{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T15:40:52Z","timestamp":1726760452813},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/cns.2015.7346855","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T22:19:48Z","timestamp":1449613188000},"page":"433-441","source":"Crossref","is-referenced-by-count":66,"title":["I know what you did on your smartphone: Inferring app usage over encrypted data traffic"],"prefix":"10.1109","author":[{"given":"Qinglong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Amir","family":"Yahyavi","sequence":"additional","affiliation":[]},{"given":"Bettina","family":"Kemme","sequence":"additional","affiliation":[]},{"given":"Wenbo","family":"He","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714589"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247689"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180437"},{"key":"ref13","article-title":"Whos winning, ios or android? all the numbers, all in one place","author":"mccracken","year":"2013","journal-title":"Time"},{"key":"ref14","article-title":"Powerspy: Location tracking using mobile device power analysis","author":"michalevsky","year":"2015","journal-title":"arXiv preprint arXiv 1502 01032"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2040096"},{"year":"2014","key":"ref17","article-title":"Fact Sheets Mobile Technology Fact Sheet"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2013.6449413"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462099"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699119"},{"journal-title":"ComScore Reports","article-title":"Smartphone Subscriber Market Share","year":"2014","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007607513941"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.412"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.100213.130553"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2070481.2070550"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.20"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814453"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref20","first-page":"19","article-title":"Statistical identification of encrypted web browsing traffic","author":"sun","year":"2002","journal-title":"Security and Privacy 2002 Proceedings 2002 IEEE Symposium on"},{"key":"ref22","first-page":"35","article-title":"Spot me if you can: Uncovering spoken phrases in encrypted voip conversations","author":"wright","year":"2008","journal-title":"Security and Privacy 2008 SP 2008 IEEE Symposium on"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2014.30"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.121013.121473"},{"key":"ref23","first-page":"237","article-title":"Traffic morphing: An efficient defense against statistical traffic analysis","author":"wright","year":"2009","journal-title":"Proc of Network and Distributed Security Svmposium IEEE"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.61"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998425"}],"event":{"name":"2015 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2015,9,28]]},"location":"Florence, Italy","end":{"date-parts":[[2015,9,30]]}},"container-title":["2015 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7336674\/7346791\/07346855.pdf?arnumber=7346855","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T01:23:26Z","timestamp":1490405006000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7346855\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/cns.2015.7346855","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}