{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T06:19:57Z","timestamp":1693808397512},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2010,7,24]],"date-time":"2010-07-24T00:00:00Z","timestamp":1279929600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1007\/s10207-010-0111-4","type":"journal-article","created":{"date-parts":[[2010,7,23]],"date-time":"2010-07-23T04:31:06Z","timestamp":1279859466000},"page":"313-325","source":"Crossref","is-referenced-by-count":13,"title":["Analysis of information leakage from encrypted Skype conversations"],"prefix":"10.1007","volume":"9","author":[{"given":"Beno\u00eet","family":"Dupasquier","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Burschka","sequence":"additional","affiliation":[]},{"given":"Kieran","family":"McLaughlin","sequence":"additional","affiliation":[]},{"given":"Sakir","family":"Sezer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,7,24]]},"reference":[{"key":"111_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C., Han, J., Wang, J., Yu, P.S.: A framework for clustering evolving data streams. In: VLDB 2003: Proceedings of the 29th International Conference on Very Large Data Bases, pp. 81\u201392. Morgan Kaufmann (2003)","DOI":"10.1016\/B978-012722442-8\/50016-1"},{"key":"111_CR2","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C., Olshefski, D., Saha, D., Shae, Z.Y., Yu, P.: CSR: speaker recognition from compressed VoIP packet stream. In: ICME 2005: Proceedings of the IEEE International Conference on Multimedia & Expo, pp. 970\u2013973. IEEE Computer Society, Los Alamitos, CA, USA (2005)","DOI":"10.1109\/ICME.2005.1521586"},{"key":"111_CR3","doi-asserted-by":"crossref","DOI":"10.1002\/0471224197","volume-title":"Tracking and Kalman Filtering Made Easy","author":"E. Brookner","year":"1998","unstructured":"Brookner E.: Tracking and Kalman Filtering Made Easy. Wiley, New York (1998)"},{"key":"111_CR4","doi-asserted-by":"crossref","unstructured":"Chang, Y.C., Chen, K.T., Wu, C.C., Lei, C.-L.: Inferring speech activity from encrypted Skype traffic. In: Proceedings of IEEE Globecom 2008. IEEE Computer Society, Los Alamitos, CA, USA (2008)","DOI":"10.1109\/GLOCOM.2008.ECP.413"},{"issue":"4","key":"111_CR5","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1007\/s00778-006-0040-z","volume":"17","author":"A.W.C. Fu","year":"2008","unstructured":"Fu A.W.C., Keogh E., Lau L.Y.H., Ratanamahatana C.A., Wong R.C.W.: Scaling and time warping in time series querying. VLDB J. 17(4), 899\u2013921 (2008)","journal-title":"VLDB J."},{"key":"111_CR6","doi-asserted-by":"crossref","DOI":"10.1002\/9780470377819","volume-title":"Kalman Filtering: Theory and Practice Using MATLAB","author":"M.S. Grewal","year":"2008","unstructured":"Grewal M.S., Andrews A.P.: Kalman Filtering: Theory and Practice Using MATLAB. 3rd edn. Wiley, New York (2008)","edition":"3"},{"issue":"Series D","key":"111_CR7","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1115\/1.3662552","volume":"82","author":"R.E. Kalman","year":"1960","unstructured":"Kalman R.E.: A new approach to linear filtering and prediction problems. Transaction of the ASME. J. Basic Eng. 82(Series D), 35\u201345 (1960)","journal-title":"J. Basic Eng."},{"issue":"Series D","key":"111_CR8","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1115\/1.3658902","volume":"83","author":"R.E. Kalman","year":"1961","unstructured":"Kalman R.E., Bucy R.S.: New results in linear filtering and prediction theory. Transactions of the ASME. J. Basic Eng. 83(Series D), 95\u2013107 (1961)","journal-title":"J. Basic Eng."},{"key":"111_CR9","doi-asserted-by":"crossref","unstructured":"Keogh, E.J., Pazzani, M.J.: Derivative dynamic time warping. In: 1st SIAM International Conference on Data Mining. SIAM (2001)","DOI":"10.1137\/1.9781611972719.1"},{"key":"111_CR10","doi-asserted-by":"crossref","unstructured":"Lella, T., Bettati, R.: Privacy of encrypted voice-over-IP. In: SMC\u201907: Proceedings of the 2007 IEEE International Conference on Systems, Man and Cybernetics, pp. 3063\u20133068. IEEE Computer Society (2007)","DOI":"10.1109\/ICSMC.2007.4414198"},{"issue":"5","key":"111_CR11","doi-asserted-by":"crossref","first-page":"561","DOI":"10.3233\/IDA-2007-11508","volume":"11","author":"S. Salvador","year":"2007","unstructured":"Salvador S., Chan P.: FastDTW: toward accurate dynamic time warping in linear time and space. Intell. Data Anal. 11(5), 561\u2013580 (2007)","journal-title":"Intell. Data Anal."},{"issue":"6","key":"111_CR12","first-page":"72","volume":"14","author":"D. Simon","year":"2001","unstructured":"Simon D.: Kalman filtering. Embed. Syst. Program. 14(6), 72\u201379 (2001)","journal-title":"Embed. Syst. Program."},{"key":"111_CR13","doi-asserted-by":"crossref","DOI":"10.1002\/0470045345","volume-title":"Optimal State Estimation: Kalman, H \u221e, and Nonlinear Approaches","author":"D. Simon","year":"2006","unstructured":"Simon D.: Optimal State Estimation: Kalman, H \u221e, and Nonlinear Approaches. Wiley, New York (2006)"},{"issue":"7","key":"111_CR14","first-page":"38","volume":"19","author":"D. Simon","year":"2006","unstructured":"Simon D.: Using nonlinear Kalman filtering to estimate signals. Embed. Syst. Design. 19(7), 38\u201353 (2006)","journal-title":"Embed. Syst. Design."},{"key":"111_CR15","unstructured":"Welch, G., Bishop, G.: An introduction to the Kalman filter. Tech. Rep. TR 95-041, University of North Carolina at Chapel Hill, Chapel Hill, NC, USA (2006)"},{"key":"111_CR16","unstructured":"WinDump: Official website. http:\/\/www.winpcap.org\/windump (2010)"},{"key":"111_CR17","doi-asserted-by":"crossref","unstructured":"Wright, C.V., Ballard, L., Coull, S.E., Monrose, F., Masson, G.M.: Spot me if you can: uncovering spoken phrases in encrypted VoIP conversations. In: SP\u201908: Proceedings of the 29th IEEE Symposium on Security and Privacy, pp. 35\u201349. IEEE Computer Society, Washington, DC, USA (2008)","DOI":"10.1109\/SP.2008.21"},{"key":"111_CR18","unstructured":"Wright, C.V., Ballard, L., Monrose, F., Masson, G.M.: Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob? In: SS\u201907: Proceedings of the 16th USENIX Security Symposium, pp. 1\u201312. USENIX Association, Berkeley, CA, USA (2007)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-010-0111-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-010-0111-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-010-0111-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T07:01:24Z","timestamp":1559113284000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-010-0111-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7,24]]},"references-count":18,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2010,10]]}},"alternative-id":["111"],"URL":"https:\/\/doi.org\/10.1007\/s10207-010-0111-4","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,7,24]]}}}