{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:16:01Z","timestamp":1725567361723},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/softcom.2016.7772180","type":"proceedings-article","created":{"date-parts":[[2016,12,19]],"date-time":"2016-12-19T21:40:15Z","timestamp":1482183615000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["SnoopyBot: An Android spyware to bridge the mixes in Tor"],"prefix":"10.1109","author":[{"given":"Evangelos","family":"Mitakidis","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dimitrios","family":"Taketzis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alexandros","family":"Fakis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Georgios","family":"Kambourakis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Practical onion hacking: finding the real address of tor clients","author":"christensen","year":"2009","journal-title":"FortConsults advisory"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.04.007"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653732"},{"key":"ref13","first-page":"578","article-title":"One cell is enough to break tors anonymity","author":"fu","year":"2009","journal-title":"Proceedings of Black Hat Technical Security Conference"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75551-7_12"},{"journal-title":"Orbot Tor on Android","year":"0","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2014.36"},{"journal-title":"Ethical tor research Guidelines","year":"0","key":"ref6"},{"journal-title":"Orweb Private web browser","year":"0","key":"ref5"},{"journal-title":"Privoxy-Developers Privoxy","year":"0","key":"ref8"},{"journal-title":"Polipo a Caching Web Proxy","year":"0","author":"chroboczek","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.04.001"},{"journal-title":"Torstatus - tor network status","year":"0","author":"kowalski","key":"ref9"}],"event":{"name":"2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","start":{"date-parts":[[2016,9,22]]},"location":"Split, Croatia","end":{"date-parts":[[2016,9,24]]}},"container-title":["2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7754733\/7772099\/07772180.pdf?arnumber=7772180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T19:42:46Z","timestamp":1513194166000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7772180\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/softcom.2016.7772180","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}