{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:16:21Z","timestamp":1766578581114,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T00:00:00Z","timestamp":1537574400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s11277-018-5989-6","type":"journal-article","created":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T07:15:22Z","timestamp":1537600522000},"page":"2995-3008","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Feature Selection Based Correlation Attack on HTTPS Secure Searching"],"prefix":"10.1007","volume":"103","author":[{"given":"Aaliya","family":"Sarfaraz","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4895-7544","authenticated-orcid":false,"given":"Ahmed","family":"Khan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,9,22]]},"reference":[{"key":"5989_CR1","doi-asserted-by":"crossref","unstructured":"Naylor, D., Finamore, A., Leontiadis, I., Grunenberger, Y., Mellia, M., Munafo, M., Papagiannaki, K., & Steenkiste, P. (2014). The cost of S in HTTPS. In Proceedings of the CoNext (pp. 133\u2013140).","DOI":"10.1145\/2674005.2674991"},{"key":"5989_CR2","doi-asserted-by":"crossref","unstructured":"Yuan, Z., Xue, Y., & Xia, W. (2013) PPI: Towards precise page identification for encrypted web-browsing traffic. In Proceedings of the ANCS (pp. 109\u2013110).","DOI":"10.1109\/ANCS.2013.6665182"},{"key":"5989_CR3","unstructured":"Xia, W., Ren, Y., Yuan, Z., & Xue, Y. (2013). TCPI: A novel method of encrypted page identification. In Proceedings of the CCIS (pp. 453\u2013456)."},{"key":"5989_CR4","doi-asserted-by":"crossref","unstructured":"Miller, B., Huang, L., Joseph, A. D., & Tygar, J. D. (2014). I know why you went to the clinic: Risks and realization of HTTPS traffic analysis. In Proceedings of the PETS (pp. 143\u2013163).","DOI":"10.1007\/978-3-319-08506-7_8"},{"key":"5989_CR5","unstructured":"Xie, G., Iliofotou, M., Karagiannis, T., Faloutsos, M., & Jin, Y. (2013). Reconstructing web-surfing activity from network traffic. In Proceedings of the IFIP Networking Conference (pp. 1\u20139)."},{"key":"5989_CR6","doi-asserted-by":"crossref","unstructured":"Neasbitt, C. (2014). Clickminer: Towards forensic reconstruction of user-browser interactions from network traces. In Proceedings of the ACM CCS (pp. 1244\u20131255).","DOI":"10.1145\/2660267.2660268"},{"issue":"Sup 1","key":"5989_CR7","doi-asserted-by":"publisher","first-page":"S1","DOI":"10.1016\/j.diin.2015.01.005","volume":"12","author":"D Gugelmann","year":"2015","unstructured":"Gugelmann, D. (2015). Hviz: HTTP(S) traffic aggregation and visualization for network forensics. Digital Investigation, 12(Sup 1), S1\u2013S11.","journal-title":"Digital Investigation"},{"key":"5989_CR8","doi-asserted-by":"crossref","unstructured":"Conti, M., Mancini, L. V., Spolaor, R., & Verde, N. V. (2015). Can\u2019t you hear me knocking: Identification of user actions on android apps via traffic analysis. In Proceedings of the ACM SIGSAC CODASPY.","DOI":"10.1145\/2699026.2699119"},{"key":"5989_CR9","doi-asserted-by":"crossref","unstructured":"Chen, S., Wang, R., Wang, X. F., & Zhang, K. (2010). Side-channel leaks in web applications: A reality today, a challenge tomorrow. In Proceedings of 2010 IEEE Symposium on Security and Privacy, May 16\u201319, 2010, Oakland, CA, USA (pp. 191\u2013206). IEEE.","DOI":"10.1109\/SP.2010.20"},{"key":"5989_CR10","doi-asserted-by":"crossref","unstructured":"Juarez, M., Afroz, S., Acar, G., Diaz, C., & Greenstadt, R. (2014). A critical evaluation of website fingerprinting attacks. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS\u201914) (pp. 263\u2013274).","DOI":"10.1145\/2660267.2660368"},{"key":"5989_CR11","doi-asserted-by":"crossref","unstructured":"Korczynski, M., & Duda, A. (2014). Markov chain fingerprinting to classify encrypted traffic. In Proceedings of the 2014 IEEE Conference on Computer Communications (IEEE INFOCOM 2014), April 27\u2013May 2, 2014, Toronto ON (pp. 781\u2013789). IEEE.","DOI":"10.1109\/INFOCOM.2014.6848005"},{"key":"5989_CR12","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.cose.2014.01.006","volume":"42","author":"K Goseva-Postojanova","year":"2014","unstructured":"Goseva-Postojanova, K., Anastasovski, G., Dimitrijevik, A., Pantev, R., & Miller, B. (2014). Characterization and classification of malicious Web traffic. Computers and Security, 42, 92\u2013115.","journal-title":"Computers and Security"},{"issue":"3","key":"5989_CR13","doi-asserted-by":"publisher","first-page":"309","DOI":"10.14257\/ijgdc.2015.8.3.29","volume":"8","author":"Z Luoshi","year":"2015","unstructured":"Luoshi, Z., Yibo, X., & Yuanyuan, B. (2015). A new network traffic classification method based on classifier integration. International Journal of Grid and Distributed Computing, 8(3), 309\u2013322.","journal-title":"International Journal of Grid and Distributed Computing"},{"issue":"11","key":"5989_CR14","doi-asserted-by":"publisher","first-page":"2932","DOI":"10.1109\/TPDS.2013.307","volume":"25","author":"Y Wang","year":"2014","unstructured":"Wang, Y., Xiang, Y., Zhang, J., Zhou, W., Wei, G., & Yang, L. T. (2014). Internet traffic classification using constrained clustering. IEEE Transactions on Parallel and Distributed Systems, 25(11), 2932\u20132943.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"3","key":"5989_CR15","first-page":"327","volume":"30","author":"RH Bukhari","year":"2018","unstructured":"Bukhari, R. H., Sarfaraz, A., & Khan, A. (2018). Python: A critical analysis of programing languages for novices. Science International, 30(3), 327\u2013331.","journal-title":"Science International"},{"issue":"3","key":"5989_CR16","doi-asserted-by":"publisher","first-page":"19","DOI":"10.14257\/ijsia.2018.12.3.03","volume":"12","author":"A Khan","year":"2018","unstructured":"Khan, A., & Sarfaraz, A. (2018). Practical guidelines for securing wireless local area networks (WLANs). International Journal of Security and Its Applications, 12(3), 19\u201328.","journal-title":"International Journal of Security and Its Applications"},{"key":"5989_CR17","doi-asserted-by":"crossref","unstructured":"Le Blond, S., & Choffnes, D. (2015). Herd: A scalable, traffic analysis resistant anonymity network for VoIP systems. In Proceedings of the SIGCOM (pp. 639\u2013652).","DOI":"10.1145\/2785956.2787491"},{"key":"5989_CR18","doi-asserted-by":"crossref","unstructured":"Vines, P., & Kohno, T. (2015). Rook: Using video games as a low-bandwidth censorship resistant communication platform. In Proceedings of the WPES (pp. 75\u201384).","DOI":"10.1145\/2808138.2808141"},{"key":"5989_CR19","unstructured":"Dyer, K. P., Coull, S. E., & Shrimpton, T. (2015). Marionette: A programmable network-traffic obfuscation system. In Proceedings of the USENIX (pp. 367\u2013382)."},{"issue":"2","key":"5989_CR20","first-page":"361","volume":"29","author":"A Khan","year":"2017","unstructured":"Khan, A., & Sarfaraz, A. (2017). Vetting the security of mobile applications. Science International, 29(2), 361\u2013365.","journal-title":"Science International"},{"issue":"10","key":"5989_CR21","first-page":"1","volume":"20","author":"A Khan","year":"2018","unstructured":"Khan, A., & Sarfaraz, A. (2018). Novel high-capacity robust and imperceptible image steganography scheme using multi flipped permutations and frequency entropy matching method. Soft Computing, 20(10), 1\u201312.","journal-title":"Soft Computing"},{"issue":"5","key":"5989_CR22","first-page":"4451","volume":"28","author":"A Khan","year":"2016","unstructured":"Khan, A., Sohaib, M., & Amjad, F. M. (2016). High-capacity multi-layer framework for highly robust textual steganography. Science International, 28(5), 4451\u20134457.","journal-title":"Science International"},{"issue":"1","key":"5989_CR23","first-page":"1","volume":"3","author":"A Khan","year":"2016","unstructured":"Khan, A., Tariq, U., Shabbir, J., & Hassan, S. (2016). Cloud security analysis for health care systems. International Journal of Computer and Communication System Engineering, 3(1), 1\u20138.","journal-title":"International Journal of Computer and Communication System Engineering"},{"issue":"6","key":"5989_CR24","first-page":"6091","volume":"27","author":"A Khan","year":"2015","unstructured":"Khan, A. (2015). Comparative analysis of watermarking techniques. Science International, 27(6), 6091\u20136096.","journal-title":"Science International"},{"issue":"4","key":"5989_CR25","first-page":"426","volume":"4","author":"A Khan","year":"2015","unstructured":"Khan, A. (2015). Robust textual steganography. Journal of Science, 4(4), 426\u2013434.","journal-title":"Journal of Science"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5989-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5989-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5989-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,13]],"date-time":"2019-12-13T10:19:43Z","timestamp":1576232383000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5989-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,22]]},"references-count":25,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["5989"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5989-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2018,9,22]]},"assertion":[{"value":"22 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}