{"id":"https://openalex.org/W2123243822","doi":"https://doi.org/10.1145/2517840.2517856","title":"ScrambleSuit","display_name":"ScrambleSuit","publication_year":2013,"publication_date":"2013-11-04","ids":{"openalex":"https://openalex.org/W2123243822","doi":"https://doi.org/10.1145/2517840.2517856","mag":"2123243822"},"language":"en","primary_location":{"id":"doi:10.1145/2517840.2517856","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2517840.2517856","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042846158","display_name":"Philipp Winter","orcid":"https://orcid.org/0000-0003-2481-2997"},"institutions":[{"id":"https://openalex.org/I43968019","display_name":"Karlstad University","ror":"https://ror.org/05s754026","country_code":"SE","type":"education","lineage":["https://openalex.org/I43968019"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Philipp Winter","raw_affiliation_strings":["Karlstad University, Karlstad, Sweden"],"affiliations":[{"raw_affiliation_string":"Karlstad University, Karlstad, Sweden","institution_ids":["https://openalex.org/I43968019"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071588771","display_name":"Tobias Pulls","orcid":"https://orcid.org/0000-0001-6459-8409"},"institutions":[{"id":"https://openalex.org/I43968019","display_name":"Karlstad University","ror":"https://ror.org/05s754026","country_code":"SE","type":"education","lineage":["https://openalex.org/I43968019"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Tobias Pulls","raw_affiliation_strings":["Karlstad University, Karlstad, Sweden"],"affiliations":[{"raw_affiliation_string":"Karlstad University, Karlstad, Sweden","institution_ids":["https://openalex.org/I43968019"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041014762","display_name":"Juergen Fuss","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136249","display_name":"University of Applied Sciences Upper Austria","ror":"https://ror.org/03jqp6d56","country_code":"AT","type":"education","lineage":["https://openalex.org/I4210136249"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Juergen Fuss","raw_affiliation_strings":["Upper Austria University of Applied Sciences, Hagenberg, Austria"],"affiliations":[{"raw_affiliation_string":"Upper Austria University of Applied Sciences, Hagenberg, Austria","institution_ids":["https://openalex.org/I4210136249"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5042846158"],"corresponding_institution_ids":["https://openalex.org/I43968019"],"apc_list":null,"apc_paid":null,"fwci":13.3444,"has_fulltext":false,"cited_by_count":85,"citation_normalized_percentile":{"value":0.98681438,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"213","last_page":"224"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7572106719017029},{"id":"https://openalex.org/keywords/cornerstone","display_name":"Cornerstone","score":0.6831115484237671},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6263594627380371},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.603019654750824},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5584927797317505},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.5478640198707581},{"id":"https://openalex.org/keywords/censorship","display_name":"Censorship","score":0.5460713505744934},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.508564829826355},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.45246079564094543},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.4136635661125183},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33054760098457336},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.24188265204429626}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7572106719017029},{"id":"https://openalex.org/C2780616401","wikidata":"https://www.wikidata.org/wiki/Q1133673","display_name":"Cornerstone","level":2,"score":0.6831115484237671},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6263594627380371},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.603019654750824},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5584927797317505},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.5478640198707581},{"id":"https://openalex.org/C52930066","wikidata":"https://www.wikidata.org/wiki/Q543","display_name":"Censorship","level":2,"score":0.5460713505744934},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.508564829826355},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.45246079564094543},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.4136635661125183},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33054760098457336},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.24188265204429626},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C27206212","wikidata":"https://www.wikidata.org/wiki/Q34178","display_name":"Theology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2517840.2517856","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2517840.2517856","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6000000238418579,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W45435623","https://openalex.org/W93530148","https://openalex.org/W1490025813","https://openalex.org/W1505685975","https://openalex.org/W1510529350","https://openalex.org/W1553177637","https://openalex.org/W1573930428","https://openalex.org/W1608222975","https://openalex.org/W1632088469","https://openalex.org/W1655958391","https://openalex.org/W1656266873","https://openalex.org/W1656678770","https://openalex.org/W1815005891","https://openalex.org/W1818481658","https://openalex.org/W1981790149","https://openalex.org/W2005802709","https://openalex.org/W2009778287","https://openalex.org/W2021949962","https://openalex.org/W2031211716","https://openalex.org/W2042477294","https://openalex.org/W2077128025","https://openalex.org/W2094522125","https://openalex.org/W2100644924","https://openalex.org/W2111695118","https://openalex.org/W2112684840","https://openalex.org/W2114398364","https://openalex.org/W2126053700","https://openalex.org/W2127563425","https://openalex.org/W2131033000","https://openalex.org/W2135579486","https://openalex.org/W2150779517","https://openalex.org/W2153156723","https://openalex.org/W2157349061","https://openalex.org/W2167994609","https://openalex.org/W2170085959","https://openalex.org/W2171318529","https://openalex.org/W2187669723","https://openalex.org/W2234931939","https://openalex.org/W2270478131","https://openalex.org/W2396113481","https://openalex.org/W2399392249","https://openalex.org/W2399409560","https://openalex.org/W2402531054","https://openalex.org/W2404168686","https://openalex.org/W4243774931","https://openalex.org/W4255084430","https://openalex.org/W4285719527","https://openalex.org/W4293579972"],"related_works":["https://openalex.org/W2088111589","https://openalex.org/W2321083758","https://openalex.org/W4366496304","https://openalex.org/W2375906709","https://openalex.org/W4229004718","https://openalex.org/W4226031521","https://openalex.org/W3160314615","https://openalex.org/W2381288267","https://openalex.org/W2155469080","https://openalex.org/W2299887038"],"abstract_inverted_index":{"Deep":[0],"packet":[1],"inspection":[2],"technology":[3],"became":[4],"a":[5],"cornerstone":[6],"of":[7,16,34],"Internet":[8],"censorship":[9],"by":[10],"facilitating":[11],"cheap":[12],"and":[13,41],"effective":[14],"filtering":[15,23],"what":[17],"censors":[18],"consider":[19],"undesired":[20],"information.":[21],"Moreover,":[22],"is":[24],"not":[25],"limited":[26],"to":[27,44,47],"simple":[28],"pattern":[29],"matching":[30],"but":[31],"makes":[32],"use":[33],"sophisticated":[35],"techniques":[36],"such":[37,51],"as":[38,52],"active":[39],"probing":[40],"protocol":[42],"classification":[43],"block":[45],"access":[46],"popular":[48],"circumvention":[49],"tools":[50],"Tor.":[53]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":10},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":13},{"year":2017,"cited_by_count":8},{"year":2016,"cited_by_count":9},{"year":2015,"cited_by_count":12},{"year":2014,"cited_by_count":6},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2016-06-24T00:00:00"}
