{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:10:38Z","timestamp":1725469838869},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/cns.2013.6682735","type":"proceedings-article","created":{"date-parts":[[2013,12,18]],"date-time":"2013-12-18T00:48:17Z","timestamp":1387327697000},"page":"375-376","source":"Crossref","is-referenced-by-count":1,"title":["Design and implementation of a Skype Protocol Analyzer"],"prefix":"10.1109","author":[{"family":"Ray-Guang Cheng","sequence":"first","affiliation":[]},{"family":"Po-Yao Tsai","sequence":"additional","affiliation":[]},{"family":"Ping-Chen Lin","sequence":"additional","affiliation":[]},{"family":"Chia-Liang Lian","sequence":"additional","affiliation":[]},{"family":"Tse-Han Liu","sequence":"additional","affiliation":[]},{"family":"Hsien-Cheng Chou","sequence":"additional","affiliation":[]},{"family":"Shiao-Li Tsao","sequence":"additional","affiliation":[]},{"family":"Shanchieh Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Skype Protocol Analyzer for Wireshark [Online]","year":"0","key":"13"},{"journal-title":"VEST Hardware-dedicated Stream Ciphers","year":"2005","author":"o'neil","key":"11"},{"key":"12","article-title":"Skype protocol analyzer with Wireshark","author":"lian","year":"0","journal-title":"Proceedings of 15th Information Management Academic and Policing Information Practice Seminar May 2012"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1142"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364024"},{"key":"1","article-title":"An analysis of the Skype peer-topeer Internet telephony protocol","author":"baset","year":"0","journal-title":"Proceedings of IEEE INFOCOM'06 Barcelona Spain April 2006"},{"journal-title":"Skypeopensource's Open Source Contributions [Online]","year":"0","key":"10"},{"key":"7","article-title":"Silver needle in the Skype","author":"biondi","year":"0","journal-title":"Proceedings of Black Hat Europe'06 Amsterdam the Netherlands Mar 2006"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2008.2008927"},{"key":"5","article-title":"Identifying Skype traffic in a large-scale flow data repository","author":"trammell","year":"0","journal-title":"Proceedings of the Third COST TMA International Workshop on Traffic Monitoring and Analysis (TMA 2011) Vienna Austria Apr 2011"},{"journal-title":"Analysis and Detection of Skype Network Traffic","year":"2011","author":"ptacek","key":"4"},{"journal-title":"Skype Protocol Reverse Engineered Source Available for Download","year":"2013","author":"bushmanov","key":"9"},{"key":"8","article-title":"Vanilla Skype (part1, part2)","author":"desclaux","year":"2006","journal-title":"ReConFig"}],"event":{"name":"2013 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2013,10,14]]},"location":"National Harbor, MD, USA","end":{"date-parts":[[2013,10,16]]}},"container-title":["2013 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6675898\/6682673\/06682735.pdf?arnumber=6682735","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T03:48:32Z","timestamp":1490240912000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6682735\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/cns.2013.6682735","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}