{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T05:44:03Z","timestamp":1748583843711},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1109\/pccc.2009.5403852","type":"proceedings-article","created":{"date-parts":[[2010,2,12]],"date-time":"2010-02-12T11:20:32Z","timestamp":1265973632000},"page":"384-387","source":"Crossref","is-referenced-by-count":4,"title":["Predicting Tor path compromise by exit port"],"prefix":"10.1109","author":[{"given":"Kevin","family":"Bauer","sequence":"first","affiliation":[]},{"given":"Dirk","family":"Grunwald","sequence":"additional","affiliation":[]},{"given":"Douglas","family":"Sicker","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-70630-4_5","article-title":"Shining light in dark places: Understanding the Tor network","author":"mccoy","year":"2008","journal-title":"Proceedings of the 8th Privacy Enhancing Technologies Symposium"},{"journal-title":"Base &#x201C;stable&#x201D; flag on mean time between failures","year":"0","author":"matthewson","key":"ref11"},{"journal-title":"Tor path specification","year":"0","author":"dingledine","key":"ref12"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1145\/1315245.1315258","article-title":"Denial of service or denial of security? How attacks on reliability can compromise anonymity","author":"borisov","year":"2007","journal-title":"Proceedings of ACM conference on Computer and Communications security"},{"key":"ref4","article-title":"Locating hidden servers","author":"\u00f8verlier","year":"2006","journal-title":"Proceedings of the IEEE Symposium on Security and Privacy"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-27809-2_25","article-title":"Timing attacks in low-latency mix-based systems","author":"levine","year":"2004","journal-title":"Proceedings of Financial Cryptography"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314336"},{"key":"ref8","article-title":"A tune-up for Tor: Improving security and performance in the Tor network","author":"snader","year":"2008","journal-title":"Proceedings of the Symposium on Network and Distributed System Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39650-5_7"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-61996-8_37","article-title":"Hiding routing information","author":"goldschlag","year":"1996","journal-title":"Proceedings of Information Hiding First International Workshop"},{"key":"ref1","article-title":"Tor: The second-generation onion router","author":"dingledine","year":"2004","journal-title":"Proceedings of the 13th USENIX Security Symposium"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_8"}],"event":{"name":"2009 IEEE 28th International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2009,12,14]]},"location":"Scottsdale, AZ, USA","end":{"date-parts":[[2009,12,16]]}},"container-title":["2009 IEEE 28th International Performance Computing and Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5398688\/5403797\/05403852.pdf?arnumber=5403852","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T19:01:48Z","timestamp":1558810908000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5403852\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/pccc.2009.5403852","relation":{},"subject":[],"published":{"date-parts":[[2009,12]]}}}