{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:11:43Z","timestamp":1729645903036,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1109\/ccnc.2016.7444875","type":"proceedings-article","created":{"date-parts":[[2016,3,31]],"date-time":"2016-03-31T17:13:05Z","timestamp":1459444385000},"page":"765-773","source":"Crossref","is-referenced-by-count":0,"title":["Simple and compact flow fingerprinting robust to transit through low-latency anonymous networks"],"prefix":"10.1109","author":[{"family":"Yang Xue","sequence":"first","affiliation":[]},{"given":"Eugene Y.","family":"Vasserman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"An empirical study of a vulnerability metric aggregation method","author":"zhang","year":"2011","journal-title":"SAM\/STMACIP"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22424-9_2"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24123-4_8"},{"key":"ref30","article-title":"Privacy preserved rule-based risk analysis through secure multiparty computation","author":"liu","year":"2015","journal-title":"AsiaJCIS"},{"key":"ref36","article-title":"After we knew it: Empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud","author":"zhang","year":"2014","journal-title":"ASIACCS"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.23.465"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-130475"},{"key":"ref10","article-title":"Netcamo: Camouflaging network traffic for gos-guaranteed mission critical applications","volume":"31","author":"guan","year":"2001","journal-title":"Systems Man and Cybernetics Part A Systems and Humans IEEE Transactions on"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27809-2_25"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382260"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"ref15","article-title":"RAINBOW: A robust and invisible non-blind watermark for network flows","author":"houmansadr","year":"2009","journal-title":"NDSS"},{"key":"ref16","article-title":"SWIRL: A scalable watermark to detect correlated network flows","author":"houmansadr","year":"2011","journal-title":"NDSS"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046732"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39077-7_11"},{"key":"ref19","article-title":"Multi-flow attacks against network flow watermarking schemes","author":"kiyavash","year":"2008","journal-title":"USENIX Security Symposium"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660368"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.80"},{"key":"ref27","article-title":"Effective attacks and provable defenses for website fingerprinting","author":"wang","year":"2014","journal-title":"USENIX Security Symposium"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1698750.1698753"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.14"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2015.7166562"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.30"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_6"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-36467-6_13","article-title":"Fingerprinting websites using traffic analysis","author":"hintz","year":"2003","journal-title":"Privacy Enhancing Technologies"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"key":"ref1","article-title":"Tor: The second-generation onion router","author":"dingledine","year":"2004","journal-title":"Technical Report DTIC"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714627"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835513"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_9"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11863908_2"},{"year":"0","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660362"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"}],"event":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","start":{"date-parts":[[2016,1,9]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2016,1,12]]}},"container-title":["2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7435634\/7440162\/7444875.pdf?arnumber=7444875","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T05:45:50Z","timestamp":1498283150000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7444875\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2016.7444875","relation":{},"subject":[],"published":{"date-parts":[[2016,1]]}}}