{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:42:52Z","timestamp":1725471772840},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540478201"},{"type":"electronic","value":"9783540478232"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11909033_3","type":"book-chapter","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T10:51:56Z","timestamp":1160563916000},"page":"22-32","source":"Crossref","is-referenced-by-count":16,"title":["On the Privacy Risks of Publishing Anonymized IP Network Traces"],"prefix":"10.1007","author":[{"given":"D.","family":"Koukis","sequence":"first","affiliation":[]},{"given":"S.","family":"Antonatos","sequence":"additional","affiliation":[]},{"given":"K. G.","family":"Anagnostakis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Google\u2019s directory, http:\/\/directory.google.com"},{"key":"3_CR2","unstructured":"The internet traffic archive, http:\/\/www.acm.org\/sigs\/sigcomm\/ITA"},{"key":"3_CR3","unstructured":"NLANR network traffic packet header traces, http:\/\/pma.nlanr.net\/Traces\/"},{"key":"3_CR4","unstructured":"Nlanr passive measurement and analysis, http:\/\/pma.nlanr.net\/PMA\/"},{"key":"3_CR5","unstructured":"Remote OS detection via TCP\/IP Stack FingerPrinting (June 2002), http:\/\/www.insecure.org\/nmap\/nmap-fingerprinting-article.html"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Anagnostakis, K.G., Ioannidis, S., Miltchev, S., Ioannidis, J., Greenwald, M.B., Smith, J.M.: Efficient packet monitoring for network management. In: Proceedings of the 8th IEEE\/IFIP Network Operations and Management Symposium (NOMS), April 2002, pp. 423\u2013436 (2002)","DOI":"10.1109\/NOMS.2002.1015599"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Berners-Lee, T., Fielding, R., Frystyk, H.: RFC 1945: Hypertext Transfer Protocol \u2014 HTTP\/1.0 (May 1996)","DOI":"10.17487\/rfc1945"},{"issue":"1\u20136","key":"3_CR8","first-page":"257","volume":"33","author":"B.E. Brewington","year":"2000","unstructured":"Brewington, B.E., Cybenko, G.: How dynamic is the Web?. Computer Networks (Amsterdam, Netherlands: 1999)\u00a033(1\u20136), 257\u2013276 (2000)","journal-title":"Computer Networks (Amsterdam, Netherlands: 1999)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Fielding, R., Gettys, J., Mogul, J., Nielsen, H., Berners-Lee, T.: Hypertext transfer protocol - HTTP\/1.1. RFC 2616 (June 1999)","DOI":"10.17487\/rfc2616"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/3-540-36467-6_13","volume-title":"Privacy Enhancing Technologies","author":"A. Hintz","year":"2003","unstructured":"Hintz, A.: Fingerprinting websites using traffic analysis. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 171\u2013178. Springer, Heidelberg (2003)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Jiang, H., Dovrolis, C.: Passive estimation of tcp round-trip times. Computer Communications Review (July 2002)","DOI":"10.1145\/571697.571725"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Jin, S., Bestavros, A.: Sources and characteristics of web temporal locality. In: MASCOTS, pp. 28\u201335 (2000)","DOI":"10.1109\/MASCOT.2000.876426"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Mathis, M., Semke, J., Mahdavi, J., Ott, T.: The macroscopic behavior of the TCP congestion avoidance algorithm. ACM Computer Communication Review\u00a027(3) (July 1997)","DOI":"10.1145\/263932.264023"},{"key":"3_CR14","unstructured":"Minshall, G.: Tcpdpriv: Program for eliminating confidential information from traces (2005), http:\/\/ita.ee.lbl.gov\/html\/contrib\/tcpdpriv.html"},{"key":"3_CR15","unstructured":"Mogul, J.: Trace anonymization misses the point. Presentation on WWW, Panel on Web Measurements (2002)"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Pang, R., Paxson, V.: A High-Level Programming Environment for Packet Trace Anonymization and Transformation. In: Proceedings of the ACM SIGCOMM Conference (August 2003)","DOI":"10.1145\/863955.863994"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Pang, R., Allman, M., Paxson, V., Lee, J.: The devil and packet trace anonymization (January 2006)","DOI":"10.1145\/1111322.1111330"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Paxson, V., Floyd, S.: Wide-area traffic: the failure of Poisson modeling. In: Proceedings of ACM SIGCOMM, pp. 257\u2013268 (August 1994)","DOI":"10.1145\/190314.190338"},{"key":"3_CR19","unstructured":"Sun, Q., Simon, D.R., Wang, Y., Russell, W., Padmanabhan, V.N., Qiu, L.: Statistical identification of encrypted web browsing traffic. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA (May 2002)"},{"key":"3_CR20","unstructured":"Ylonen, T.: Thoughts on how to mount an attack on tcpdprivs \u201c-a50\u201d option, http:\/\/ita.ee.lbl.gov\/html\/contrib\/attack50\/attack50.html"}],"container-title":["Lecture Notes in Computer Science","Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11909033_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,21]],"date-time":"2019-04-21T12:36:10Z","timestamp":1555850170000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11909033_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540478201","9783540478232"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11909033_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}