{"id":"https://openalex.org/W2101357498","doi":"https://doi.org/10.1109/securware.2008.13","title":"On the Portability of Trained Machine Learning Classifiers for Early Application Identification","display_name":"On the Portability of Trained Machine Learning Classifiers for Early Application Identification","publication_year":2008,"publication_date":"2008-08-01","ids":{"openalex":"https://openalex.org/W2101357498","doi":"https://doi.org/10.1109/securware.2008.13","mag":"2101357498"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/securware.2008.13","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047350739","display_name":"Giacomo Verticale","orcid":"https://orcid.org/0000-0001-7508-9706"},"institutions":[{"id":"https://openalex.org/I93860229","display_name":"Politecnico di Milano","ror":"https://ror.org/01nffqt88","country_code":"IT","type":"education","lineage":["https://openalex.org/I93860229"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Giacomo Verticale","raw_affiliation_strings":["Dipt. di Elettron. e Inf., Politec. di Milano, Milan"],"affiliations":[{"raw_affiliation_string":"Dipt. di Elettron. e Inf., Politec. di Milano, Milan","institution_ids":["https://openalex.org/I93860229"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5047350739"],"corresponding_institution_ids":["https://openalex.org/I93860229"],"apc_list":null,"apc_paid":null,"fwci":0.221,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":2,"citation_normalized_percentile":{"value":0.34647,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":70,"max":74},"biblio":{"volume":null,"issue":null,"first_page":"306","last_page":"310"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9953,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep Packet Inspection","score":0.6486833},{"id":"https://openalex.org/keywords/software-portability","display_name":"Software portability","score":0.5383512},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.5235726},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.42065653},{"id":"https://openalex.org/keywords/statistical-classification","display_name":"Statistical classification","score":0.41330647}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8139266},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.6486833},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.64344984},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6069515},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.58843005},{"id":"https://openalex.org/C63000827","wikidata":"https://www.wikidata.org/wiki/Q3080428","display_name":"Software portability","level":2,"score":0.5383512},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5366665},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.52484655},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.5235726},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5040902},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.48491818},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.42065653},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.41330647},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36914074},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.18288538},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.13857222},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11210197}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/securware.2008.13","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.63}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":14,"referenced_works":["https://openalex.org/W1847586980","https://openalex.org/W2012095206","https://openalex.org/W2055261595","https://openalex.org/W2073089243","https://openalex.org/W2101222264","https://openalex.org/W2119271160","https://openalex.org/W2122226347","https://openalex.org/W2123504579","https://openalex.org/W2125055259","https://openalex.org/W2149274049","https://openalex.org/W2157349061","https://openalex.org/W2171634548","https://openalex.org/W2466512847","https://openalex.org/W4236506014"],"related_works":["https://openalex.org/W3160314615","https://openalex.org/W3011161512","https://openalex.org/W2978828483","https://openalex.org/W2928278548","https://openalex.org/W2537489883","https://openalex.org/W2041550843","https://openalex.org/W2017644937","https://openalex.org/W1976515580","https://openalex.org/W1971040605","https://openalex.org/W1523103140"],"abstract_inverted_index":{"The":[0,28],"early":[1],"identification":[2],"of":[3,11,21,70,76,100,135,141,147,150,163],"applications":[4,54,72,106],"through":[5],"the":[6,12,39,45,77,93,101,105,112,115,131,136,161,170],"observation":[7],"and":[8,24,85,133,160],"fast":[9],"analysis":[10],"associated":[13,78],"packet":[14,83],"flows":[15],"is":[16,62,96,119,144,173],"a":[17,124,145,176],"critical":[18],"building":[19],"block":[20],"intrusion":[22],"detection":[23],"policy":[25],"enforcement":[26],"systems.":[27],"simple":[29],"techniques":[30,68,90],"currently":[31],"used":[32,156],"in":[33,65],"practice,":[34],"such":[35,81],"as":[36,82,123],"looking":[37],"at":[38,44],"transport":[40],"port":[41,57],"numbers":[42,58],"or":[43],"application":[46],"payload,":[47],"are":[48,166],"increasingly":[49],"less":[50],"effective":[51,168],"for":[52,157],"new":[53,139],"using":[55],"random":[56],"and/or":[59],"encryption.Therefore,":[60],"there":[61],"increasing":[63],"interest":[64],"machine":[66],"learning":[67],"capable":[69],"identifying":[71],"by":[73,104],"examining":[74],"features":[75],"traffic":[79,102],"process":[80],"lengths":[84],"interarrival":[86],"times.":[87],"However,":[88],"these":[89],"require":[91],"that":[92,153],"classification":[94,137,159],"algorithm":[95],"trained":[97,171],"with":[98],"examples":[99],"generated":[103],"to":[107],"be":[108,155],"identified,":[109],"possibly":[110],"on":[111,175],"link":[113],"where":[114],"classifier":[116,127,172],"will":[117],"operate.This":[118],"an":[120],"important":[121],"issue,":[122],"pre-trained":[125],"portable":[126],"would":[128],"greatly":[129],"facilitate":[130],"deployment":[132],"management":[134],"infrastructure.The":[138],"contribution":[140],"this":[142],"paper":[143],"comparison":[146],"different":[148,177],"sets":[149],"per-flow":[151],"attributes":[152],"can":[154],"flow":[158],"indication":[162],"which":[164],"ones":[165],"more":[167],"when":[169],"operated":[174],"link.":[178]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2101357498","counts_by_year":[{"year":2012,"cited_by_count":1}],"updated_date":"2024-12-07T13:47:54.279079","created_date":"2016-06-24"}