{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:06:28Z","timestamp":1766732788810,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/syscon.2018.8369567","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T22:25:57Z","timestamp":1527805557000},"page":"1-8","source":"Crossref","is-referenced-by-count":17,"title":["A systematic approach of feature selection for encrypted network traffic classification"],"prefix":"10.1109","author":[{"given":"Donald","family":"McGaughey","sequence":"first","affiliation":[]},{"given":"Trevor","family":"Semeniuk","sequence":"additional","affiliation":[]},{"given":"Ron","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Scott","family":"Knight","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/978-3-540-71617-4_17","article-title":"Early recognition of encrypted applications","author":"bernaille","year":"2007","journal-title":"Proceedings of the 8th International Conference on Passive and Active Network Measurement"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.09.010"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.1020"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080119"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2008.15"},{"journal-title":"About Skype What Is Skype?","article-title":"Skype","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/79.127999"},{"key":"ref17","article-title":"Neutropenia Prediction Based on First-Cycle Blood Counts Using a FOS-3NN Classifier","volume":"2011","author":"shirdel","year":"2012","journal-title":"Adv Bioinformatics"},{"key":"ref18","first-page":"1","article-title":"Feature Selection in Computer-Aided Breast Cancer Diagnosis via Dynamic Contrast-Enhanced Magnetic Resonance Images","author":"rakoczy","year":"2012","journal-title":"J Digit Imaging"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3828.3830"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2011.5945941"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/16.5.412"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502266"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1245283"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"journal-title":"DropBox","year":"0","key":"ref8"},{"journal-title":"NetMate","year":"2009","author":"schmoll","key":"ref7"},{"journal-title":"Automatically Generating Robust Signatures Using A Machine Learning Approach to Unveil Encrypted VOIP Traffic Without Using Port Numbers IP Addresses and Payload Inspection","year":"2012","author":"alshammari","key":"ref2"},{"key":"ref9","first-page":"2745","article-title":"On inferring application protocol behaviors in encrypted network traffic","volume":"7","author":"wright","year":"2006","journal-title":"J Mach Learn Res"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2007.06.014"},{"journal-title":"Heuristics Intelligent Search Strategies for Computer Problem Solving","year":"1984","author":"pearl","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"journal-title":"Correlation-Based Feature Subset Selection for Machine Learning","year":"1998","author":"hall","key":"ref21"},{"key":"ref24","first-page":"75","article-title":"A Look at\\tt ngrep","volume":"10","author":"mccarty","year":"2001","journal-title":"Sys Admin"},{"journal-title":"TCPDUMP\/LIBCAP public repository","year":"0","author":"jacobson","key":"ref23"},{"journal-title":"Rounding Errors in Algebraic Processes","year":"1994","author":"wilkinson","key":"ref26"},{"journal-title":"NetAI Network Traffic based Application Identification","year":"0","author":"zander","key":"ref25"}],"event":{"name":"2018 Annual IEEE International Systems Conference (SysCon)","start":{"date-parts":[[2018,4,23]]},"location":"Vancouver, BC","end":{"date-parts":[[2018,4,26]]}},"container-title":["2018 Annual IEEE International Systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8365669\/8369483\/08369567.pdf?arnumber=8369567","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T04:51:54Z","timestamp":1643172714000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8369567\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/syscon.2018.8369567","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}