{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T13:58:20Z","timestamp":1762955900547,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/acssc.2017.8335179","type":"proceedings-article","created":{"date-parts":[[2018,4,18]],"date-time":"2018-04-18T22:21:42Z","timestamp":1524090102000},"page":"258-262","source":"Crossref","is-referenced-by-count":15,"title":["Towards provably invisible network flow fingerprints"],"prefix":"10.1109","author":[{"given":"Ramin","family":"Soltani","sequence":"first","affiliation":[]},{"given":"Dennis","family":"Goeckel","sequence":"additional","affiliation":[]},{"given":"Don","family":"Towsley","sequence":"additional","affiliation":[]},{"given":"Amir","family":"Houmansadr","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1515\/popets-2017-0050","article-title":"Tagit: Tagging network flows using blind fingerprints","volume":"2017","author":"rezaei","year":"2017","journal-title":"Proc Privacy Enhancing Technol"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130923"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2014.7028575"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2015.7447124"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2016.7852279"},{"journal-title":"Covert wireless communication with artificial noise generation","year":"2017","author":"soltani","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/18.481773"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1090\/dimacs\/066\/07"},{"key":"ref18","article-title":"Mismatch decoding of a compound timing channel","author":"mimcilovic","year":"2006","journal-title":"Forty-Fourth Annual Allerton Conference on Communication Control and Computing"},{"journal-title":"Reversibility and Stochastic Networks","year":"2011","author":"kelly","key":"ref19"},{"journal-title":"Design analysis and implementation of effective network flow watermarking schemes","year":"2012","author":"houmansadr","key":"ref4"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1007\/3-540-44702-4_6","article-title":"Towards an analysis of onion routing security","author":"syverson","year":"2001","journal-title":"Designing Privacy Enhancing Technologies"},{"key":"ref6","first-page":"81","article-title":"Tracking anonymous peer-to-peer voip calls on the internet","author":"wang","year":"2005","journal-title":"Proceedings of the 12th ACM conference on Computer and communications security"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/948109.948115","article-title":"Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays","author":"wang","year":"2003","journal-title":"Proceedings of the 10th ACM conference on Computer and communications security"},{"key":"ref8","article-title":"Swirl: A scalable watermark to detect correlated network flows","author":"houmansadr","year":"2011","journal-title":"NDSS"},{"key":"ref7","article-title":"Rainbow: A robust and invisible non-blind watermark for network flows","author":"houmansadr","year":"2009","journal-title":"NDSS"},{"key":"ref2","first-page":"184","article-title":"Detecting stepping stones","volume":"171","author":"zhang","year":"2000","journal-title":"USENIX Security Symposium"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1995.398921"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/978-3-642-39077-7_11","article-title":"The need for flow fingerprints to link correlated network flows","author":"houmansadr","year":"2013","journal-title":"International Symposium on Privacy Enhancing Technologies Symposium"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/321879.321887"}],"event":{"name":"2017 51st Asilomar Conference on Signals, Systems, and Computers","start":{"date-parts":[[2017,10,29]]},"location":"Pacific Grove, CA, USA","end":{"date-parts":[[2017,11,1]]}},"container-title":["2017 51st Asilomar Conference on Signals, Systems, and Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8330843\/8335116\/08335179.pdf?arnumber=8335179","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T07:16:26Z","timestamp":1643181386000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8335179\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/acssc.2017.8335179","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}