{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T22:53:29Z","timestamp":1752360809108,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/glocom.2014.7036866","type":"proceedings-article","created":{"date-parts":[[2015,2,17]],"date-time":"2015-02-17T14:54:30Z","timestamp":1424184870000},"page":"557-563","source":"Crossref","is-referenced-by-count":12,"title":["Website fingerprinting using traffic analysis of dynamic webpages"],"prefix":"10.1109","author":[{"given":"Yan","family":"Shi","sequence":"first","affiliation":[]},{"given":"Subir","family":"Biswas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"11","article-title":"Tor: The second-generation onion router","volume":"13","author":"dingledine","year":"2004","journal-title":"Proceedings of the 13th conference on USENIX Security Symposium"},{"journal-title":"A Critique of Website Traffic Fingerprinting Attacks","year":"2013","author":"perry","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2401"},{"key":"2","article-title":"The Transport Layer Security (TLS) Protocol Version 1. 2","author":"dierks","year":"2008","journal-title":"IETF"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.21"},{"journal-title":"OpenVPN Building and Integrating Virtual Private Networks","year":"2006","author":"feilner","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"4","article-title":"Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems","author":"raymond","year":"2001","journal-title":"Proceedings of International Workshop on Design Issues in Anonymity and Unobservability"},{"key":"9","article-title":"Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob","author":"wright","year":"2007","journal-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium"},{"journal-title":"Cisco Secure Virtual Private Networks","year":"2001","author":"mason","key":"8"}],"event":{"name":"GLOBECOM 2014 - 2014 IEEE Global Communications Conference","start":{"date-parts":[[2014,12,8]]},"location":"Austin, TX, USA","end":{"date-parts":[[2014,12,12]]}},"container-title":["2014 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7008954\/7036769\/07036866.pdf?arnumber=7036866","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T21:45:36Z","timestamp":1490305536000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7036866\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/glocom.2014.7036866","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}