{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:09:23Z","timestamp":1743131363753,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031261176"},{"type":"electronic","value":"9783031261183"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-26118-3_11","type":"book-chapter","created":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T10:03:25Z","timestamp":1675159405000},"page":"149-161","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CPSOCKS: Cross-Platform Privacy Overlay Adapter Based on\u00a0SOCKSv5 Protocol"],"prefix":"10.1007","author":[{"given":"Gabriel-Cosmin","family":"Apostol","sequence":"first","affiliation":[]},{"given":"Alexandra-Elena","family":"Mocanu","sequence":"additional","affiliation":[]},{"given":"Bogdan-Costel","family":"Mocanu","sequence":"additional","affiliation":[]},{"given":"Dragos-Mihai","family":"Radulescu","sequence":"additional","affiliation":[]},{"given":"Florin","family":"Pop","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,1]]},"reference":[{"key":"11_CR1","unstructured":"Ahsan, K., Kundur, D.: Practical data hiding in TCP\/IP. In: Proceedings of the Workshop on Multimedia Security at ACM Multimedia, vol. 2, no. 7, pp. 1\u20138. ACM Press, New York (2002)"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Apostol, G.-C.: Hiding cloud network access patterns for enhanced privacy. In: 2022 21st RoEduNet Conference: Networking in Education and Research (RoEduNet), pp. 1\u20135. IEEE (2022)","DOI":"10.1109\/RoEduNet57163.2022.9920974"},{"key":"11_CR3","unstructured":"Arthur, M.: Steganology and information hiding: stegop2py: embedding data in TCP and IP headers (2021)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Berghel, H.: Hiding data, forensics, and anti-forensics. In: Communications of the ACM, vol. 50, no. 4, pp. 15\u201320 (2007)","DOI":"10.1145\/1232743.1232761"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/3-540-44702-4_4","volume-title":"Designing Privacy Enhancing Technologies","author":"I Clarke","year":"2001","unstructured":"Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: a distributed anonymous information storage and retrieval system. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 46\u201366. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44702-4_4"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second- generation onion router. Technical report, Naval Research Lab Washington DC (2004)","DOI":"10.21236\/ADA465464"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Dusi, M., Gringoli, F., Salgarelli, L.: A preliminary look at the privacy of SSH tunnels. In: 2008 Proceedings of 17th International Conference on Computer Communications and Networks, pp. 1\u20137. IEEE (2008)","DOI":"10.1109\/ICCCN.2008.ECP.122"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Dusi, M., et al.: Detection of encrypted tunnels across network boundaries. In: 2008 IEEE International Conference on Communications, pp. 1738\u20131744. IEEE (2008)","DOI":"10.1109\/ICC.2008.334"},{"key":"11_CR9","unstructured":"Gray III, J.W.: Countermeasures and tradeoffs for a class of covert timing channels. Technical report (1994)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Kemmerer, R.A., Porras, P.A.: Covert flow trees: a visual approach to analyzing covert storage channels. In: IEEE Transactions on Software Engineering, vol. 17, no. 11, p. 1166 (1991)","DOI":"10.1109\/32.106972"},{"key":"11_CR11","unstructured":"Kundur, D., Ahsan, K.: Practical Internet steganography: data hiding in IP. In: Proceedings of the Texas WKSP. Security of Information Systems (2003)"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Leech, M., et al.: RFC1928: SOCKS Protocol Version 5. (1996)","DOI":"10.17487\/rfc1928"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Leech, M., et al.: SOCKS protocol version 5. Technical report (1996)","DOI":"10.17487\/rfc1928"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/978-3-030-24907-6_33","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"H Lin","year":"2019","unstructured":"Lin, H., Liu, G., Yan, Z.: Detection of application-layer tunnels with rules and machine learning. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11611, pp. 441\u2013455. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-24907-6_33"},{"issue":"21","key":"11_CR15","doi-asserted-by":"publisher","first-page":"10844","DOI":"10.3390\/app122110844","volume":"12","author":"BC Mocanu","year":"2022","unstructured":"Mocanu, B.C., et al.: ODIN IVR-interactive solution for emergency calls handling. Appl. Sci. 12(21), 10844 (2022)","journal-title":"Appl. Sci."},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Mocanu, B., et al.: SPIDER: a bio-inspired structured peer-to-peer overlay for data dissemination. In: 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp. 291\u2013295. IEEE (2015)","DOI":"10.1109\/3PGCIC.2015.121"},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.future.2016.05.022","volume":"80","author":"A Poenaru","year":"2018","unstructured":"Poenaru, A., Istrate, R., Pop, F.: AFT: adaptive and fault tolerant peer-to-peer overlay\u2014A user-centric solution for data sharing. Futur. Gener. Comput. Syst. 80, 583\u2013595 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"9","key":"11_CR18","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1080\/17517575.2015.1100756","volume":"10","author":"F Pop","year":"2016","unstructured":"Pop, F., et al.: Trust models for efficient communication in mobile cloud computing and their applications to e-commerce. Enterp. Inf. Syst. 10(9), 982\u20131000 (2016)","journal-title":"Enterp. Inf. Syst."},{"issue":"4","key":"11_CR19","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1109\/TCE.2019.2944882","volume":"65","author":"A Sengupta","year":"2019","unstructured":"Sengupta, A., Rathor, M.: IP core steganography for protecting DSP kernels used in CE systems. IEEE Trans. Consum. Electron. 65(4), 506\u2013515 (2019)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"3","key":"11_CR20","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/COMST.2007.4317620","volume":"9","author":"S Zander","year":"2007","unstructured":"Zander, S., Armitage, G., Branch, P.: A survey of covert channels and countermeasures in computer network protocols. IEEE Commun. Surv. Tutorials 9(3), 44\u201357 (2007)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"11_CR21","unstructured":"Zantout, B., Haraty, R., et al.: I2P data communication system. In: Proceedings of the ICN. Citeseer, pp. 401\u2013409 (2011)"}],"container-title":["Lecture Notes in Computer Science","Green, Pervasive, and Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-26118-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T10:06:39Z","timestamp":1675159599000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-26118-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031261176","9783031261183"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-26118-3_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GPC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Green, Pervasive, and Cloud Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chengdu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gpc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2022.gpc-conf.org\/home.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"104","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}