-
5
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), February 1981.
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
-
-
Chaum, D.1
-
11
-
-
0003866461
-
Packet-level traffic measurements from a tier-1 ip backbone
-
Sprint
-
C. Fraleigh, S. Moon, C. Diot, B. Lyles, and F. Tobagi. Packet-level traffic measurements from a tier-1 ip backbone. Technical report, Sprint, 2001.
-
(2001)
Technical Report
-
-
Fraleigh, C.1
Moon, S.2
Diot, C.3
Lyles, B.4
Tobagi, F.5
-
13
-
-
27944482088
-
Empirical and theoretical evaluation of active probing attacks and their countermeasures
-
X. Fu, B. Graham, D. Xuan, R. Bettati, and W. Zhao. Empirical and theoretical evaluation of active probing attacks and their countermeasures. In Proceedings of 6th Information Hiding Workshop (IHW2004), 2004.
-
(2004)
Proceedings of 6th Information Hiding Workshop (IHW2004)
-
-
Fu, X.1
Graham, B.2
Xuan, D.3
Bettati, R.4
Zhao, W.5
-
18
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
D. B. Johnson and D. A. Maltz. Dynamic source routing in ad hoc wireless networks. Mobile Computing, 1996.
-
(1996)
Mobile Computing
-
-
Johnson, D.B.1
Maltz, D.A.2
-
21
-
-
0030646352
-
Position location: Fundamentals, implementation strategies, and sources of error
-
K. Krizman, T. Biedka, and T. S. Rappaport. Position location: fundamentals, implementation strategies, and sources of error. IEEE Communications Magazine, 1997.
-
(1997)
IEEE Communications Magazine
-
-
Krizman, K.1
Biedka, T.2
Rappaport, T.S.3
-
22
-
-
8344224137
-
Low-rate tcptargeted denial of service attacks
-
Oakland, California
-
A. Kuzmanovic and E. W. Knightly. Low-rate tcptargeted denial of service attacks. In Proceedings of ACM SIGCOMM, Oakland, California, 2003.
-
(2003)
Proceedings of ACM SIGCOMM
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
28
-
-
84928423206
-
-
netfilter.org. Netfilter. http://netfilter.samba.org/, 2003.
-
(2003)
-
-
-
30
-
-
0004199580
-
-
Prentice-Hall, Upper Saddle River, NJ 07458, USA, second edition
-
A. V. Oppenheim, A. S. Willsky, and S. H. Nawab. Signals and systems. Prentice-Hall, Upper Saddle River, NJ 07458, USA, second edition, 1997.
-
(1997)
Signals and Systems
-
-
Oppenheim, A.V.1
Willsky, A.S.2
Nawab, S.H.3
-
33
-
-
0013035619
-
Ad-hoc on-demand distance vector routing
-
C. Perkins and E. Royer. Ad-hoc on-demand distance vector routing. Milcom, 1997.
-
(1997)
Milcom
-
-
Perkins, C.1
Royer, E.2
-
34
-
-
85031307530
-
Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers
-
C. E. Perkins and P. Bhagwat. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In Proceedings of SIGCOMM, 1994.
-
(1994)
Proceedings of SIGCOMM
-
-
Perkins, C.E.1
Bhagwat, P.2
-
41
-
-
84864253438
-
Statistical identification of encrypted web browsing traffic
-
Q. Sun, D. R. Simon, Y. Wang, W. Russell, V. N. Padmanabhan, and L. Qiu. Statistical identification of encrypted web browsing traffic. In Proceedings of IEEE Symposium on Security and Privacy, 2002.
-
(2002)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
43
-
-
84928436170
-
-
tcpdump.org. tcpdump, 2004.
-
(2004)
Tcpdump
-
-
-
44
-
-
0003610530
-
-
Computer Science Department, Texas A&M University
-
The Center for Information Assurance and Security at Texas A&M University. Flow marking attacks. Technical report. Computer Science Department, Texas A&M University, 2004.
-
(2004)
Technical Report
-
-
Attacks, F.M.1
-
45
-
-
0031274649
-
Wide-area internet traffic patterns and characteristics
-
November/December
-
K. Thompson, G. Miller, and R. Wilder. Wide-area internet traffic patterns and characteristics. IEEE Network magazine, 11(6), November/December 1997.
-
(1997)
IEEE Network Magazine
, vol.11
, Issue.6
-
-
Thompson, K.1
Miller, G.2
Wilder, R.3
-
46
-
-
24344490149
-
-
TimeSys. Timesys linux docs, http://www.timesys.com/, 2003.
-
(2003)
Timesys Linux Docs
-
-
-
48
-
-
0031078972
-
Self-similarity through high-variability: Statistical analysis of ethernet lan traffic at the source level
-
W. Willinger, M. S. Taqqu, R. Sherman, and D. V. Wilson. Self-similarity through high-variability: Statistical analysis of ethernet lan traffic at the source level. IEEE/ACM Transactions on Networking, 5(1):71-86, 1997.
-
(1997)
IEEE/ACM Transactions on Networking
, vol.5
, Issue.1
, pp. 71-86
-
-
Willinger, W.1
Taqqu, M.S.2
Sherman, R.3
Wilson, D.V.4
-
51
-
-
34250785454
-
On flow correlation attacks and countermeasures in mix networks
-
Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao. On flow correlation attacks and countermeasures in mix networks. In Proceedings of Workshop on Privacy Enhancing Technologies (PET2004), 2004.
-
(2004)
Proceedings of Workshop on Privacy Enhancing Technologies (PET2004)
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
|