References
[1]. Y.J. Pyun, Y.H. Park, X. Wang, D.S. Reeves, and P. Ning,
(2010). “Tracing Traffic through Intermediate Hosts that
Repacketize Flows,” Proc.IEEE INFOCOM '07.
[2]. J.W. Deng and H.T. Tsui, (2000). “An HMM-Based
Approach for Gesture Segmentation and Recognition,”
Proc. Int'l Conf. Pattern Recognition(ICPR '00), pp. 679-682.
[3]. L.R. Rabiner, “A Tutorial on Hidden Markov Models and
Selected Applications in Speech Recognition,” Proc. IEEE,
Vol. 77, No. 2,pp. 267-296.
[4]. R. Bakis, “Continuous Speech Recognition via Centi
second Acoustic states,” J. the Acoustical Soc. of Am.
[5]. G. Danezis and A. Serjantov, (2004). “Statistical Disclosure
or Intersection Attacks on Anonymity Systems,” Proc. Sixth
Information Hiding Workshop (IH '04), pp. 293-308.
[6]. O. Berthold and H. Langos, (2002). “Dummy Traffic
Against Long Term Intersection Attacks,” Proc. Privacy
Enhancing Technologies Workshop(PET '02), pp. 110-128.
[7]. X. Wang, S. Chen, and S. Jajodia, (2005). “Tracking
Anonymous Peer-to-Peer Voip Calls on the Internet,” Proc.
12th ACM Conf. Computer and Comm. Security (CCS '05),
pp. 81-91.
[8]. “Audio Signals Used for Experiments, ”http:// academic.
csuohio. edu/zhu _y/ isc 2010/instruction.txt.
[9]. Q. Sun, D.R. Simon, Y.-M. Wang, W. Russell, V.N.
Padmanabhan,and L. Qiu, (2002). “Statistical Identification
of Encrypted Web Browsing Traffic,” Proc. IEEE Symp. Security
and Privacy (SP '02), pp. 19-30.
[10]. D. Herrmann, R. Wendolsky, and H. Federrath, (2009).
“Website Fingerprinting: Attacking Popular Privacy
Enhancing Technologies with the Multinomial Nai¨ve-Bayes
Classifier,” Proc. ACM Workshop Cloud Computing Security (CCSW '09), pp. 31-42.
[11]. L. Lu, E.-C. Chang, and M. Chan, (2010). “Website
Fingerprinting and Identification Using Ordered Feature
Sequences,” Proc.15th European Conf. Research in
Computer Security (ESORICS), D. Gritzalis, B. Preneel, and
M. Theoharidou, eds. pp. 199-214.
[12]. C.V. Wright, L. Ballard, S.E. Coull, F. Monrose, and G.M.
Masson, (2008).“Spot Me if You Can: Uncovering Spoken
Phrases in Encrypted Voip Conversations,” Proc. IEEE Symp.
Security and Privacy(SP '08), pp. 35-49.
[13]. C.V. Wright, L. Ballard, F. Monrose, and G.M. Masson,
(2007). “Language Identification of Encrypted Voip Traffic: Alejandra y Roberto orAlice and Bob?,” Proc. 16th USENIX
Security Symp. USENIX Security Symp., pp. 4:1-4:12,
http://portal.acm.org/citationcfm?id=1362903.1362907.
[15]. C. Wright, S. Coull, and F. Monrose, (2009). “Traffic
Morphing: An Efficient Defense against Statistical Traffic
Analysis,” Proc. Network and Distributed Security Symp.
(NDSS '09).
[16]. Network Security M. Backes, G. Doychev, M. Du¨
rmuth, and B. Ko¨ pf, (2010). “Speaker Recognition in
Encrypted Voice Streams,” Proc. 15th European Symp.
Research in Computer Security (ESORICS '10), pp. 508-523.