{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T10:04:11Z","timestamp":1730196251481,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/ants.2015.7413623","type":"proceedings-article","created":{"date-parts":[[2016,2,26]],"date-time":"2016-02-26T11:31:49Z","timestamp":1456486309000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Characterization of Traffic Analysis based video stream source identification"],"prefix":"10.1109","author":[{"given":"Yan","family":"Shi","sequence":"first","affiliation":[]},{"given":"Subir","family":"Biswas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref10","article-title":"Real-Time Messaging Protocol (RTMP) specification"},{"article-title":"IIS Smooth Streaming Technical Overview","year":"2009","author":"zambelli","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2007.86"},{"key":"ref13","article-title":"Website Fingerprinting using Traffic Analysis of Dynamic W ebpages","author":"shi","year":"2014","journal-title":"Globecom 2014 - Communication and Information System Security Symposium"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44702-4_2"},{"key":"ref5","article-title":"Timing analysis of keystrokes and timing attacks on SSH","volume":"10","author":"song","year":"2001","journal-title":"Proceedings of the 10th USENIX Security Symposium"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18178-8_11"},{"key":"ref7","article-title":"Detecting Tunneled Video Streams Using Traffic Analysis","author":"shi","year":"2015","journal-title":"The Seventh International Conference on COMmunication Systems and NETworkS (COMSNETS 2015)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"year":"2014","key":"ref1","article-title":"Sandvine Global Internet Phenomena Report 2014 1H"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.338"}],"event":{"name":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","start":{"date-parts":[[2015,12,15]]},"location":"Kolkata, India","end":{"date-parts":[[2015,12,18]]}},"container-title":["2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7403798\/7413598\/07413623.pdf?arnumber=7413623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T09:01:39Z","timestamp":1490086899000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7413623\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ants.2015.7413623","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}