{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:01:27Z","timestamp":1730268087446,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/infcomw.2018.8406899","type":"proceedings-article","created":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T22:35:01Z","timestamp":1532385301000},"page":"27-32","source":"Crossref","is-referenced-by-count":9,"title":["App traffic mutation: Toward defending against mobile statistical traffic analysis"],"prefix":"10.1109","author":[{"given":"Louma","family":"Chaddad","sequence":"first","affiliation":[]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[]},{"given":"Imad H.","family":"Elhajj","sequence":"additional","affiliation":[]},{"given":"Ayman","family":"Kayssi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.40"},{"journal-title":"Cisco Visual Networking Index Global Mobile Data Traffic Forecast Update","first-page":"2016","year":"2016","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_18"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"ref15","first-page":"1","article-title":"Traffic morphing: an efficient defense against statistical traffic analysis","author":"wright","year":"2009","journal-title":"Proceedings of NDSS"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ITC.2010.5608728"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.42"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1880022.1880029"},{"key":"ref19","first-page":"1747","article-title":"A Web Traffic Analysis Attack Using Only Timing Information","volume":"11 8","author":"saman","year":"2016","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2636242.2636244"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.121013.121473"},{"journal-title":"Forecast Mobile Application Stores Worldwide","first-page":"2017","year":"2017","key":"ref3"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566868"},{"journal-title":"Discriminators for use in flow-based classification","year":"2013","author":"moore","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0077"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2516020"},{"key":"ref8","first-page":"1","article-title":"Mobile Apps identification based on network flows","author":"ajaeiya","year":"2017","journal-title":"Knowledge and Information Systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665949"},{"journal-title":"Mobile Fact Sheet","year":"2016","key":"ref2"},{"journal-title":"Smartphone Subscriber Market Share","year":"2016","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939922"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462099"},{"key":"ref22","article-title":"Your WiFi is leaking: What do your mobile apps gossip about you?","author":"atkinson","year":"2016","journal-title":"Future Generation Computer Systems"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2737970"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25645-0_4"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660362"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.20"},{"key":"ref25","article-title":"Encryption Is Not Enough: Inferring user activities on KakaoTalk with traffic analysis","author":"kyungwon","year":"2015","journal-title":"International Workshop on Information Security and Application"}],"event":{"name":"IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","start":{"date-parts":[[2018,4,15]]},"location":"Honolulu, HI","end":{"date-parts":[[2018,4,19]]}},"container-title":["IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8401302\/8406774\/08406899.pdf?arnumber=8406899","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T07:44:19Z","timestamp":1533023059000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8406899\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/infcomw.2018.8406899","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}