{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:27:21Z","timestamp":1725575241077},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642181771"},{"type":"electronic","value":"9783642181788"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-18178-8_11","type":"book-chapter","created":{"date-parts":[[2011,1,15]],"date-time":"2011-01-15T16:09:47Z","timestamp":1295107787000},"page":"129-135","source":"Crossref","is-referenced-by-count":7,"title":["Video Streaming Forensic \u2013 Content Identification with Traffic Snooping"],"prefix":"10.1007","author":[{"given":"Yali","family":"Liu","sequence":"first","affiliation":[]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[]},{"given":"Dipak","family":"Ghosal","sequence":"additional","affiliation":[]},{"given":"Biswanath","family":"Mukherjee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Crotti, M., Gringoli, F., Pelosato, P., Salgarelli, L.: A statistical approach to IP-level classification of network traffic. In: IEEE International Conference on Communications, ICC 2006, vol.\u00a01, pp. 170\u2013176 (June 2006)","DOI":"10.1109\/ICC.2006.254723"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Okabe, T., Kitamura, T., Shizuno, T.: Statistical traffic identification method based on flow-level behavior for fair VoIP service. In: 1st IEEE Workshop on VoIP Management and Security, pp. 35\u201340 (April 2006)","DOI":"10.1109\/VOIPMS.2006.1638120"},{"key":"11_CR3","unstructured":"Song, D.X., Wagner, D., Tian, X.: Timing analysis of keystrokes and timing attacks on SSH. In: Proc. the 10th Conference on USENIX Security Symposium, Berkeley, CA, USA, p. 25 (2001)"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1007\/978-3-540-45146-4_34","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"B. Canvel","year":"2003","unstructured":"Canvel, B., Hiltgen, A., Vaudenay, S., Vuagnoux, M.: Password interception in a SSL\/TLS channel. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 583\u2013599. Springer, Heidelberg (2003)"},{"key":"11_CR5","unstructured":"Saponas, T.S., Lester, J., Hartung, C., Agarwal, S., Kohno, T.: Devices that tell on you: privacy trends in consumer ubiquitous computing. In: Proc. the 16th USENIX Security Symposium on USENIX Security Symposium, pp. 1\u201316 (2007)"},{"issue":"3","key":"11_CR6","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1109\/49.76626","volume":"9","author":"R. Grunenfelder","year":"1991","unstructured":"Grunenfelder, R., Cosmas, J.P., Manthorpe, S., Odinma-Okafor, A.: Characterization of video codecs as autoregressive moving average. IEEE Journal on Selected Areas in Communication\u00a09(3), 284\u2013293 (1991)","journal-title":"IEEE Journal on Selected Areas in Communication"},{"key":"11_CR7","volume-title":"A wavelet tour of signal processing","author":"S. Mallat","year":"1998","unstructured":"Mallat, S.: A wavelet tour of signal processing. Academic Press, London (1998)"},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B. Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf, B., Platt, J.C., Shawe-taylor, J., Smola, A.J., Williamson, R.C.: Estimating the support of a high-dimensional distribution. Neural Comput.\u00a013, 1443\u20131471 (2001)","journal-title":"Neural Comput."},{"key":"11_CR9","unstructured":"Video traces for network performance evaluation, \n                    \n                      http:\/\/trace.eas.asu.edu\/"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Liu, Y., Ou, C., Li, Z., Corbett, C., Mukherjee, B., Ghosal, D.: Wavelet-based traffic analysis for identifying video streams over broadband networks. In: IEEE Global Communications Conference, GLOBECOM 2008, pp. 1\u20136 (November 2008)","DOI":"10.1109\/GLOCOM.2008.ECP.338"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-18178-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,23]],"date-time":"2019-03-23T21:38:11Z","timestamp":1553377091000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-18178-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642181771","9783642181788"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-18178-8_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}