{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T15:56:35Z","timestamp":1746806195785,"version":"3.40.5"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,6]],"date-time":"2020-12-06T00:00:00Z","timestamp":1607212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,6]],"date-time":"2020-12-06T00:00:00Z","timestamp":1607212800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,6]],"date-time":"2020-12-06T00:00:00Z","timestamp":1607212800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,6]]},"DOI":"10.1109\/wifs49906.2020.9360895","type":"proceedings-article","created":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T21:12:41Z","timestamp":1614287561000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Encrypted HTTP\/2 Traffic Monitoring: Standing the Test of Time and Space"],"prefix":"10.1109","author":[{"given":"Pierre-Olivier","family":"Brissaud","sequence":"first","affiliation":[]},{"given":"Jerome","family":"Francois","sequence":"additional","affiliation":[]},{"given":"Isabelle","family":"Chrisment","sequence":"additional","affiliation":[]},{"given":"Thibault","family":"Cholez","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Bettan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1109\/TIFS.2017.2737970","article-title":"Robust smart-phone app identification via encrypted network traffic analysis","author":"taylor","year":"2018","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2478741"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098049"},{"key":"ref13","article-title":"Eavesdropping on fine-grained user activities within smartphone apps over encrypted network traffic","author":"saltaformaggio","year":"2016","journal-title":"10th USENIX Workshop on Offensive Technologies"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029821"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.21"},{"key":"ref16","article-title":"Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob?","author":"wright","year":"2007","journal-title":"USENIX Security Symposium"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660368"},{"key":"ref18","article-title":"Random forests","author":"breiman","year":"2001","journal-title":"Machine Learning"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767755"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502818"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1901"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2804394"},{"key":"ref8","article-title":"Effective attacks and provable defenses for website fingerprinting","author":"wang","year":"2014","journal-title":"USENIX Security Symposium"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382260"},{"key":"ref2","article-title":"Analysis of the ssl 3.0 protocol","author":"wagner","year":"1996","journal-title":"The Second USENIX Workshop on Electronic Commerce Proceedings"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2933155"},{"key":"ref9","article-title":"k-fingerprinting: A robust scalable website fingerprinting technique","author":"hayes","year":"2016","journal-title":"USENIX Security Symposium"}],"event":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2020,12,6]]},"location":"New York, NY, USA","end":{"date-parts":[[2020,12,11]]}},"container-title":["2020 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9360831\/9360880\/09360895.pdf?arnumber=9360895","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:18:41Z","timestamp":1656602321000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9360895\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/wifs49906.2020.9360895","relation":{},"subject":[],"published":{"date-parts":[[2020,12,6]]}}}