{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:21:53Z","timestamp":1730226113630,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1109\/ias.2008.46","type":"proceedings-article","created":{"date-parts":[[2008,9,24]],"date-time":"2008-09-24T17:57:09Z","timestamp":1222279029000},"page":"311-317","source":"Crossref","is-referenced-by-count":1,"title":["A Model for the Study of Privacy Issues in Secure Shell Connections"],"prefix":"10.1109","author":[{"given":"Maurizio","family":"Dusi","sequence":"first","affiliation":[]},{"given":"Francesco","family":"Gringoli","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Salgarelli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198257"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4253"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4254"},{"key":"3","first-page":"2745","article-title":"on inferring application protocol behaviors in encrypted network traffic","volume":"7","author":"wright","year":"2006","journal-title":"Journal of Machine Learning Research"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4251"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029211"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1368436.1368445"},{"year":"0","key":"5"},{"key":"4","article-title":"traffic flow confidentiality enhancements in ipsec: design and preliminary implementation","author":"teofili","year":"2006","journal-title":"Proceedings of the 14th IEEE International Conference on Network Protocols (Santa"},{"year":"0","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2008.ECP.122"}],"event":{"name":"2008 Fourth International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2008,9,8]]},"location":"Naples, Italy","end":{"date-parts":[[2008,9,10]]}},"container-title":["2008 The Fourth International Conference on Information Assurance and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4627042\/4627043\/04627105.pdf?arnumber=4627105","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T15:32:45Z","timestamp":1489764765000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4627105\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ias.2008.46","relation":{},"subject":[],"published":{"date-parts":[[2008,9]]}}}