{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:25:12Z","timestamp":1742934312682,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031563256"},{"type":"electronic","value":"9783031563263"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-56326-3_10","type":"book-chapter","created":{"date-parts":[[2024,4,23]],"date-time":"2024-04-23T07:02:12Z","timestamp":1713855732000},"page":"131-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detecting Web Tracking at the Network Layer"],"prefix":"10.1007","author":[{"given":"Maximilian","family":"Wittig","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Do\u011fan","family":"Kesdo\u011fan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,4,24]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","unstructured":"Acar, G., Eubank, C., Englehardt, S., Juarez, M., Narayanan, A., Diaz, C.: The web never forgets: persistent tracking mechanisms in the wild. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 674\u2013689 (2014). https:\/\/doi.org\/10.1145\/2660267.2660347","DOI":"10.1145\/2660267.2660347"},{"issue":"4","key":"10_CR2","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1007\/s12525-020-00437-0","volume":"31","author":"D Agogo","year":"2020","unstructured":"Agogo, D.: Invisible market for online personal data: an examination. Electron. Mark. 31(4), 989\u20131010 (2020). https:\/\/doi.org\/10.1007\/s12525-020-00437-0","journal-title":"Electron. Mark."},{"key":"10_CR3","doi-asserted-by":"publisher","unstructured":"Akbari, I., et al.: A look behind the curtain: traffic classification in an increasingly encrypted web. In: Proceedings of the ACM on Measurement and Analysis of Computing Systems, vol. 5, no. 1 (2021). https:\/\/doi.org\/10.1145\/3447382","DOI":"10.1145\/3447382"},{"key":"10_CR4","doi-asserted-by":"publisher","unstructured":"Bekos, P., Papadopoulos, P., Markatos, E.P., Kourtellis, N.: The Hitchhiker\u2019s guide to facebook web tracking with invisible pixels and click IDs. In: Proceedings of the ACM Web Conference 2023 (2023).https:\/\/doi.org\/10.1145\/3543507.3583311","DOI":"10.1145\/3543507.3583311"},{"key":"10_CR5","doi-asserted-by":"publisher","unstructured":"Bhagavatula, S., Dunn, C., Kanich, C., Gupta, M., Ziebart, B.: Leveraging machine learning to improve unwanted resource filtering. In: Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, pp. 95\u2013102 (2014). https:\/\/doi.org\/10.1145\/2666652.2666662","DOI":"10.1145\/2666652.2666662"},{"key":"10_CR6","unstructured":"Brave: Fingerprint randomization (2020). https:\/\/brave.com\/privacy-updates\/3-fingerprint-randomization\/"},{"issue":"8","key":"10_CR7","doi-asserted-by":"publisher","first-page":"1476","DOI":"10.1109\/JPROC.2016.2637878","volume":"105","author":"T Bujlow","year":"2017","unstructured":"Bujlow, T., Carela-Espa\u00f1ol, V., Sol\u00e9-Pareta, J., Barlet-Ros, P.: A survey on web tracking: mechanisms, implications, and defenses. Proc. IEEE 105(8), 1476\u20131510 (2017). https:\/\/doi.org\/10.1109\/JPROC.2016.2637878","journal-title":"Proc. IEEE"},{"key":"10_CR8","doi-asserted-by":"publisher","unstructured":"Chen, Q., Ilia, P., Polychronakis, M., Kapravelos, A.: Cookie swap party: abusing first-party cookies for web tracking. In: Proceedings of the Web Conference 2021, pp. 2117\u20132129 (2021). https:\/\/doi.org\/10.1145\/3442381.3449837","DOI":"10.1145\/3442381.3449837"},{"key":"10_CR9","unstructured":"Demir, N., Theis, D., Urban, T., Pohlmann, N.: Towards understanding CNAME based first-party cookie tracking in the field. In: GI Sicherheit 2022 (2022)"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"394","DOI":"10.2478\/popets-2021-0053","volume":"3","author":"Y Dimova","year":"2021","unstructured":"Dimova, Y., Acar, G., Olejnik, L., Joosen, W., Van Goethem, T.: The CNAME of the game: large-scale analysis of DNS-based tracking evasion. Proc. Priv. Enhanc. Technol. 3, 394\u2013412 (2021). https:\/\/doi.org\/10.2478\/popets-2021-0053","journal-title":"Proc. Priv. Enhanc. Technol."},{"key":"10_CR11","doi-asserted-by":"publisher","unstructured":"Englehardt, S., Narayanan, A.: Online tracking: a 1-million-site measurement and analysis. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1388\u20131401 (2016).https:\/\/doi.org\/10.1145\/2976749.2978313","DOI":"10.1145\/2976749.2978313"},{"key":"10_CR12","doi-asserted-by":"publisher","unstructured":"Fathi-Kazerooni, S., Kaymak, Y., Rojas-Cessa, R.: Tracking user application activity by using machine learning techniques on network traffic. In: 2019 International Conference on Artificial Intelligence in Information and Communication, pp. 405\u2013410 (2019). https:\/\/doi.org\/10.1109\/ICAIIC.2019.8669040","DOI":"10.1109\/ICAIIC.2019.8669040"},{"key":"10_CR13","doi-asserted-by":"publisher","unstructured":"Gugelmann, D., Happe, M., Ager, B., Lenders, V.: An automated approach for complementing ad blockers\u2019 blacklists. In: Proceedings on Privacy Enhancing Technologies, pp. 282\u2013298. No.\u00a02 (2015). https:\/\/doi.org\/10.1515\/popets-2015-0018","DOI":"10.1515\/popets-2015-0018"},{"key":"10_CR14","unstructured":"Hayes, J., Danezis, G.: K-Fingerprinting: a robust scalable website fingerprinting technique. In: Proceedings of the 25th USENIX Conference on Security Symposium, pp. 1187\u20131203 (2016)"},{"key":"10_CR15","doi-asserted-by":"publisher","unstructured":"Iqbal, U., Shafiq, Z., Qian, Z.: The ad wars: retrospective measurement and analysis of anti-adblock filter lists. In: Proceedings of the 2017 Internet Measurement Conference, pp. 171\u2013183 (2017). https:\/\/doi.org\/10.1145\/3131365.3131387","DOI":"10.1145\/3131365.3131387"},{"key":"10_CR16","doi-asserted-by":"publisher","unstructured":"Iqbal, U., Snyder, P., Zhu, S., Livshits, B., Qian, Z., Shafiq, Z.: AdGraph: a graph-based approach to ad and tracker blocking. In: 2020 IEEE Symposium on Security and Privacy, pp. 763\u2013776 (2020). https:\/\/doi.org\/10.1109\/SP40000.2020.00005","DOI":"10.1109\/SP40000.2020.00005"},{"key":"10_CR17","doi-asserted-by":"publisher","unstructured":"Jha, N., Trevisan, M., Vassio, L., Mellia, M.: The internet with privacy policies: measuring the web upon consent. ACM Trans. Web 16(3) (2022). https:\/\/doi.org\/10.1145\/3555352","DOI":"10.1145\/3555352"},{"key":"10_CR18","doi-asserted-by":"publisher","unstructured":"Ma, Q., Huang, W., Jin, Y., Mao, J.: Encrypted traffic classification based on traffic reconstruction. In: 2021 4th International Conference on Artificial Intelligence and Big Data, pp. 572\u2013576 (2021).https:\/\/doi.org\/10.1109\/ICAIBD51990.2021.9459072","DOI":"10.1109\/ICAIBD51990.2021.9459072"},{"key":"10_CR19","doi-asserted-by":"publisher","unstructured":"Mayer, J.R., Mitchell, J.C.: Third-party web tracking: policy and technology. In: 2012 IEEE Symposium on Security and Privacy, pp. 413\u2013427 (2012). https:\/\/doi.org\/10.1109\/SP.2012.47","DOI":"10.1109\/SP.2012.47"},{"key":"10_CR20","doi-asserted-by":"publisher","unstructured":"Mohajeri Moghaddam, H., et al.: Watching you watch: the tracking ecosystem of over-the-top TV streaming devices. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 131\u2013147 (2019). https:\/\/doi.org\/10.1145\/3319535.3354198","DOI":"10.1145\/3319535.3354198"},{"key":"10_CR21","doi-asserted-by":"publisher","unstructured":"Panchenko, A., Niessen, L., Zinnen, A., Engel, T.: Website fingerprinting in onion routing based anonymization networks. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, pp. 103\u2013114 (2011). https:\/\/doi.org\/10.1145\/2046556.2046570","DOI":"10.1145\/2046556.2046570"},{"key":"10_CR22","doi-asserted-by":"publisher","unstructured":"Papadogiannakis, E., Papadopoulos, P., Kourtellis, N., Markatos, E.P.: User tracking in the post-cookie era: how websites bypass GDPR consent to track users. In: Proceedings of the Web Conference 2021, pp. 2130\u20132141 (2021). https:\/\/doi.org\/10.1145\/3442381.3450056","DOI":"10.1145\/3442381.3450056"},{"key":"10_CR23","unstructured":"Roesner, F., Kohno, T., Wetherall, D.: Detecting and defending against third-party tracking on the web. In: Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, pp. 155\u2013168 (2012)"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Shuba, A., Markopoulou, A., Shafiq, Z.: NoMoAds: effective and efficient cross-app mobile ad-blocking. Proc. Priv. Enhanc. Technol. (4) (2018)","DOI":"10.1515\/popets-2018-0035"},{"key":"10_CR25","unstructured":"Siby, S., Iqbal, U., Englehardt, S., Shafiq, Z., Troncoso, C.: WebGraph: capturing advertising and tracking information flows for robust blocking. In: 31st USENIX Security Symposium, pp. 2875\u20132892 (2022)"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Siby, S., Juarez, M., Diaz, C., Vallina-Rodriguez, N., Troncoso, C.: Encrypted DNS $$->$$ privacy? A traffic analysis perspective. In: Network and Distributed System Security Symposium (2020)","DOI":"10.14722\/ndss.2020.24301"},{"key":"10_CR27","doi-asserted-by":"publisher","unstructured":"Sirinam, P., Juarez, M., Imani, M., Wright, M.: Deep fingerprinting: undermining website fingerprinting defenses with deep learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (2018). https:\/\/doi.org\/10.1145\/3243734.3243768","DOI":"10.1145\/3243734.3243768"},{"key":"10_CR28","doi-asserted-by":"publisher","unstructured":"Sj\u00f6sten, A., Snyder, P., Pastor, A., Papadopoulos, P., Livshits, B.: Filter list generation for underserved regions. In: Proceedings of The Web Conference 2020, pp. 1682\u20131692 (2020). https:\/\/doi.org\/10.1145\/3366423.3380239","DOI":"10.1145\/3366423.3380239"},{"key":"10_CR29","doi-asserted-by":"publisher","DOI":"10.1145\/3392144","author":"P Snyder","year":"2020","unstructured":"Snyder, P., Vastel, A., Livshits, B.: Who filters the filters: understanding the growth, usefulness and efficiency of crowdsourced ad blocking. SIGMETRICS (2020). https:\/\/doi.org\/10.1145\/3392144","journal-title":"SIGMETRICS"},{"key":"10_CR30","doi-asserted-by":"publisher","first-page":"129","DOI":"10.2478\/popets-2020-0021","volume":"2","author":"J Varmarken","year":"2020","unstructured":"Varmarken, J., Le, H., Shuba, A., Markopoulou, A., Shafiq, Z.: The TV is smart and full of trackers: measuring smart TV advertising and tracking. Proc. Priv. Enhanc. Technol. 2, 129\u2013154 (2020). https:\/\/doi.org\/10.2478\/popets-2020-0021","journal-title":"Proc. Priv. Enhanc. Technol."},{"key":"10_CR31","unstructured":"Yuan, S., Abidin, A.Z., Sloan, M., Wang, J.: Internet advertising: an interplay among advertisers, online publishers, ad exchanges and web users. arXiv: 1206.1754 (2012)"},{"key":"10_CR32","unstructured":"Zuboff, S.: The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs (2018)"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-56326-3_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,23]],"date-time":"2024-04-23T07:05:01Z","timestamp":1713855901000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-56326-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031563256","9783031563263"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-56326-3_10","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"24 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poznan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"38","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifipsec2023.psnc.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"84","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}