{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:12:43Z","timestamp":1765887163735,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,7,8]],"date-time":"2009-07-08T00:00:00Z","timestamp":1247011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,7,8]]},"DOI":"10.1145\/1570256.1570358","type":"proceedings-article","created":{"date-parts":[[2009,7,21]],"date-time":"2009-07-21T13:32:17Z","timestamp":1248183137000},"page":"2539-2546","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Classifying SSH encrypted traffic with minimum packet header features using genetic programming"],"prefix":"10.1145","author":[{"given":"Riyad","family":"Alshammari","sequence":"first","affiliation":[{"name":"Dalhousie University, Halifax, NS, Canada"}]},{"given":"Peter I.","family":"Lichodzijewski","sequence":"additional","affiliation":[{"name":"Dalhousie University, Halifax, NS, Canada"}]},{"given":"Malcolm","family":"Heywood","sequence":"additional","affiliation":[{"name":"Dalhousie University, Halifax, NS, Canada"}]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[{"name":"Dalhousie University, Halifax, NS, Canada"}]}],"member":"320","published-online":{"date-parts":[[2009,7,8]]},"reference":[{"volume-title":"last accessed","year":"2008","key":"e_1_3_2_1_1_1","unstructured":"Darpa 1999 intrusion detection evaluation data , last accessed March , 2008 . http:\/\/www.ll.mit.edu\/IST\/ideval\/docs\/1999\/schedule.html. Darpa 1999 intrusion detection evaluation data, last accessed March, 2008. http:\/\/www.ll.mit.edu\/IST\/ideval\/docs\/1999\/schedule.html."},{"key":"e_1_3_2_1_2_1","volume-title":"Introduction to Machine Learning","author":"Alpaydin E.","year":"2004","unstructured":"E. Alpaydin . Introduction to Machine Learning . MIT Press , 2004 . E. Alpaydin. Introduction to Machine Learning. MIT Press, 2004."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88181-0_26"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2008.15"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129589"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1162\/evco.2007.15.1.61"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792694.1792719"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162679"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080183"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080119"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10710-008-9067-9"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1389095.1389162"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792694.1792721"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31966-5_4"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"volume-title":"last accessed","year":"2008","key":"e_1_3_2_1_16_1","unstructured":"PacketShaper , last accessed March , 2008 . http:\/\/www.packeteer.com\/products\/packetshaper\/. PacketShaper, last accessed March, 2008. http:\/\/www.packeteer.com\/products\/packetshaper\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1997.5.1.1"},{"key":"e_1_3_2_1_18_1","unstructured":"W. Software. http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/.  W. Software. http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/."},{"key":"e_1_3_2_1_19_1","unstructured":"SSH. http:\/\/www.rfc-archive.org\/getrfc.php?rfc=4251.  SSH. http:\/\/www.rfc-archive.org\/getrfc.php?rfc=4251."},{"key":"e_1_3_2_1_20_1","volume-title":"Learning when training data are costly: The e ect of class distribution on tree induction. J. Artif. Intell. Res. (JAIR), 19:315--354","author":"Weiss G. M.","year":"2003","unstructured":"G. M. Weiss and F. J. Provost . Learning when training data are costly: The e ect of class distribution on tree induction. J. Artif. Intell. Res. (JAIR), 19:315--354 , 2003 . G. M. Weiss and F. J. Provost. Learning when training data are costly: The e ect of class distribution on tree induction. J. Artif. Intell. Res. (JAIR), 19:315--354, 2003."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"volume-title":"Last accessed","year":"2008","key":"e_1_3_2_1_22_1","unstructured":"Wireshark , Last accessed Sep , 2008 . http:\/\/www.wireshark.org\/. Wireshark, Last accessed Sep, 2008. http:\/\/www.wireshark.org\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029211"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1248547.1248647"},{"key":"e_1_3_2_1_25_1","first-page":"157","volume-title":"Proceedings of the 9th USENIX Security Symposium","author":"Zhang Y.","year":"2000","unstructured":"Y. Zhang and V. Paxson . Detecting back doors . In Proceedings of the 9th USENIX Security Symposium , pages 157 -- 170 . ACM Press , 2000 . Y. Zhang and V. Paxson. Detecting back doors. In Proceedings of the 9th USENIX Security Symposium, pages 157--170. ACM Press, 2000."}],"event":{"name":"GECCO09: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation","ACM Association for Computing Machinery"],"location":"Montreal Qu\u00e9bec Canada","acronym":"GECCO09"},"container-title":["Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference: Late Breaking Papers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1570256.1570358","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1570256.1570358","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:54Z","timestamp":1750249074000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1570256.1570358"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,8]]},"references-count":25,"alternative-id":["10.1145\/1570256.1570358","10.1145\/1570256"],"URL":"https:\/\/doi.org\/10.1145\/1570256.1570358","relation":{},"subject":[],"published":{"date-parts":[[2009,7,8]]},"assertion":[{"value":"2009-07-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}