-
1
-
-
84937555407
-
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
-
J.F. Raymond, "Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems," LECTURE NOTES IN COMPUTER SCIENCE, pp. 10-29, 2001.
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, pp. 10-29
-
-
Raymond, J.F.1
-
2
-
-
85084161090
-
Detecting stepping stones
-
Steven Bellovin and Greg Rose, Eds, Berkeley, CA, USA, Aug, USENIX Association
-
Y. Zhang and V. Paxson, "Detecting stepping stones," in USENIX Security Symposium, Steven Bellovin and Greg Rose, Eds., Berkeley, CA, USA, Aug. 2000, pp. 171-184, USENIX Association.
-
(2000)
USENIX Security Symposium
, pp. 171-184
-
-
Zhang, Y.1
Paxson, V.2
-
3
-
-
2442556704
-
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
-
Vijay Atluri, Ed, New York, NY, USA, ACM
-
X. Wang and D. S. Reeves, "Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays," in ACM Conference on Computer and Communications Security, Vijay Atluri, Ed., New York, NY, USA, 2003, pp. 20-29, ACM.
-
(2003)
ACM Conference on Computer and Communications Security
, pp. 20-29
-
-
Wang, X.1
Reeves, D.S.2
-
4
-
-
33745773302
-
Tracking anonymous peer-to-peer VoIP calls on the Internet
-
Catherine Meadows, Ed, New York, NY, USA, Nov, ACM
-
Xinyuan Wang, Shiping Chen, and Sushil Jajodia, "Tracking anonymous peer-to-peer VoIP calls on the Internet," in ACM Conference on Computer and Communications Security, Catherine Meadows, Ed., New York, NY, USA, Nov. 2005, pp. 81-91, ACM.
-
(2005)
ACM Conference on Computer and Communications Security
, pp. 81-91
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
5
-
-
34548314612
-
-
Y. Pyun, Y. Park, X. Wang, D. S. Reeves, and P. Ning, Tracing traffic through intermediate hosts that repacketize flows, in IEEE Conference on Computer Communications (INFOCOM), George Kesidis, Eytan Modiano, and R. Srikant, Eds., May 2007, pp. 634-642.
-
Y. Pyun, Y. Park, X. Wang, D. S. Reeves, and P. Ning, "Tracing traffic through intermediate hosts that repacketize flows," in IEEE Conference on Computer Communications (INFOCOM), George Kesidis, Eytan Modiano, and R. Srikant, Eds., May 2007, pp. 634-642.
-
-
-
-
6
-
-
34548762543
-
Network flow watermarking attack on low-latency anonymous communication systems
-
X. Wang, S. Chen, and S. Jajodia, "Network flow watermarking attack on low-latency anonymous communication systems," In Pfitzmann and McDaniel [9], pp. 116-130.
-
Pfitzmann and McDaniel
, vol.9
, pp. 116-130
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
7
-
-
34548755641
-
DSSS-based flow marking technique for invisible traceback
-
W. Yu, X. Fu, S. Graham, D.Xuan, and W. Zhao, "DSSS-based flow marking technique for invisible traceback," In Pfitzmann and McDaniel [9], pp. 18-32.
-
Pfitzmann and McDaniel
, vol.9
, pp. 18-32
-
-
Yu, W.1
Fu, X.2
Graham, S.3
Xuan, D.4
Zhao, W.5
-
8
-
-
80052167664
-
Multi-flow Attacks Against Network Flow Watermarking Schemes
-
San Jose, CA
-
N. Kiyavash, A. Houmansadr, and N. Borisov, "Multi-flow Attacks Against Network Flow Watermarking Schemes," in Proceedings of the Usenix Security Symposium, San Jose, CA, 2008.
-
(2008)
Proceedings of the Usenix Security Symposium
-
-
Kiyavash, N.1
Houmansadr, A.2
Borisov, N.3
-
9
-
-
70349211040
-
-
Birgit Pfitzmann and Patrick McDaniel, Eds, May
-
Birgit Pfitzmann and Patrick McDaniel, Eds., IEEE Symposium on Security and Privacy, May 2007.
-
(2007)
IEEE Symposium on Security and Privacy
-
-
|