{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T14:35:29Z","timestamp":1723041329112},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T00:00:00Z","timestamp":1489708800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,17]]},"DOI":"10.1145\/3058060.3058082","type":"proceedings-article","created":{"date-parts":[[2017,4,20]],"date-time":"2017-04-20T12:33:27Z","timestamp":1492691607000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Covert Channel over Network Time Protocol"],"prefix":"10.1145","author":[{"given":"Aidin","family":"Ameri","sequence":"first","affiliation":[{"name":"Department of Computing Security, Rochester institute of Technology, One Lomb Memorial Drive Rochester, NY, United States"}]},{"given":"Daryl","family":"Johnson","sequence":"additional","affiliation":[{"name":"Department of Computing Security, Rochester institute of Technology, One Lomb Memorial Drive Rochester, NY, United States"}]}],"member":"320","published-online":{"date-parts":[[2017,3,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409908.1409922"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.233153"},{"key":"e_1_3_2_1_4_1","volume-title":"Privacy Enhancing Workshop","author":"Giffin J.","year":"2002"},{"key":"e_1_3_2_1_5_1","first-page":"6572","volume-title":"Global E-Security","author":"Mazurczyk W.","year":"2008"},{"key":"e_1_3_2_1_6_1","first-page":"147166","volume-title":"International Workshop on Privacy Enhancing Technologies","author":"Lucena N. B.","year":"2005"},{"key":"e_1_3_2_1_7_1","unstructured":"\"RFC 5905 - Network Time Protocol Version 4: Protocol and Algorithms Specification; http:\/\/www.ietf.org\/rfc\/rfc5905.txt\" \"RFC 5905 - Network Time Protocol Version 4: Protocol and Algorithms Specification; http:\/\/www.ietf.org\/rfc\/rfc5905.txt\""},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Fisk G. Fisk M. Papadopoulos C. Neil J.: Eliminating steganography in Internet traffic with active wardens. In Petitcolas F. ed.: Information Hiding\n . Volume \n 2578\n of \n Lecture Notes in Computer Science\n . Springer-Verlag (\n 2002\n ) 18--35 Fisk G. Fisk M. Papadopoulos C. Neil J.: Eliminating steganography in Internet traffic with active wardens. In Petitcolas F. ed.: Information Hiding. Volume 2578 of Lecture Notes in Computer Science. Springer-Verlag (2002) 18--35","DOI":"10.1007\/3-540-36415-3_2"},{"key":"e_1_3_2_1_9_1","volume-title":"Spectracom Corp","author":"Server","year":"2012"},{"key":"e_1_3_2_1_10_1","volume-title":"10th Usenix Security Symposium. (2001)","author":"Handley M."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11908739_30"}],"event":{"name":"ICCSP '17: 2017 International Conference on Cryptography, Security and Privacy","location":"Wuhan China","acronym":"ICCSP '17","sponsor":["Wuhan Univ. Wuhan University, China"]},"container-title":["Proceedings of the 2017 International Conference on Cryptography, Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3058060.3058082","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T08:52:43Z","timestamp":1673686363000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3058060.3058082"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,17]]},"references-count":11,"alternative-id":["10.1145\/3058060.3058082","10.1145\/3058060"],"URL":"https:\/\/doi.org\/10.1145\/3058060.3058082","relation":{},"subject":[],"published":{"date-parts":[[2017,3,17]]},"assertion":[{"value":"2017-03-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}
  NODES
INTERN 5
Note 2