{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:12:11Z","timestamp":1763467931029,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1109\/icassp.2009.4959879","type":"proceedings-article","created":{"date-parts":[[2009,5,27]],"date-time":"2009-05-27T19:13:38Z","timestamp":1243451618000},"page":"1497-1500","source":"Crossref","is-referenced-by-count":24,"title":["Multi-flow attack resistant watermarks for network flows"],"prefix":"10.1109","author":[{"given":"Amir","family":"Houmansadr","sequence":"first","affiliation":[]},{"given":"Negar","family":"Kiyavash","sequence":"additional","affiliation":[]},{"given":"Nikita","family":"Borisov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948115"},{"key":"2","first-page":"171","article-title":"detecting stepping stones","author":"zhang","year":"2000","journal-title":"USENIX Security Symposium"},{"key":"1","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/3-540-44702-4_2","article-title":"traffic analysis: protocols, attacks, design issues, and open problems","author":"raymond","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"7","first-page":"18","article-title":"dsss-based flow marking technique for invisible traceback","volume":"9","author":"yu","year":"0","journal-title":"Pfitzmann and McDaniel"},{"key":"6","first-page":"116","article-title":"network flow watermarking attack on low-latency anonymous communication systems","volume":"9","author":"wang","year":"0","journal-title":"Pfitzmann and McDaniel"},{"year":"0","key":"5"},{"key":"4","first-page":"81","article-title":"tracking anonymous peer-to-peer voip calls on the internet","author":"wang","year":"2005","journal-title":"ACM Conference on Computer and Communications Security"},{"journal-title":"IEEE Symposium on Security and Privacy","year":"2007","key":"9"},{"key":"8","article-title":"multi-flow attacks against network flow watermarking schemes","author":"kiyavash","year":"2008","journal-title":"Proceedings of the USENIX Security Symposium"}],"event":{"name":"ICASSP 2009 - 2009 IEEE International Conference on Acoustics, Speech and Signal Processing","start":{"date-parts":[[2009,4,19]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2009,4,24]]}},"container-title":["2009 IEEE International Conference on Acoustics, Speech and Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4912736\/4959496\/04959879.pdf?arnumber=4959879","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T20:19:56Z","timestamp":1497817196000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4959879\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/icassp.2009.4959879","relation":{},"subject":[],"published":{"date-parts":[[2009,4]]}}}