{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:13:59Z","timestamp":1729674839917,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/lcn.2014.6925769","type":"proceedings-article","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T16:15:47Z","timestamp":1413994547000},"page":"168-176","source":"Crossref","is-referenced-by-count":3,"title":["CluClas: Hybrid clustering-classification approach for accurate and efficient network classification"],"prefix":"10.1109","author":[{"given":"Adil","family":"Fahad","sequence":"first","affiliation":[]},{"given":"Kurayman","family":"Alharthi","sequence":"additional","affiliation":[]},{"given":"Zahir","family":"Tari","sequence":"additional","affiliation":[]},{"given":"Abdulmohsen","family":"Almalawi","sequence":"additional","affiliation":[]},{"given":"Ibrahim","family":"Khalil","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/312624.312680"},{"key":"17","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/978-3-540-24668-8_21","article-title":"Fl ow clustering using machine learning techniques","author":"mcgregor","year":"2004","journal-title":"Passive and Active Network Measurement"},{"key":"18","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/978-3-540-24668-8_21","article-title":"Flow clustering using machine learning techniques","author":"mcgregor","year":"2004","journal-title":"Passive and Active Network Measurement"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0002-5"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00043-X"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028804"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080119"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.09.015"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.04.005"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31966-5_4"},{"key":"20","article-title":"Architecture of a network monitor","author":"moore","year":"2003","journal-title":"Passive & Active Measurement Workshop 2003 (PAM2003) Citeseer"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-4832-0773-5.50018-3"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(198609)37:5<346::AID-ASI10>3.0.CO;2-5"},{"key":"25","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1109\/DISCEX.2000.821515","article-title":"Costbased modeling for fraud and intrusion detection: Results from the jam project","volume":"2","author":"stolfo","year":"2000","journal-title":"Proceedings of the DARPA Information Survivability Conference and Exposition DISCEX-2000"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSS.2011.6059997"},{"key":"27","first-page":"1","article-title":"Internet traffic classification using constrained clustering","author":"wang","year":"2013","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"journal-title":"Weka Practical Machine Learning Tools and Techniques with Java Implementations","year":"1999","author":"witten","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00063-5"},{"key":"2","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1109\/TNN.2006.883010","article-title":"Bayesian neural networks for internet traffic classification","volume":"18","author":"auld","year":"2007","journal-title":"IEEE Transactions on Neural Networks"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2007.06.014"},{"year":"0","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.845141"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162679"},{"journal-title":"Pattern Classification","year":"2012","author":"duda","key":"6"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223675"},{"key":"5","first-page":"196","article-title":"Network intrusion detection design using feature selection of soft computing paradigms","volume":"4","author":"chou","year":"2008","journal-title":"International Journal Of Computational Intelligence"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2005.35"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2009.2039875"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2006.443"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162679"}],"event":{"name":"2014 IEEE 39th Conference on Local Computer Networks (LCN)","start":{"date-parts":[[2014,9,8]]},"location":"Edmonton, AB","end":{"date-parts":[[2014,9,11]]}},"container-title":["39th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/iel7\/6916486\/6925725\/06925769.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6916486\/6925725\/06925769.pdf?arnumber=6925769","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T10:14:08Z","timestamp":1565950448000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6925769\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/lcn.2014.6925769","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}