crossref","is-referenced-by-count":8,"title":["Machine Learning Fingerprinting Methods in Cyber Security Domain: Which one to Use?"],"prefix":"10.1109","author":[{"given":"Martin","family":"Lastovicka","sequence":"first","affiliation":[]},{"given":"Antonin","family":"Dufka","sequence":"additional","affiliation":[]},{"given":"Jana","family":"Komarkova","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Machine Learning An Algorithmic Perspective","year":"2015","author":"marsland","key":"ref10"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1109\/72.991427","article-title":"A comparison of methods for multiclass support vector machines","volume":"13","author":"hsu","year":"2002","journal-title":"IEEE Transactions on Neural Networks"},{"key":"ref12","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref13","first-page":"40","article-title":"Passive operating system identification from tcp\/ip packet headers","author":"lippmann","year":"2003","journal-title":"Workshop on Data Mining for Computer Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7011"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2009.03.002"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.7763\/IJCTE.2014.V6.837"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.05.003"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.11.016"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406262"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5220\/0005099500210027"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1866423.1866430"},{"key":"ref5","first-page":"27","article-title":"Fig: Automatic fingerprint generation","author":"caballero","year":"2007","journal-title":"Department of Electrical and Computing Engineering"},{"key":"ref8","first-page":"41","article-title":"An empirical study of the naive bayes classifier","volume":"3","author":"rish","year":"2001","journal-title":"IJCAI 2001 Workshop on Empirical Methods in Artificial Intelligence"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2321898"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-11391-3","author":"kott","year":"2014","journal-title":"Cyber Defense and Situational Awareness"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/widm.8"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2010.01.001"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1925861.1925865"}],"event":{"name":"2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2018,6,25]]},"location":"Limassol","end":{"date-parts":[[2018,6,29]]}},"container-title":["2018 14th International Wireless Communications &amp; Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410977\/8450266\/08450406.pdf?arnumber=8450406","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T13:53:55Z","timestamp":1643205235000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8450406\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2018.8450406","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}