-
2
-
-
84858943745
-
-
Uppsala University, Nov. 8
-
APE Project, How to build, install and run the APE testbed, Uppsala University, Nov. 8, 2002 http://apetestbed.sourceforge.net/ape-testbed.pdf
-
(2002)
How to Build, Install and Run the APE Testbed
-
-
-
3
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
Bellardo, J., Savage, S., 802.11 denial-of-service attacks: real vulnerabilities and practical solutions, USENIX Security Symposium, 2003.
-
(2003)
USENIX Security Symposium
-
-
Bellardo, J.1
Savage, S.2
-
5
-
-
38549152519
-
Privacy vulnerabilities in encrypted HTTP streams
-
Bissias, G.D., Liberatere, M., Jensen, D., Levine, B.N., Privacy vulnerabilities in encrypted HTTP streams, In Proc. Privacy Enhancing Technologies Workshop (PET 2005).
-
Proc. Privacy Enhancing Technologies Workshop (PET 2005)
-
-
Bissias, G.D.1
Liberatere, M.2
Jensen, D.3
Levine, B.N.4
-
6
-
-
84858937347
-
-
Click Modular Router Project, MIT, release 1.4.3, downloaded Dec.
-
Click Modular Router Project, MIT, release 1.4.3, downloaded Dec. 2004 http://pdos.csail.mit.edu/click/
-
(2004)
-
-
-
7
-
-
84946149882
-
Active traffic analysis attacks and countermeasures
-
Fu, X., Graham, B., Bettati, R., Zhao, W. Active traffic analysis attacks and countermeasures. In Proc. of the 2003 International Conference on Computer Networks and Mobile Computing, 2003.
-
(2003)
Proc. of the 2003 International Conference on Computer Networks and Mobile Computing
-
-
Fu, X.1
Graham, B.2
Bettati, R.3
Zhao, W.4
-
8
-
-
0037003792
-
Denial of service attacks at the MAC layer in wireless ad hoc networks
-
Gupta, V., Krishnamurthy, S., Faloutsos, M. Denial of service attacks at the MAC layer in wireless ad hoc networks. In Proc. of Milcom, 2002.
-
(2002)
Proc. of Milcom
-
-
Gupta, V.1
Krishnamurthy, S.2
Faloutsos, M.3
-
9
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
May-Jun.
-
Hu, Y.-C., Perrig, A. A survey of secure wireless ad hoc routing. IEEE Security & Privacy Magazine, v. 02, n. 3, (May-Jun. 2004), pp. 28-39.
-
(2004)
IEEE Security & Privacy Magazine
, vol.2
, Issue.3
, pp. 28-39
-
-
Hu, Y.-C.1
Perrig, A.2
-
12
-
-
84858933285
-
-
the 2.4.27 kernel, downloaded Nov.
-
Linux, The linux homepage, the 2.4.27 kernel, downloaded Nov. 2005, http://www.linux.org
-
(2005)
The Linux Homepage
-
-
-
15
-
-
0003843664
-
-
Internet Draft, draft-ietf-manet-aodv-11.txt, work in progress, Aug
-
Perkins, C., Royer, E., Das, S., Ad hoc on-demand distance vector (AODV) routing, Internet Draft, draft-ietf-manet-aodv-11.txt, work in progress, Aug 2002.
-
(2002)
Ad Hoc On-demand Distance Vector (AODV) Routing
-
-
Perkins, C.1
Royer, E.2
Das, S.3
-
16
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues and open problems
-
H. Federrath, ed., v. 2009 of LNCS, . Springer-Verlag
-
Raymond, J. Traffic analysis: protocols, attacks, design issues and open problems. In H. Federrath, ed., Designing Privacy Enhancing Technologies, J. 2009 of LNCS, pp. 10-29. Springer-Verlag, 2001
-
(2001)
Designing Privacy Enhancing Technologies
, pp. 10-29
-
-
Raymond, J.1
-
19
-
-
84864253438
-
Statistical identification of encrypted web browsing traffic
-
Sun, Q., Simon, D.R., Wang, Y., Russell, W., Padmanabhan, V.N., Qiu, L., Statistical identification of encrypted web browsing traffic. IEEE Symposium on Security and Privacy, 2002.
-
(2002)
IEEE Symposium on Security and Privacy
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
22
-
-
20444441611
-
HMM profiles for network traffic classification
-
Oct.
-
Wright, C.V., Monrose, F., Masson, G.M., HMM profiles for network traffic classification (extended abstract), in Proc. ACM Workshop on Visualization and Data Mining for Computer Security, pp. 9-15, Oct. 2004.
-
(2004)
Proc. ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 9-15
-
-
Wright, C.V.1
Monrose, F.2
Masson, G.M.3
-
23
-
-
33748075208
-
-
JHU Technical Report JHU-SPAR051201, June
-
Wright, C.V., Monrose, F., Masson, G.M., Towards better protocol identification using profile HMMs, JHU Technical Report JHU-SPAR051201, 14p., June, 2005.
-
(2005)
Towards Better Protocol Identification Using Profile HMMs
-
-
Wright, C.V.1
Monrose, F.2
Masson, G.M.3
|