{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:50:10Z","timestamp":1750308610016,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,7]],"date-time":"2017-08-07T00:00:00Z","timestamp":1502064000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001821","name":"Vienna Science and Technology Fund","doi-asserted-by":"publisher","award":["ICT15-129"],"award-info":[{"award-number":["ICT15-129"]}],"id":[{"id":"10.13039\/501100001821","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,7]]},"DOI":"10.1145\/3098593.3098602","type":"proceedings-article","created":{"date-parts":[[2017,8,2]],"date-time":"2017-08-02T19:36:18Z","timestamp":1501702578000},"page":"49-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Users' Fingerprinting Techniques from TCP Traffic"],"prefix":"10.1145","author":[{"given":"Luca","family":"Vassio","sequence":"first","affiliation":[{"name":"Politecnico di Torino"}]},{"given":"Danilo","family":"Giordano","sequence":"additional","affiliation":[{"name":"Politecnico di Torino"}]},{"given":"Martino","family":"Trevisan","sequence":"additional","affiliation":[{"name":"Politecnico di Torino"}]},{"given":"Marco","family":"Mellia","sequence":"additional","affiliation":[{"name":"Politecnico di Torino"}]},{"given":"Ana Paula Couto","family":"da Silva","sequence":"additional","affiliation":[{"name":"Universidade Federal de Minas Gerais"}]}],"member":"320","published-online":{"date-parts":[[2017,8,7]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398819"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2478741"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837030.2837038"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.03.012"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03748-1_1"},{"volume-title":"Proceedings of the HotPETs.","author":"Olejnik L.","key":"e_1_3_2_2_6_1","unstructured":"L. Olejnik , C. Castelluccia , and A. Janc . 2012. Why Johnny can't browse in peace: On the uniqueness of web browsing history patterns . In Proceedings of the HotPETs. L. Olejnik, C. Castelluccia, and A. Janc. 2012. Why Johnny can't browse in peace: On the uniqueness of web browsing history patterns. In Proceedings of the HotPETs."},{"volume-title":"Proceedings of the WOOT16","author":"Saltaformaggio B.","key":"e_1_3_2_2_7_1","unstructured":"B. Saltaformaggio , H. Choi , K. Johnson , Y. Kwon , Q. Zhang , X. Zhang , D. Xu , and J. Qian . 2016. Eavesdropping on fine-grained user activities within smartphone apps over encrypted network traffic . In Proceedings of the WOOT16 . ACM, 59--78. B. Saltaformaggio, H. Choi, K. Johnson, Y. Kwon, Q. Zhang, X. Zhang, D. Xu, and J. Qian. 2016. Eavesdropping on fine-grained user activities within smartphone apps over encrypted network traffic. In Proceedings of the WOOT16. ACM, 59--78."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb026526"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052714"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600756CM"},{"volume-title":"Proceedings of the TRAC. IEEE, 50--55","author":"Vassio L.","key":"e_1_3_2_2_11_1","unstructured":"L. Vassio , I. Drago , and M. Mellia . 2016. Detecting User Actions from HTTP Traces: Toward an Automatic Approach . In Proceedings of the TRAC. IEEE, 50--55 . L. Vassio, I. Drago, and M. Mellia. 2016. Detecting User Actions from HTTP Traces: Toward an Automatic Approach. In Proceedings of the TRAC. IEEE, 50--55."},{"volume-title":"Proceedings of the Networking. IEEE, 1--9.","author":"Xie G.","key":"e_1_3_2_2_12_1","unstructured":"G. Xie , M. Iliofotou , T. Karagiannis , M. Faloutsos , and Y. Jin . 2013. Resurf: Reconstructing Web-Surfing Activity from Network Traffic . In Proceedings of the Networking. IEEE, 1--9. G. Xie, M. Iliofotou, T. Karagiannis, M. Faloutsos, and Y. Jin. 2013. Resurf: Reconstructing Web-Surfing Activity from Network Traffic. In Proceedings of the Networking. IEEE, 1--9."}],"event":{"name":"SIGCOMM '17: ACM SIGCOMM 2017 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Los Angeles CA USA","acronym":"SIGCOMM '17"},"container-title":["Proceedings of the Workshop on Big Data Analytics and Machine Learning for Data Communication Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3098593.3098602","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3098593.3098602","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:07:21Z","timestamp":1750273641000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3098593.3098602"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,7]]},"references-count":12,"alternative-id":["10.1145\/3098593.3098602","10.1145\/3098593"],"URL":"https:\/\/doi.org\/10.1145\/3098593.3098602","relation":{},"subject":[],"published":{"date-parts":[[2017,8,7]]},"assertion":[{"value":"2017-08-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}