{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:45:33Z","timestamp":1725615933913},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/iscc.2017.8024569","type":"proceedings-article","created":{"date-parts":[[2017,9,4]],"date-time":"2017-09-04T16:26:54Z","timestamp":1504542414000},"page":"444-449","source":"Crossref","is-referenced-by-count":2,"title":["Large-scale discovery and empirical analysis for I2P eepSites"],"prefix":"10.1109","author":[{"family":"Yue Gao","sequence":"first","affiliation":[]},{"family":"Qingfeng Tan","sequence":"additional","affiliation":[]},{"family":"Jinqiao Shi","sequence":"additional","affiliation":[]},{"family":"Xuebin Wang","sequence":"additional","affiliation":[]},{"family":"Muqian Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"59","article-title":"Peer profiling and selection in the i2p anonymous network","year":"2009","journal-title":"Proceedings of PET-CON 2009"},{"key":"ref11","article-title":"Darknets and hidden servers: Identifying the true ip\/network identity of i2p service hosts","author":"crenshaw","year":"2011","journal-title":"Black Hat 2011"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22263-4_9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34601-9_11"},{"key":"ref14","first-page":"557","article-title":"A longitudinal analysis of. i2p leakage in the public dns infrastructure","year":"2016","journal-title":"Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference - SIGCOMM '16"},{"key":"ref4","article-title":"Measuring the tor network from public directory information","author":"loesing","year":"2009","journal-title":"Proc HotPETS"},{"journal-title":"Tor Project Anonymity Online","year":"0","author":"project","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.15"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14992-4_19"},{"journal-title":"Extrapolating Network Totals from Hidden-Service Statistics","year":"2015","author":"kadianakis","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2014.20"},{"journal-title":"12p anonymous network","year":"0","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref9","article-title":"Invisible internet project (i2p) project overview","author":"jrandom","year":"2003","journal-title":"Design Document"}],"event":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2017,7,3]]},"location":"Heraklion, Greece","end":{"date-parts":[[2017,7,6]]}},"container-title":["2017 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8016448\/8024490\/08024569.pdf?arnumber=8024569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T21:50:35Z","timestamp":1506981035000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8024569\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iscc.2017.8024569","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}