{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T05:07:28Z","timestamp":1769576848040,"version":"3.49.0"},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T00:00:00Z","timestamp":1736121600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T00:00:00Z","timestamp":1736121600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,6]]},"DOI":"10.1109\/comsnets63942.2025.10885604","type":"proceedings-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:05:58Z","timestamp":1740081958000},"page":"1293-1298","source":"Crossref","is-referenced-by-count":3,"title":["Categorically Analyzing the Network Traffic in the Snowflake Bridge of Tor"],"prefix":"10.1109","author":[{"given":"Sibashreeta","family":"Dash","sequence":"first","affiliation":[{"name":"ABV-Indian Institute of Information Technology and Management,Gwalior,India"}]},{"given":"Neetu","family":"Kumari","sequence":"additional","affiliation":[{"name":"ABV-Indian Institute of Information Technology and Management,Gwalior,India"}]},{"given":"Debanjan","family":"Sadhya","sequence":"additional","affiliation":[{"name":"ABV-Indian Institute of Information Technology and Management,Gwalior,India"}]},{"given":"Bodhi","family":"Chakraborty","sequence":"additional","affiliation":[{"name":"Adamas University,Kolkata,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2014.000071"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS49054.2020.9119656"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"ref4","article-title":"To fear or not to fear the tor communication system","author":"Haraty","year":"2017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382210"},{"issue":"9","key":"ref6","first-page":"125","article-title":"Peer to peer multimedia real-time communication system based on webrtc technology","volume":"2","author":"Nayyef","year":"2019","journal-title":"International Journal for the History of Engineering & Technology"},{"key":"ref7","article-title":"Threat modeling and circumvention of Internet censorship","volume-title":"PhD dissertation","author":"Fifield","year":"2017"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2015.7367356"},{"key":"ref10","article-title":"Evaluating snowflake as an indistinguishable censorship circumvention tool","author":"MacMillan","year":"2020"}],"event":{"name":"2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)","location":"Bengaluru, India","start":{"date-parts":[[2025,1,6]]},"end":{"date-parts":[[2025,1,10]]}},"container-title":["2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10885406\/10885547\/10885604.pdf?arnumber=10885604","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:50:58Z","timestamp":1740138658000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10885604\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,6]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/comsnets63942.2025.10885604","relation":{},"subject":[],"published":{"date-parts":[[2025,1,6]]}}}