{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T13:02:51Z","timestamp":1772542971611,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642390760","type":"print"},{"value":"9783642390777","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39077-7_11","type":"book-chapter","created":{"date-parts":[[2013,6,3]],"date-time":"2013-06-03T21:39:59Z","timestamp":1370295599000},"page":"205-224","source":"Crossref","is-referenced-by-count":23,"title":["The Need for Flow Fingerprints to Link Correlated Network Flows"],"prefix":"10.1007","author":[{"given":"Amir","family":"Houmansadr","sequence":"first","affiliation":[]},{"given":"Nikita","family":"Borisov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Bavier, A., Bowman, M., Chun, B., Culler, D., Karlin, S., Muir, S., Peterson, L., Roscoe, T., Spalink, T., Wawrzoniak, M.: Operating Systems Support for Planetary-Scale Network Services. In: NSDI (2004)"},{"key":"11_CR2","unstructured":"Benedetto, S., Biglieri, E.: Principles of Digital Transmission: With Wireless Applications. Information Technology: Transmission, Processing, and Storage. Kluwer Academic\/Plenum Press (1999)"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-540-30143-1_14","volume-title":"Recent Advances in Intrusion Detection","author":"A. Blum","year":"2004","unstructured":"Blum, A., Song, D., Venkataraman, S.: Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 258\u2013277. Springer, Heidelberg (2004)"},{"key":"11_CR4","unstructured":"The coded modulation library (cml), \n                  \n                    http:\/\/www.iterativesolutions.com\/Matlab.html"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Danezis, G.: The Traffic Analysis of Continuous-Time Mixes. In: PETS (2004)","DOI":"10.1007\/11423409_3"},{"key":"11_CR6","unstructured":"Dingledine, R., Mathewson, N.: Tor Protocol Specification, \n                  \n                    https:\/\/gitweb.torproject.org\/torspec.git?a=blob_plain;hb=HEAD;f=tor-spec.txt"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: USENIX Security Symposium (2004)","DOI":"10.21236\/ADA465464"},{"key":"11_CR8","unstructured":"Dolinar, S., Divsalar, D., Pollara, F.: Code Performance as a Function of Block Size. Technical report, TMO Progress (1998)"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/3-540-36084-0_2","volume-title":"Recent Advances in Intrusion Detection","author":"D.L. Donoho","year":"2002","unstructured":"Donoho, D.L., Flesia, A.G., Shankar, U., Paxson, V., Coit, J., Staniford, S.: Multiscale Stepping-stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol.\u00a02516, pp. 17\u201335. Springer, Heidelberg (2002)"},{"key":"11_CR10","unstructured":"Houmansadr, A., Borisov, N.: SWIRL: A Scalable Watermark to Detect Correlated Network Flows. In: NDSS (2011)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Houmansadr, A., Borisov, N.: Towards Improving Network Flow Watermarks using the Repeat-accumulate Codes. In: ICASSP (2011)","DOI":"10.1109\/ICASSP.2011.5946866"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Houmansadr, A., Kiyavash, N., Borisov, N.: Multi-Flow Attack Resistant Watermarks for Network Flows. In: ICASSP (2009)","DOI":"10.1109\/ICASSP.2009.4959879"},{"key":"11_CR13","unstructured":"Houmansadr, A., Kiyavash, N., Borisov, N.: RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows. In: NDSS (2009)"},{"key":"11_CR14","unstructured":"Houmansadr, A., Kiyavash, N., Borisov, N.: Non-blind Watermarking of Network Flows. CRR, arXiv:1203.2273v1 (2012)"},{"key":"11_CR15","unstructured":"Kiyavash, N., Houmansadr, A., Borisov, N.: Multi-Flow Attacks Against Network Flow Watermarking Schemes. In: USENIX Security Symposium (2008)"},{"key":"11_CR16","unstructured":"Lin, Z., Hopper, N.: New Attacks on Timing-based Network Flow Watermarks. In: USENIX Security (2012)"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Ling, Z., Luo, J., Yu, W., Fu, X., Xuan, D., Jia, W.: A New Cell Counter Based Attack Against Tor. In: CCS, New York, USA (2009)","DOI":"10.1145\/1653662.1653732"},{"key":"11_CR18","unstructured":"Mackay, D.J.C.: Information Theory, Inference and Learning Algorithms, 1st edn. Cambridge University Press (June 2003)"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Pyun, Y., Park, Y., Wang, X., Reeves, D.S., Ning, P.: Tracing Traffic through Intermediate Hosts that Repacketize Flows. In: INFOCOM (2007)","DOI":"10.1109\/INFCOM.2007.80"},{"key":"11_CR20","unstructured":"Staniford-Chen, S., Heberlein, L.T.: Holding Intruders Accountable on the Internet. In: IEEE S&P (1995)"},{"key":"11_CR21","volume-title":"Introduction to Coding Theory","author":"J.H. Lint van","year":"1998","unstructured":"van Lint, J.H.: Introduction to Coding Theory, 3rd edn. Springer, Berlin (1998)","edition":"3"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Wang, X., Chen, S., Jajodia, S.: Tracking Anonymous Peer-to-peer VoIP Calls on the Internet. In: CCS (2005)","DOI":"10.1145\/1102120.1102133"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Wang, X., Chen, S., Jajodia, S.: Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems. In: IEEE S&P (2007)","DOI":"10.1109\/SP.2007.30"},{"key":"11_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-45853-0_15","volume-title":"Computer Security - ESORICS 2002","author":"X. Wang","year":"2002","unstructured":"Wang, X., Reeves, D.S., Wu, S.F.: Inter-Packet Delay Based Correlation for Tracing Encrypted Connections Through Stepping Stones. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol.\u00a02502, pp. 244\u2013263. Springer, Heidelberg (2002)"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Wang, X., Reeves, D.S.: Robust Correlation of Encrypted Attack Traffic Through Stepping Stones by Manipulation of Interpacket Delays. In: CCS (2003)","DOI":"10.1145\/948109.948115"},{"key":"11_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/10722599_12","volume-title":"Computer Security - ESORICS 2000","author":"K. Yoda","year":"2000","unstructured":"Yoda, K., Etoh, H.: Finding a Connection Chain for Tracing Intruders. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol.\u00a01895, pp. 191\u2013205. Springer, Heidelberg (2000)"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Yu, W., Fu, X., Graham, S., Xuan, D., Zhao, W.: DSSS-Based Flow Marking Technique for Invisible Traceback. In: IEEE S&P (2007)","DOI":"10.1109\/SP.2007.14"},{"key":"11_CR28","unstructured":"Zhang, Y., Paxson, V.: Detecting Stepping Stones. In: USENIX Security Symposium (2000)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39077-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T13:12:03Z","timestamp":1557753123000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39077-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642390760","9783642390777"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39077-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}