{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T10:02:32Z","timestamp":1756634552358},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,28]]},"DOI":"10.1109\/icc45041.2023.10279689","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T17:54:10Z","timestamp":1698083650000},"page":"5247-5252","source":"Crossref","is-referenced-by-count":1,"title":["Analysing Covertness of Tor Bridge Request"],"prefix":"10.1109","author":[{"given":"Yibo","family":"Xie","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Gaopeng","family":"Gou","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Gang","family":"Xiong","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Zhen","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Mingxin","family":"Cui","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]}],"member":"263","reference":[{"key":"ref13","first-page":"61","article-title":"Protocol misidentification made easy with format-transforming encryption","author":"kevin","year":"2013","journal-title":"Proceedings of the 2013 ACM Conference on Computer and Communications Security (CCS) November 4&#x2013;8 2013"},{"key":"ref12","article-title":"More thoughts on bridge distribution strategies","author":"roger","year":"2009","journal-title":"The SEUL Project"},{"key":"ref15","first-page":"605","article-title":"ZMap: Fast internet-wide scanning and its security applications","author":"durumeric","year":"2013","journal-title":"Proceedings of the 22nd USENIX Security Symposium (USENIX Security)"},{"key":"ref14","article-title":"Bridgedb requests by distributor","author":"metrics","year":"2022","journal-title":"The Tor Project"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69084-1_32"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98005-4_23"},{"key":"ref2","article-title":"Using cloudfront to relay cobalt strike traffic","author":"fehrman","year":"2019","journal-title":"Black Hills"},{"key":"ref1","first-page":"218","article-title":"Tor marketplaces exploratory data analysis: The drugs case","author":"celestini","year":"2017","journal-title":"Proceedings of the 11th International Conference Global Security Safety and Sustainability (ICGS3)"},{"journal-title":"Stratosphere Lab","article-title":"Stratosphere laboratory datasets","year":"2020","key":"ref16"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23345"},{"key":"ref7","article-title":"Analyzing china's blocking of unpublished tor bridges","author":"dunna","year":"2018","journal-title":"USENIX Workshop on Free and Open Communication on the Internet (FOCI)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195627"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.59"},{"journal-title":"Securecomm and Workshops","article-title":"Wcry ransomware analysis","year":"2017","key":"ref3"},{"key":"ref6","article-title":"Tor bridges specification","author":"mathewson","year":"2011","journal-title":"The Tor Project"},{"key":"ref5","first-page":"1169","article-title":"Identifying and charac-terizing sybils in the tor network","author":"philipp","year":"2016","journal-title":"Proceedings of the 25th USENIX Security Symposium (USENIX Security)"}],"event":{"name":"ICC 2023 - IEEE International Conference on Communications","start":{"date-parts":[[2023,5,28]]},"location":"Rome, Italy","end":{"date-parts":[[2023,6,1]]}},"container-title":["ICC 2023 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10278505\/10278554\/10279689.pdf?arnumber=10279689","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T18:59:27Z","timestamp":1699901967000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10279689\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,28]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icc45041.2023.10279689","relation":{},"subject":[],"published":{"date-parts":[[2023,5,28]]}}}