{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:13:29Z","timestamp":1763468009934,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642154966"},{"type":"electronic","value":"9783642154973"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15497-3_15","type":"book-chapter","created":{"date-parts":[[2010,9,1]],"date-time":"2010-09-01T14:51:46Z","timestamp":1283352706000},"page":"232-248","source":"Crossref","is-referenced-by-count":18,"title":["On the Secrecy of Spread-Spectrum Flow Watermarks"],"prefix":"10.1007","author":[{"given":"Xiapu","family":"Luo","sequence":"first","affiliation":[]},{"given":"Junjie","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Perdisci","sequence":"additional","affiliation":[]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"hisao, S. (2009), http:\/\/www.okisoft.co.jp\/esc\/python\/proxy"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Altman, E., Avrachenkov, K., Barakat, C.: A stochastic model for tcp with stationary random losses. In: ACM SIGCOMM (2000)","DOI":"10.1145\/347059.347549"},{"issue":"10","key":"15_CR3","doi-asserted-by":"publisher","first-page":"3976","DOI":"10.1109\/TSP.2005.855418","volume":"53","author":"F. Cayre","year":"2005","unstructured":"Cayre, F., Fontaine, C., Furon, T.: Watermarking security: Theory and practice. IEEE Transactions on Signal Processing\u00a053(10), 3976\u20133987 (2005)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"15_CR4","unstructured":"Choi, B.: PN code generator (2000), http:\/\/www-mobile.ecs.soton.ac.uk\/bjc97r\/pnseq-1.1\/pnseq-1.1.tar.gz"},{"key":"15_CR5","unstructured":"Microsoft Corporation. Microsoft security bulletin ms09-048 (2009), http:\/\/www.microsoft.com\/technet\/security\/Bulletin\/ms09-048.mspx"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: USENIX SEC (2004)","DOI":"10.21236\/ADA465464"},{"key":"15_CR7","volume-title":"Spread Spectrum Systems","author":"R. Dixon","year":"1984","unstructured":"Dixon, R.: Spread Spectrum Systems, 2nd edn. John Wiley & Sons, Chichester (1984)","edition":"2"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/3-540-36084-0_2","volume-title":"Recent Advances in Intrusion Detection","author":"D. Donoho","year":"2002","unstructured":"Donoho, D., Flesia, A., Shankar, U., Paxson, V., Coit, J., Staniford, S.: Multiscale stepping-stone detection: detecting pairs of jittered interactive streams by exploiting maximum tolerable delay. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol.\u00a02516, p. 17. Springer, Heidelberg (2002)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Dvoretzky, A., Kiefer, J., Wolfowitz, J.: Sequential decision problems for processes with continuous time parameter testing hypotheses. Annals of Mathematical Statistics\u00a024 (1953)","DOI":"10.1214\/aoms\/1177729031"},{"key":"15_CR10","doi-asserted-by":"publisher","DOI":"10.1002\/0470871385","volume-title":"Multi-Carrier and Spread Spectrum Systems","author":"K. Fazel","year":"2003","unstructured":"Fazel, K., Kaiser, S.: Multi-Carrier and Spread Spectrum Systems. Wiley, Chichester (2003)"},{"key":"15_CR11","volume-title":"Nonparametric Statistical Inference","author":"J. Gibbons","year":"2003","unstructured":"Gibbons, J., Chakraborti, S.: Nonparametric Statistical Inference, 4th edn. CRC, Boca Raton (2003)","edition":"4"},{"key":"15_CR12","volume-title":"Shift Register Sequences (revised edition)","author":"S. Golomb","year":"1982","unstructured":"Golomb, S.: Shift Register Sequences (revised edition). Aegean Park Press, Laguna Hills (1982)"},{"key":"15_CR13","unstructured":"Haggstrom, G.: Sequential tests for exponential populations and poisson processes. Technical report, RAND Corporation (1979)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Houmansadr, A., Kiyavash, N., Borisov, N.: Multi-flow attack resistant watermarks for network flows. In: IEEE ICASSP (2009)","DOI":"10.1109\/ICASSP.2009.4959879"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Jia, W., Tso, F., Ling, Z., Fu, X., Xuan, D., Yu, W.: Blind detection of spread spectrum flow watermarks. In: IEEE INFOCOM (2009)","DOI":"10.1109\/INFCOM.2009.5062144"},{"key":"15_CR16","unstructured":"Kiyavash, N., HoumanSadr, A., Borisov, N.: Multi-flow attacks against network flow watermarking schemes. In: USENIX Security (2008)"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Luo, X., Zhang, J., Perdisci, R., Lee, W.: On the secrecy of spread-spectrum flow watermarks (2010), http:\/\/roberto.perdisci.com\/publications\/publication-files\/DSSSWM_Extended_TechReport.pdf","DOI":"10.1007\/978-3-642-15497-3_15"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Markopoulou, A., Tobagi, F., Karam, M.: Loss and delay measurements of internet backbones. Computer communications (June 2006)","DOI":"10.1016\/j.comcom.2005.07.011"},{"key":"15_CR19","unstructured":"Peng, P., Ning, P., Reeves, D.: On the secrecy of timing-based active watermarking trace-back techniques. In: IEEE Symp. on Security and Privacy (2006)"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Pyun, Y., Park, Y., Wang, X., Reeves, D., Ning, P.: Tracing traffic through intermediate hosts that repacketize flows. In: IEEE INFOCOM (2007)","DOI":"10.1109\/INFCOM.2007.80"},{"key":"15_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-540-87403-4_4","volume-title":"Recent Advances in Intrusion Detection","author":"D. Ramsbrock","year":"2008","unstructured":"Ramsbrock, D., Wang, X., Jiang, X.: A first step towards live botmaster traceback. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol.\u00a05230, pp. 59\u201377. Springer, Heidelberg (2008)"},{"key":"15_CR22","unstructured":"Reardon, J., Goldberg, I.: Improving tor using a TCP-over-DTLS tunnel. In: USENIX Security (2009)"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Tang, C., Goldberg, I.: An improved algorithm for Tor circuit scheduling. Technical report, University of Waterloo (2010)","DOI":"10.1145\/1866307.1866345"},{"key":"15_CR24","doi-asserted-by":"crossref","DOI":"10.1201\/b12509","volume-title":"Probability for Electrical and Computer Engineers","author":"C. Therrien","year":"2004","unstructured":"Therrien, C., Tummala, M.: Probability for Electrical and Computer Engineers. CRC, Boca Raton (2004)"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Turner, J.: New directions in communications (or which way to the information age?). In: IEEE Commun. Magazine (1986)","DOI":"10.1109\/MCOM.1986.1092946"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Wang, X., Chen, S., Jajodia, S.: Tracking anonymous peer-to-peer voip calls on the internet. In: ACM CCS (2005)","DOI":"10.1145\/1102120.1102133"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Wang, X., Chen, S., Jajodia, S.: Network flow watermarking attack on low-latency anonymous communication systems. In: IEEE Symp. on Security and Privacy (2007)","DOI":"10.1109\/SP.2007.30"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Yu, W., Fu, X., Graham, S., Xuan, D., Zhao, W.: DSSS-based flow marking technique for invisible traceback. In: IEEE Symp. on Security and Privacy (2007)","DOI":"10.1109\/SP.2007.14"},{"key":"15_CR29","unstructured":"Zhang, Y., Paxson, V.: Detecting stepping stones. In: USENIX Security (2000)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2010"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15497-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,7]],"date-time":"2021-11-07T21:32:50Z","timestamp":1636320770000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15497-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642154966","9783642154973"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15497-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}