-
1
-
-
85165843383
-
-
hisao, S. (2009), http://www.okisoft.co.jp/esc/python/proxy
-
(2009)
-
-
Hisao, S.1
-
2
-
-
0000264695
-
A stochastic model for tcp with stationary random losses
-
Altman, E., Avrachenkov, K., Barakat, C.: A stochastic model for tcp with stationary random losses. In: ACM SIGCOMM (2000)
-
(2000)
ACM SIGCOMM
-
-
Altman, E.1
Avrachenkov, K.2
Barakat, C.3
-
3
-
-
21844463487
-
Watermarking security: Theory and practice
-
Cayre, F., Fontaine, C., Furon, T.: Watermarking security: Theory and practice. IEEE Transactions on Signal Processing 53(10), 3976-3987 (2005)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.10
, pp. 3976-3987
-
-
Cayre, F.1
Fontaine, C.2
Furon, T.3
-
4
-
-
85165835735
-
-
Choi, B.: PN code generator (2000), http://www-mobile.ecs.soton. ac.uk/bjc97r/pnseq-1.1/pnseq-1.1.tar.gz
-
(2000)
PN Code Generator
-
-
Choi, B.1
-
5
-
-
85165860458
-
-
Microsoft Corporation
-
Microsoft Corporation. Microsoft security bulletin ms09-048 (2009), http://www.microsoft.com/technet/security/Bulletin/ms09-048.mspx
-
(2009)
Microsoft Security Bulletin ms09-048
-
-
-
7
-
-
0004196692
-
-
2nd edn. John Wiley & Sons, Chichester
-
Dixon, R.: Spread Spectrum Systems, 2nd edn. John Wiley & Sons, Chichester (1984)
-
(1984)
Spread Spectrum. Systems
-
-
Dixon, R.1
-
8
-
-
84958977733
-
Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
-
Wespi, A., Vigna, G., Deri, L. eds., Springer, Heidelberg
-
Donoho, D., Flesia, A., Shankar, U., Paxson, V., Coit, J., Staniford, S.: Multiscale stepping-stone detection: detecting pairs of jittered interactive streams by exploiting maximum tolerable delay. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol. 2516, p. 17. Springer, Heidelberg (2002)
-
(2002)
RAID 2002. LNCS
, vol.2516
, pp. 17
-
-
Donoho, D.1
Flesia, A.2
Shankar, U.3
Paxson, V.4
Coit, J.5
Staniford, S.6
-
9
-
-
0007255130
-
Sequential decision problems for processes with continuous time parameter testing hypotheses
-
Dvoretzky, A., Kiefer, J., Wolfowitz, J.: Sequential decision problems for processes with continuous time parameter testing hypotheses. Annals of Mathematical Statistics 24 (1953)
-
(1953)
Annals of Mathematical Statistics
, vol.24
-
-
Dvoretzky, A.1
Kiefer, J.2
Wolfowitz, J.3
-
12
-
-
0004201481
-
-
revised edition. Aegean Park Press, Laguna Hills
-
Golomb, S.: Shift Register Sequences (revised edition). Aegean Park Press, Laguna Hills (1982)
-
(1982)
Shift Register Sequences
-
-
Golomb, S.1
-
13
-
-
78049398073
-
Sequential tests for exponential populations and poisson processes
-
RAND Corporation
-
Haggstrom, G.: Sequential tests for exponential populations and poisson processes. Technical report, RAND Corporation (1979)
-
(1979)
Technical Report
-
-
Haggstrom, G.1
-
15
-
-
70349666876
-
Blind detection of spread spectrum flow watermarks
-
Jia, W., Tso, F., Ling, Z., Fu, X., Xuan, D., Yu, W.: Blind detection of spread spectrum flow watermarks. In: IEEE INFOCOM (2009)
-
(2009)
IEEE INFOCOM
-
-
Jia, W.1
Tso, F.2
Ling, Z.3
Fu, X.4
Xuan, D.5
Yu, W.6
-
17
-
-
85165840918
-
-
Luo, X., Zhang, J., Perdisci, R., Lee, W.: On the secrecy of spread-spectrum flow watermarks (2010), http://roberto.perdisci.com/ publications/publication-files/DSSSWM-Extended-TechReport.pdf
-
(2010)
On the Secrecy of Spread-spectrum Flow Watermarks
-
-
Luo, X.1
Zhang, J.2
Perdisci, R.3
Lee, W.4
-
20
-
-
34548314612
-
Tracing traffic through intermediate hosts that repacketize flows
-
Pyun, Y., Park, Y., Wang, X., Reeves, D., Ning, P.: Tracing traffic through intermediate hosts that repacketize flows. In: IEEE INFOCOM (2007)
-
(2007)
IEEE INFOCOM
-
-
Pyun, Y.1
Park, Y.2
Wang, X.3
Reeves, D.4
Ning, P.5
-
21
-
-
56549101103
-
A first step towards live botmaster traceback
-
Lippmann, R., Kirda, E., Trachtenberg, A. eds., Springer, Heidelberg
-
Ramsbrock, D., Wang, X., Jiang, X.: A first step towards live botmaster traceback. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 59-77. Springer, Heidelberg (2008)
-
(2008)
RAID 2008. LNCS
, vol.5230
, pp. 59-77
-
-
Ramsbrock, D.1
Wang, X.2
Jiang, X.3
-
22
-
-
78349298553
-
Improving tor using a TCP-over-DTLS tunnel
-
Reardon, J., Goldberg, I.: Improving tor using a TCP-over-DTLS tunnel. In: USENIX Security (2009)
-
(2009)
USENIX Security
-
-
Reardon, J.1
Goldberg, I.2
-
25
-
-
0022796415
-
New directions in communications (or which way to the information age?)
-
Turner, J.: New directions in communications (or which way to the information age?). In: IEEE Commun. Magazine (1986)
-
(1986)
IEEE Commun. Magazine
-
-
Turner, J.1
-
26
-
-
33745773302
-
Tracking anonymous peer-to-peer voip calls on the internet
-
Wang, X., Chen, S., Jajodia, S.: Tracking anonymous peer-to-peer voip calls on the internet. In: ACM CCS (2005)
-
(2005)
ACM CCS
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
27
-
-
34548762543
-
Network flow watermarking attack on low-latency anonymous communication systems
-
Wang, X., Chen, S., Jajodia, S.: Network flow watermarking attack on low-latency anonymous communication systems. In: IEEE Symp. on Security and Privacy (2007)
-
(2007)
IEEE Symp. on Security and Privacy
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
28
-
-
34548755641
-
DSSS-based flow marking technique for invisible traceback
-
Yu, W., Fu, X., Graham, S., Xuan, D., Zhao, W.: DSSS-based flow marking technique for invisible traceback. In: IEEE Symp. on Security and Privacy (2007)
-
(2007)
IEEE Symp. on Security and Privacy
-
-
Yu, W.1
Fu, X.2
Graham, S.3
Xuan, D.4
Zhao, W.5
|