{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T17:32:33Z","timestamp":1723570353838},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/ictc.2012.6387155","type":"proceedings-article","created":{"date-parts":[[2013,1,3]],"date-time":"2013-01-03T04:14:36Z","timestamp":1357186476000},"source":"Crossref","is-referenced-by-count":18,"title":["Detecting router cache snooping in Named Data Networking"],"prefix":"10.1109","author":[{"given":"Nonhlanhla","family":"Ntuli","sequence":"first","affiliation":[]},{"given":"Sunyoung","family":"Han","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2006.28"},{"key":"17","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1145\/345910.345955","article-title":"Mitigating routing misbehavior in mobile ad hoc networks","author":"marti","year":"0","journal-title":"Proceedings of the 6th annual international conference on Mobile computing and networking (MobiCom '00)"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364725"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2007.2"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICIW.2010.22"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"14","article-title":"Infering relative popularity of Internet applications by actively quering the DNS cache","author":"wills","year":"2003","journal-title":"Internet Measurement Conference"},{"key":"11","article-title":"Timing attacks on web privacy","author":"felten","year":"2000","journal-title":"ACM Conference on Computer and Communications Security"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320198"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2009.258"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.7"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ICICISYS.2009.5358211"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/CSIE.2009.904"},{"key":"24","first-page":"620","article-title":"A real-time traffic classification approach","author":"rocha","year":"2011","journal-title":"Internet Technology and Secured Transactions (ICITST) 2011 International Conference for"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2007.4351725"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"2","article-title":"Securing network content","author":"jacobson","year":"2009","journal-title":"PARC Technical Report"},{"key":"10","author":"grangeia","year":"2004","journal-title":"DNS Cache Snooping"},{"key":"1","article-title":"Towards a content-centric Internet","author":"zahariadis","year":"2010","journal-title":"Towards the Future Internet - A European Research Perspective"},{"key":"7","year":"2010","journal-title":"Named Data Networking (Ndn) Project"},{"key":"6","author":"lauinger","year":"2010","journal-title":"Security & Scalability of Content-Centric Networking"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2018584.2018589"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2009.73"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-765-3"},{"key":"8","article-title":"ANDaNA: Anonymous named data networking application","author":"dibenedetto","year":"2012","journal-title":"19th Annual Network & Distributed System Security Symposium"}],"event":{"name":"2012 International Conference on ICT Convergence (ICTC)","location":"Jeju, Korea (South)","start":{"date-parts":[[2012,10,15]]},"end":{"date-parts":[[2012,10,17]]}},"container-title":["2012 International Conference on ICT Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6375583\/6386757\/06387155.pdf?arnumber=6387155","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T05:05:58Z","timestamp":1498021558000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6387155\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ictc.2012.6387155","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}