{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:04:25Z","timestamp":1742393065935},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540895237"},{"type":"electronic","value":"9783540895244"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89524-4_47","type":"book-chapter","created":{"date-parts":[[2008,11,19]],"date-time":"2008-11-19T01:10:09Z","timestamp":1227057009000},"page":"465-481","source":"Crossref","is-referenced-by-count":3,"title":["Transport Layer Identification of Skype Traffic"],"prefix":"10.1007","author":[{"given":"Liang","family":"Lu","sequence":"first","affiliation":[]},{"given":"Jeffrey","family":"Horton","sequence":"additional","affiliation":[]},{"given":"Reihaneh","family":"Safavi-Naini","sequence":"additional","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"47_CR1","unstructured":"Ethereal, http:\/\/www.ethereal.com"},{"key":"47_CR2","unstructured":"http:\/\/asia-en.real.com\/guide\/radio\/list.html"},{"key":"47_CR3","unstructured":"http:\/\/service.real.com\/firewall\/rplay.html"},{"key":"47_CR4","unstructured":"http:\/\/www.microsoft.com\/windows\/windowsmedia\/serve\/firewall.aspx#portallocation"},{"key":"47_CR5","unstructured":"http:\/\/www.websense.com"},{"key":"47_CR6","first-page":"33","volume-title":"Proceedings of the 2005 Second International Workshop on Hot Topics in Peer-to-Peer Systems","author":"A. Pescape","year":"2005","unstructured":"Pescape, A., Dainottiand, A., Ventre, G.: A Packet-level Traffic Model of Startcraft. In: Proceedings of the 2005 Second International Workshop on Hot Topics in Peer-to-Peer Systems, pp. 33\u201342. IEEE, Los Alamitos (2005)"},{"key":"47_CR7","unstructured":"Anonymous. Why is Skype better than Net2Phone, ICQ, AIM, MSN, etc?, http:\/\/support.skype.com\/index.php?_a=knowledgebase&_j=questiondetails&_i=70&nav2=General"},{"key":"47_CR8","doi-asserted-by":"crossref","unstructured":"Chen, K., Huang, P., Huang, C., Lei, C.: Game Traffic Analysis: An MMORPG Perspective. In: Proceedings of NOSSDAV (2005)","DOI":"10.1145\/1065983.1065988"},{"key":"47_CR9","doi-asserted-by":"crossref","unstructured":"Suh, K., Figueiredo, R., Kurose, J., Towsley, D.: Characterizing and Detecting Skype-Relayed Traffic. In: Proceedings of IEEE Infocom, Barcelona (April 2006)","DOI":"10.1109\/INFOCOM.2006.313"},{"key":"47_CR10","volume-title":"Proceedings of 22nd IEEE International Performance, Computering and Communication Conference (IPCCC)","author":"J. Winslow","year":"2003","unstructured":"Winslow, J., Claypool, M., LaPoint, D.: Network Analysis of Counter-strike and Starcraft. In: Proceedings of 22nd IEEE International Performance, Computering and Communication Conference (IPCCC), Phoenix, Arizona, USA, April 2003. IEEE, Los Alamitos (2003)"},{"key":"47_CR11","unstructured":"McCreary, S., Claffy, K.: Trends in Wide Area IP Traffic Pattern: A View from Ames Internet Exchange. In: Proceedings of ITC Specialist Seminar on Measurement and Modeling of IP Traffic, pp. 1\u201311. Cooperative Association for Internet Data Analysis (CAIDA) (September 2000)"},{"key":"47_CR12","first-page":"101","volume-title":"Proceedings of the IEEE Infocom","author":"A. Mena","year":"2000","unstructured":"Mena, A., Heidemann, J.: An Empirical Study of Real Audio Traffic. In: Proceedings of the IEEE Infocom, Tel-Aviv, Israel, March 2000, pp. 101\u2013110. IEEE, Los Alamitos (2000)"},{"key":"47_CR13","unstructured":"Baset, S.A., Schulzrinne, H.: An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol. Technical report, Department of Computer Science. Columbia University, New York (2004)"},{"key":"47_CR14","unstructured":"Guha, S., Daswani, N., Jain, R.: An Experimental Study of the Skype Peer-to-Peer VoIP System. In: Proceedings of IPTPS 2006, Santa Barbara, CA (February 2006)"},{"key":"47_CR15","doi-asserted-by":"crossref","unstructured":"Sen, S., Spatscheck, O., Wang, D.: Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures. In: Proceedings International WWW Conference, New York, USA (2004)","DOI":"10.1145\/988672.988742"},{"key":"47_CR16","unstructured":"Skype FAQ, http:\/\/www.skype.com\/help_faq.html"},{"key":"47_CR17","first-page":"121","volume-title":"Proceedings of the 4th ACM SIGCOMM conference on Internet measurement","author":"M. Faloutsos","year":"2004","unstructured":"Faloutsos, M., Claffy, K., Karagiannis, T., Broido, A.: Transport Layer Identification of P2P Traffic. In: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, Taormina, Sicily, Italy, pp. 121\u2013134. ACM Press, New York (2004)"},{"key":"47_CR18","unstructured":"Berson, T.: Skype Security Evaluation. Technical report, Anagram Laboratories (October 2005)"},{"key":"47_CR19","unstructured":"Verso Technologies. Verso Netspective Enterprise, http:\/\/www.verso.com\/enterprise\/netspective\/netspective_brochure.pdf"},{"issue":"3","key":"47_CR20","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1109\/TNET.2005.850221","volume":"13","author":"W. Feng","year":"2005","unstructured":"Feng, W., Chang, F., Feng, W., Walpole, J.: A Traffic Characterization of Popular On-Line Games. IEEE\/ACM Transactions On Networking\u00a013(3), 488\u2013500 (2005)","journal-title":"IEEE\/ACM Transactions On Networking"}],"container-title":["Lecture Notes in Computer Science","Information Networking. Towards Ubiquitous Networking and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89524-4_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T11:05:38Z","timestamp":1557918338000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89524-4_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540895237","9783540895244"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89524-4_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}