{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:40:32Z","timestamp":1729622432481,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1109\/comsnets.2015.7098675","type":"proceedings-article","created":{"date-parts":[[2015,5,5]],"date-time":"2015-05-05T10:41:46Z","timestamp":1430822506000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Detecting tunneled video streams using traffic analysis"],"prefix":"10.1109","author":[{"family":"Yan Shi","sequence":"first","affiliation":[]},{"given":"Subir","family":"Biswas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"MPEG-l AND MPEG-2 Video Standards","year":"0","author":"aramvith","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(05)70254-2"},{"journal-title":"Security architecture for the Internet protocol","year":"2015","author":"kent","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5246"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(07)70104-6"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/3-540-44702-4_2","article-title":"{Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems}","volume":"2009","author":"raymond","year":"2001","journal-title":"Designing Privacy Enhancing Technologies"},{"key":"ref16","article-title":"Language Identification of Encrypted VolP Traffic: Alejandra Y Roberto or Alice and Bob?","author":"wright","year":"2007","journal-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1109\/SP.2008.21","article-title":"Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VolP Conversations","author":"wright","year":"2008","journal-title":"Proceedings of the 2008 IEEE Symposium on Security and Privacy"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"journal-title":"Nexbox Blue","article-title":"YouTube for Schools - Datasheet","year":"0","key":"ref4"},{"journal-title":"I Phantom Technologies","article-title":"iBossTM Introduces Encrypted YouTube Restriction","year":"2011","key":"ref3"},{"journal-title":"RTP a transport protocol for real-time applications","year":"2003","author":"jacobson","key":"ref6"},{"journal-title":"Real time streaming protocol (RTSP)","year":"1998","key":"ref5"},{"journal-title":"Adobe Incorporated","article-title":"Real-Time Messaging Protocol (RTMP) specification","year":"0","key":"ref8"},{"journal-title":"RTP Profile for Audio and Video Conferences with Minimal Control","year":"2003","key":"ref7"},{"journal-title":"Google Inc","article-title":"How YouTube for Schools Works","year":"0","key":"ref2"},{"journal-title":"Sandvine Incorporated","article-title":"Sandvine Global Internet Phenomena Report 2014 IH","year":"0","key":"ref1"},{"journal-title":"IIS Smooth Streaming Technical Overview","year":"2009","author":"zambelli","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"}],"event":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","start":{"date-parts":[[2015,1,6]]},"location":"Bangalore, India","end":{"date-parts":[[2015,1,10]]}},"container-title":["2015 7th International Conference on Communication Systems and Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7090755\/7098633\/07098675.pdf?arnumber=7098675","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T06:59:00Z","timestamp":1498201140000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7098675\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2015.7098675","relation":{},"subject":[],"published":{"date-parts":[[2015,1]]}}}