{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T14:37:43Z","timestamp":1777127863987,"version":"3.51.4"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,4]]},"DOI":"10.1109\/cscwd.2010.5471985","type":"proceedings-article","created":{"date-parts":[[2010,6,4]],"date-time":"2010-06-04T14:12:22Z","timestamp":1275660742000},"page":"146-151","source":"Crossref","is-referenced-by-count":14,"title":["A Double Interval Centroid-Based Watermark for network flow traceback"],"prefix":"10.1109","author":[{"given":"Xiaogang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Junzhou","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"10","article-title":"Traffic analysis: protocols, attacks, design issues and open problems","author":"raymond","year":"2000","journal-title":"International workshop on Designing privacy enhancing technologies"},{"key":"ref11","first-page":"17","article-title":"Practical traffic analysis: Extending and resisting statistical disclosure","author":"mathewson","year":"2004","journal-title":"Proc Privacy Enhancing Technologies Workshop (PET)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1177\/0037549709341292"},{"key":"ref13","first-page":"116","article-title":"Network flow watermarking attack on low-latency anonymous communication systems","author":"wang","year":"2007","journal-title":"Proc IEEE Symp Security and Privacy (S&P"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.80"},{"key":"ref15","first-page":"18","article-title":"DSSS-based flow marking technique for invisible traceback","author":"yu","year":"2007","journal-title":"Proc IEEE Symp Security and Privacy (S&P"},{"key":"ref16","first-page":"307","article-title":"multi-flow attacks against network flow watermarking schemes","author":"kiyavash","year":"2008","journal-title":"Proceedings of USENIX Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062144"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.890881"},{"key":"ref19","first-page":"493","article-title":"On flow marking attacks in wireless anonymous communication networks","author":"fu","year":"2005","journal-title":"Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS'05)"},{"key":"ref4","first-page":"171","article-title":"Detecting stepping stones","author":"zhang","year":"2000","journal-title":"Proceedings of the 9th conference on USENIX Security Symposium"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.06.034"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948115"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1007\/3-540-45853-0_15","article-title":"Inter-packet delay based correlation for tracing encrypted connections through stepping stones","volume":"2502","author":"wang","year":"2002","journal-title":"Proceedings of the 7th European Symposium on Research in Computer Security Lecture Notes in Computer Science"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.804827"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/347057.347560"},{"key":"ref9","first-page":"303","article-title":"Tor: The second-generation onion router","author":"dingledine","year":"2004","journal-title":"Proceedings of the 13th USENIX Security Symposium"},{"key":"ref20","first-page":"334","article-title":"On the secrecy of timing-based active watermarking traceback techniques","author":"peng","year":"2006","journal-title":"Proc IEEE Symp Security and Privacy (S&P"},{"key":"ref22","article-title":"Tcplib: A library of tcp internetwork traffic characteristics","author":"danzig","year":"1991","journal-title":"Technical Report USC-CS-91-495"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-36084-0_2","article-title":"Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay","author":"donoho","year":"2002","journal-title":"Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID)"}],"event":{"name":"2010 14th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","location":"Shanghai, China","start":{"date-parts":[[2010,4,14]]},"end":{"date-parts":[[2010,4,16]]}},"container-title":["The 2010 14th International Conference on Computer Supported Cooperative Work in Design"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5466608\/5471868\/05471985.pdf?arnumber=5471985","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T05:04:26Z","timestamp":1497848666000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5471985\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/cscwd.2010.5471985","relation":{},"subject":[],"published":{"date-parts":[[2010,4]]}}}