{"id":"https://openalex.org/W2885794295","doi":"https://doi.org/10.1007/s10586-018-2817-4","title":"An empirical study of web browsers\u2019 resistance to traffic analysis and website fingerprinting attacks","display_name":"An empirical study of web browsers\u2019 resistance to traffic analysis and website fingerprinting attacks","publication_year":2018,"publication_date":"2018-07-31","ids":{"openalex":"https://openalex.org/W2885794295","doi":"https://doi.org/10.1007/s10586-018-2817-4","mag":"2885794295"},"language":"en","primary_location":{"id":"doi:10.1007/s10586-018-2817-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10586-018-2817-4","pdf_url":null,"source":{"id":"https://openalex.org/S106148199","display_name":"Cluster Computing","issn_l":"1386-7857","issn":["1386-7857","1573-7543"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cluster Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1007/s10586-018-2817-4","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069238097","display_name":"Taher Al\u2010Shehari","orcid":"https://orcid.org/0000-0002-9783-919X"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Taher Al-Shehari","raw_affiliation_strings":["King Saud University, Riyadh, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0002-9783-919X","affiliations":[{"raw_affiliation_string":"King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001717771","display_name":"Sami Zhioua","orcid":"https://orcid.org/0000-0003-2029-175X"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Sami Zhioua","raw_affiliation_strings":["Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Dhahran, 31261, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0003-2029-175X","affiliations":[{"raw_affiliation_string":"Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Dhahran, 31261, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5069238097"],"corresponding_institution_ids":["https://openalex.org/I28022161"],"apc_list":{"value":2190,"currency":"EUR","value_usd":2790},"apc_paid":{"value":2190,"currency":"EUR","value_usd":2790},"fwci":0.6769,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.77617212,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"21","issue":"4","first_page":"1917","last_page":"1931"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8113659024238586},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.7406729459762573},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6597210168838501},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic analysis","score":0.6108139753341675},{"id":"https://openalex.org/keywords/web-browser","display_name":"Web browser","score":0.5624257326126099},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5269376039505005},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.517524003982544},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5081920623779297},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4896395802497864},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.42372533679008484},{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.4195959270000458},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.32822635769844055},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1871490478515625}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8113659024238586},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.7406729459762573},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6597210168838501},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.6108139753341675},{"id":"https://openalex.org/C2983909278","wikidata":"https://www.wikidata.org/wiki/Q6368","display_name":"Web browser","level":3,"score":0.5624257326126099},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5269376039505005},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.517524003982544},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5081920623779297},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4896395802497864},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.42372533679008484},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.4195959270000458},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.32822635769844055},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1871490478515625},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10586-018-2817-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10586-018-2817-4","pdf_url":null,"source":{"id":"https://openalex.org/S106148199","display_name":"Cluster Computing","issn_l":"1386-7857","issn":["1386-7857","1573-7543"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cluster Computing","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10586-018-2817-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10586-018-2817-4","pdf_url":null,"source":{"id":"https://openalex.org/S106148199","display_name":"Cluster Computing","issn_l":"1386-7857","issn":["1386-7857","1573-7543"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cluster Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W147532788","https://openalex.org/W239835737","https://openalex.org/W343723671","https://openalex.org/W1018519811","https://openalex.org/W1036203746","https://openalex.org/W1509074844","https://openalex.org/W1538573233","https://openalex.org/W1560629497","https://openalex.org/W1579055129","https://openalex.org/W1590765731","https://openalex.org/W1655958391","https://openalex.org/W1866884617","https://openalex.org/W1875604605","https://openalex.org/W1907660108","https://openalex.org/W1993568446","https://openalex.org/W2001496424","https://openalex.org/W2031925412","https://openalex.org/W2058143565","https://openalex.org/W2095968786","https://openalex.org/W2098589680","https://openalex.org/W2101806282","https://openalex.org/W2103597742","https://openalex.org/W2103647628","https://openalex.org/W2108217512","https://openalex.org/W2119588373","https://openalex.org/W2125711141","https://openalex.org/W2128551894","https://openalex.org/W2135088779","https://openalex.org/W2135579486","https://openalex.org/W2169771430","https://openalex.org/W2170085959","https://openalex.org/W2170451698","https://openalex.org/W2171294352","https://openalex.org/W2199488210","https://openalex.org/W2278335717","https://openalex.org/W2320569038","https://openalex.org/W2498567936","https://openalex.org/W2499499103","https://openalex.org/W2563009067","https://openalex.org/W2616332126","https://openalex.org/W6635414836","https://openalex.org/W6683582865"],"related_works":["https://openalex.org/W2834885115","https://openalex.org/W2119752897","https://openalex.org/W2523443373","https://openalex.org/W1545371006","https://openalex.org/W2117874351","https://openalex.org/W3166874438","https://openalex.org/W4289314221","https://openalex.org/W2161963552","https://openalex.org/W4206366499","https://openalex.org/W2128735745"],"abstract_inverted_index":{"Anonymity":[0],"protocols":[1],"are":[2,173],"employed":[3],"to":[4,8,23,39,176,183,185],"establish":[5],"encrypted":[6],"tunnels":[7],"protect":[9],"the":[10,20,41,62,73,76,106,125,130,145,163,171,212],"privacy":[11,189],"of":[12,43,64,99,102,108,132,147,170,194,214],"Internet":[13,44,177],"users":[14,45,178],"from":[15],"traffic":[16,26,53,94,159,195],"analysis":[17,54,95,160,196],"attacks.":[18],"However,":[19],"attackers":[21],"strive":[22],"infer":[24],"some":[25],"patterns\u2019":[27],"characteristics":[28],"(e.g.":[29],"packet":[30,32],"directions,":[31],"sizes,":[33],"inter-packet":[34],"timing,":[35],"etc.)":[36],"in":[37,72,192,198],"order":[38],"expose":[40],"identities":[42],"and":[46,51,140],"their":[47,188],"activities.":[48],"A":[49,205],"recent":[50],"popular":[52,113],"attack":[55,79,96,111,135,161],"is":[56,190,220],"called":[57],"website":[58,77,109,133,200,215],"fingerprinting":[59,78,110,134,201,216],"which":[60,186],"reveals":[61],"identity":[63],"websites":[65],"visited":[66],"by":[67,156],"target":[68],"users.":[69],"Existing":[70],"work":[71],"literature":[74],"studied":[75],"using":[80,112,141],"a":[81,92,100],"single":[82],"web":[83,114,166],"browser,":[84],"namely":[85],"Firefox.":[86],"In":[87,121],"this":[88],"paper":[89],"we":[90,123],"propose":[91],"unified":[93],"model":[97],"composed":[98],"sequence":[101],"phases":[103],"that":[104,128],"demonstrate":[105],"efficiency":[107],"browsers":[115],"under":[116],"Tor":[117,137],"(The":[118],"Onion":[119],"Router).":[120],"addition,":[122],"reveal":[124],"main":[126],"factors":[127,155],"affect":[129],"accuracy":[131],"over":[136,202,217],"anonymous":[138],"system":[139],"different":[142,203,218],"browsers.":[143,167,204],"To":[144],"best":[146],"our":[148],"knowledge,":[149],"no":[150],"previous":[151],"study":[152],"uncovered":[153],"such":[154],"deploying":[157],"real-world":[158],"utilizing":[162],"top":[164],"five":[165],"The":[168],"outcomes":[169],"research":[172,209],"very":[174],"relevant":[175],"(individuals/companies/governments)":[179],"since":[180],"they":[181],"allow":[182],"assess":[184],"extent":[187],"preserved":[191],"presence":[193],"attacks,":[197],"particular,":[199],"recommendation":[206],"for":[207],"future":[208],"direction":[210],"regarding":[211],"investigation":[213],"scenarios":[219],"also":[221],"provided.":[222]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
