{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T12:20:38Z","timestamp":1753359638182,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/iwmn.2015.7322980","type":"proceedings-article","created":{"date-parts":[[2015,11,12]],"date-time":"2015-11-12T18:02:40Z","timestamp":1447351360000},"page":"1-6","source":"Crossref","is-referenced-by-count":14,"title":["Traffic classification and verification using unsupervised learning of Gaussian Mixture Models"],"prefix":"10.1109","author":[{"given":"Hassan","family":"Alizadeh","sequence":"first","affiliation":[]},{"given":"Abdolrahman","family":"Khoshrou","sequence":"additional","affiliation":[]},{"given":"Andre","family":"Zuquete","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364951"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1269880.1269890"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/34.990138"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1629607.1629610"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/978-3-642-30633-4_11","article-title":"SSHCure: A Flow-Based SSH Intrusion Detection System","author":"hellemons","year":"2012","journal-title":"Dependable Networks and Services volume 7279 of LNCS"},{"key":"ref15","first-page":"109","article-title":"Real-Time and Resilient Intrusion Detection: A Flow-Based Approach","author":"hofstede","year":"2012","journal-title":"Dependable Networks and Services volume 7279 of Lecture Notes in Computer Science"},{"key":"ref16","first-page":"282","article-title":"Robust anomaly detection using support vector machines","author":"hu","year":"0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.10.002"},{"key":"ref18","first-page":"747","article-title":"Network-Based Intrusion Detection with Support Vector Machines","author":"kim","year":"2003","journal-title":"Information Networking volume 2662 of LNCS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544023"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1996.8.1.129"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.001"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICADIWT.2008.4664331"},{"key":"ref3","first-page":"264","article-title":"Anomaly Intrusion Detection System Using Hierarchical Gaussian Mixture Model","volume":"8","author":"bahrololum","year":"2008","journal-title":"International Journal of Computer Science and Network Security"},{"key":"ref6","first-page":"122","article-title":"Early Classification of Network Traffic through Multi-classification","author":"dainotti","year":"2011","journal-title":"Traffic Monitoring and Analysis volume 6613 of Lecture Notes in Computer Science"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IMSAA.2011.6156362"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6135854"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","article-title":"Maximum likelihood from incomplete data via the em algorithm","volume":"39","author":"dempster","year":"1977","journal-title":"Journal of the Royal Statistical Society Series B (Methodological)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6786614"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2713579.2713586"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","article-title":"Maximum likelihood from incomplete data via the EM algorithm","author":"dempster","year":"1977","journal-title":"Journal of the Royal Statistical Society Series B (Methodological)"},{"year":"2009","key":"ref1"},{"journal-title":"The EM Algorithm and Extensions","year":"1997","author":"mclachlan","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1137\/1026034"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2007.07.006"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"journal-title":"Tranalyzer 2 0 tool","year":"2011","author":"r\u00fchl","key":"ref25"}],"event":{"name":"2015 IEEE International Workshop on Measurements and Networking (M&N)","start":{"date-parts":[[2015,10,12]]},"location":"Coimbra, Portugal","end":{"date-parts":[[2015,10,13]]}},"container-title":["2015 IEEE International Workshop on Measurements &amp; Networking (M&amp;N)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7309519\/7322959\/07322980.pdf?arnumber=7322980","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T09:51:03Z","timestamp":1567331463000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7322980\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/iwmn.2015.7322980","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}