-
1
-
-
84958977733
-
Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
-
Berlin, Germany: Springer-Verlag
-
D. Donoho, A. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford, "Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay," in Lecture Notes in Computer Science 2516. Berlin, Germany: Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2516
-
-
Donoho, D.1
Flesia, A.2
Shankar, U.3
Paxson, V.4
Coit, J.5
Staniford, S.6
-
2
-
-
45249083605
-
Anonymous networking amidst eavesdroppers
-
Special Issue on Information-Thoeretic Security, Jun
-
P. Venkitasubramaniam, T. He, and L. Tong, "Anonymous networking amidst eavesdroppers," IEEE Trans. Inf. Theory, vol. 54, Special Issue on Information-Thoeretic Security, no. 6, pp. 2770-2784, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2770-2784
-
-
Venkitasubramaniam, P.1
He, T.2
Tong, L.3
-
3
-
-
0029232080
-
Holding intruders accountable on the internet
-
Oakland, CA, May
-
S. Staniford-Chen and L. Heberlein, "Holding intruders accountable on the internet," in Proc. IEEE Symp. Security Privacy, Oakland, CA, May 1995, pp. 39-49.
-
(1995)
Proc. IEEE Symp. Security Privacy
, pp. 39-49
-
-
Staniford-Chen, S.1
Heberlein, L.2
-
4
-
-
84904261405
-
Sleepy watermark tracing: An active network-based intrusion response framework
-
X. Wang, D. Reeves, S. Wu, and J. Yuill, "Sleepy watermark tracing: An active network-based intrusion response framework," in Proc. 16th Int. Inf. Security Conf., 2001, pp. 369-384.
-
(2001)
Proc. 16th Int. Inf. Security Conf
, pp. 369-384
-
-
Wang, X.1
Reeves, D.2
Wu, S.3
Yuill, J.4
-
6
-
-
84944043513
-
Finding a connection chain for tracing intruders
-
Berlin, Germany: Springer-Verlag, Oct
-
K. Yoda and H. Etoh, "Finding a connection chain for tracing intruders," in Lecture Notes in Computer Science 1895. Berlin, Germany: Springer-Verlag, Oct. 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1895
-
-
Yoda, K.1
Etoh, H.2
-
7
-
-
84957003012
-
Inter-packet delay-based correlation for tracing encrypted connections through stepping stones
-
Berlin, Germany: Springer-Verlag
-
X. Wang, D. Reeves, and S. Wu, "Inter-packet delay-based correlation for tracing encrypted connections through stepping stones," in Lecture Notes in Computer Science 2502. Berlin, Germany: Springer-Verlag, 2002, pp. 244-263.
-
(2002)
Lecture Notes in Computer Science
, vol.2502
, pp. 244-263
-
-
Wang, X.1
Reeves, D.2
Wu, S.3
-
8
-
-
34247844336
-
Detecting encrypted stepping-stone connections
-
May
-
T. He and L. Tong, "Detecting encrypted stepping-stone connections," IEEE Trans. Signal Process., vol. 55, no. 5, pp. 1612-1623, May 2007.
-
(2007)
IEEE Trans. Signal Process
, vol.55
, Issue.5
, pp. 1612-1623
-
-
He, T.1
Tong, L.2
-
9
-
-
2442556704
-
Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays
-
X. Wang and D. Reeves, "Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays," in Proc. ACM Conf. Comput. Commun. Security, 2003, pp. 20-29.
-
(2003)
Proc. ACM Conf. Comput. Commun. Security
, pp. 20-29
-
-
Wang, X.1
Reeves, D.2
-
10
-
-
35048846490
-
Detection of interactive stepping stones: Algorithms and confidence bounds
-
Sophia Antipolis, French Riviera, France, Sep
-
A. Blum, D. Song, and S. Venkataraman, "Detection of interactive stepping stones: Algorithms and confidence bounds," in Proc. Conf. Recent Advance Intrusion Detection, Sophia Antipolis, French Riviera, France, Sep. 2004, pp. 258-277.
-
(2004)
Proc. Conf. Recent Advance Intrusion Detection
, pp. 258-277
-
-
Blum, A.1
Song, D.2
Venkataraman, S.3
-
11
-
-
85116427392
-
Active timing-based correlation of perturbed traffic flows with chaff packets
-
Columbus, OH, Jun
-
P. Peng, P. Ning, D. Reeves, and X. Wang, "Active timing-based correlation of perturbed traffic flows with chaff packets," in Proc. 25th IEEE Int. Conf. Distributed Comput. Syst. Workshops, Columbus, OH, Jun. 2005, pp. 107-113.
-
(2005)
Proc. 25th IEEE Int. Conf. Distributed Comput. Syst. Workshops
, pp. 107-113
-
-
Peng, P.1
Ning, P.2
Reeves, D.3
Wang, X.4
-
12
-
-
33751045160
-
Detection of stepping stone attack under delay and Chaff perturbations
-
Phoenix, AZ, Apr
-
L. Zhang, A. Persaud, A. Johson, and Y. Guan, "Detection of stepping stone attack under delay and Chaff perturbations," in Proc. 25th IEEE Int. Performance Comput. Commun. Conf., Phoenix, AZ, Apr. 2006, pp. 36-45.
-
(2006)
Proc. 25th IEEE Int. Performance Comput. Commun. Conf
, pp. 36-45
-
-
Zhang, L.1
Persaud, A.2
Johson, A.3
Guan, Y.4
-
13
-
-
44049102446
-
Detecting information flows: Improving chaff tolerance by joint detection
-
Baltimore, MD, Mar
-
T. He and L. Tong, "Detecting information flows: Improving chaff tolerance by joint detection," in Proc. Conf. Inf. Sci. Syst., Baltimore, MD, Mar. 2007, pp. 51-56.
-
(2007)
Proc. Conf. Inf. Sci. Syst
, pp. 51-56
-
-
He, T.1
Tong, L.2
-
14
-
-
49549090679
-
-
T. He and L. Tong, Distributed detection of information flows, IEEE Trans. Inf. Forensics Security, 3, Special Issue on Statistical Methods for Network Security and Forensics, no. 3, pp. 390-403, Sep. 2008.
-
T. He and L. Tong, "Distributed detection of information flows," IEEE Trans. Inf. Forensics Security, vol. 3, Special Issue on Statistical Methods for Network Security and Forensics, no. 3, pp. 390-403, Sep. 2008.
-
-
-
-
15
-
-
55349105640
-
Toward an analytical approach to anonymous wireless networking
-
Feb
-
P. Venkitasubramaniam, T. He, L. Tong, and S. Wicker, "Toward an analytical approach to anonymous wireless networking," IEEE Commun. Mag., vol. 46, no. 2, pp. 140-146, Feb. 2008.
-
(2008)
IEEE Commun. Mag
, vol.46
, Issue.2
, pp. 140-146
-
-
Venkitasubramaniam, P.1
He, T.2
Tong, L.3
Wicker, S.4
-
16
-
-
33847350601
-
Effective probabilistic approach protecting sensor traffic
-
Atlantic City, NJ, Oct
-
X. Hong, P. Wang, J. Kong, Q. Zheng, and J. Liu, "Effective probabilistic approach protecting sensor traffic," in Proc. Military Commun. Conf., Atlantic City, NJ, Oct. 2005, pp. 1-7.
-
(2005)
Proc. Military Commun. Conf
, pp. 1-7
-
-
Hong, X.1
Wang, P.2
Kong, J.3
Zheng, Q.4
Liu, J.5
-
17
-
-
24344450770
-
On flow correlation attacks and countermeasures in mix networks
-
May 26-28
-
Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao, "On flow correlation attacks and countermeasures in mix networks," in Proc. Privacy Enhancing Technol. Workshop, May 26-28, 2004, pp. 207-225.
-
(2004)
Proc. Privacy Enhancing Technol. Workshop
, pp. 207-225
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
19
-
-
35148885145
-
Packet scheduling against stepping-stone attacks with chaff
-
Washington, DC, Oct
-
T. He, P. Venkitasubramaniam, and L. Tong, "Packet scheduling against stepping-stone attacks with chaff," in Proc. IEEE Military Commun. Conf., Washington, DC, Oct. 2006, pp. 1-7.
-
(2006)
Proc. IEEE Military Commun. Conf
, pp. 1-7
-
-
He, T.1
Venkitasubramaniam, P.2
Tong, L.3
-
22
-
-
51449097677
-
On security-aware transmission scheduling
-
Las Vegas, NV, Mar
-
T. He, A. Agaskar, and L. Tong, "On security-aware transmission scheduling," in Proc. IEEE Int. Conf. Acoust. Speech Signal Process. Las Vegas, NV, Mar. 2008, pp. 1681-1684.
-
(2008)
Proc. IEEE Int. Conf. Acoust. Speech Signal Process
, pp. 1681-1684
-
-
He, T.1
Agaskar, A.2
Tong, L.3
-
23
-
-
0029323403
-
Wide-area traffic: The failure of Poisson modeling
-
Jun
-
V. Paxson and S. Floyd, "Wide-area traffic: The failure of Poisson modeling," IEEE/ACM Trans. Netw., vol. 3, no. 3, pp. 226-244, Jun. 1995.
-
(1995)
IEEE/ACM Trans. Netw
, vol.3
, Issue.3
, pp. 226-244
-
-
Paxson, V.1
Floyd, S.2
|