-
1
-
-
77955197190
-
Side-channel leaks in web applications: A reality today, a challenge tomorrow
-
S. Chen, R. Wang, X. Wang, and K. Zhang. Side-channel leaks in web applications: A reality today, a challenge tomorrow. In Proceedings of IEEE Symposium on Security and Privacy, pages 191-206, 2010.
-
(2010)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 191-206
-
-
Chen, S.1
Wang, R.2
Wang, X.3
Zhang, K.4
-
2
-
-
84864253438
-
Statistical identification of encrypted web browsing traffic
-
Q. Sun, D.R. Simon, Y. Wang, W. Russell, V.N. Padmanabhan, and L. Qiu. Statistical identification of encrypted web browsing traffic. In Proceedings of IEEE Symposium on Security and Privacy, 2002.
-
(2002)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
3
-
-
29244451861
-
ACAS: Automated construction of application signatures
-
Proceedings of ACM SIGCOMM 2005 Workshops: Conference on Computer Communications
-
P. Haffner, S. Sen, O. Spatscheck, and D. Wang. ACAS: automated construction of application signatures. In Proceedings of the 2005 ACM SIGCOMM workshop on mining network data, pages 197-202. ACM, 2005. (Pubitemid 41832972)
-
(2005)
Proceedings of ACM SIGCOMM 2005 Workshops: Conference on Computer Communications
, pp. 197-202
-
-
Haffner, P.1
Sen, S.2
Spatscheck, O.3
Wang, D.4
-
5
-
-
78650117270
-
Devices that tell on you: Privacy trends in consumer ubiquitous computing
-
T.S. Saponas, J. Lester, C. Hartung, S. Agarwal, and T. Kohno. Devices that tell on you: Privacy trends in consumer ubiquitous computing. In Proceedings of USENIX Security Symposium, 2007.
-
(2007)
Proceedings of USENIX Security Symposium
-
-
Saponas, T.S.1
Lester, J.2
Hartung, C.3
Agarwal, S.4
Kohno, T.5
-
7
-
-
50249140706
-
Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations
-
C.V. Wright, L. Ballard, S. E. Coull, F. Monrose, and G. M. Masson. Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations. In Proceedings of IEEE Symposium on Security and Privacy, 2008.
-
(2008)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Wright, C.V.1
Ballard, L.2
Coull, S.E.3
Monrose, F.4
Masson, G.M.5
-
10
-
-
35449007284
-
Preserving location privacy in wireless LANs
-
DOI 10.1145/1247660.1247689, MobiSys'07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services
-
T. Jiang, H.J. Wang, and Y. Hu. Preserving location privacy in wireless LANs. In Proceedings of MobiSys, pages 246-257, 2007. (Pubitemid 47620929)
-
(2007)
MobiSys'07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services
, pp. 246-257
-
-
Jiang, T.1
Wang, H.J.2
Hu, Y.-C.3
-
11
-
-
80051618580
-
See through walls: Motion tracking using variance-based radio tomography networks
-
J. Wilson and N. Patwari. See through walls: Motion tracking using variance-based radio tomography networks. IEEE Transactions on Mobile Computing, 2010.
-
(2010)
IEEE Transactions on Mobile Computing
-
-
Wilson, J.1
Patwari, N.2
-
13
-
-
62849120844
-
A survey of techniques for internet traffic classification using machine learning
-
T.T. Nguyen and G. J. Armitage. A survey of techniques for internet traffic classification using machine learning. IEEE Communications Surveys and Tutorials, 10(1-4):56-76, 2008.
-
(2008)
IEEE Communications Surveys and Tutorials
, vol.10
, Issue.1-4
, pp. 56-76
-
-
Nguyen, T.T.1
Armitage, G.J.2
-
14
-
-
80051867400
-
-
August
-
Internet Assigned Numbers Authority (IANA), August, 2008. http://www.iana.org/assignments/port-numbers.
-
(2008)
-
-
-
15
-
-
14944345677
-
Transport layer identification of P2P traffic
-
Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, IMC 2004
-
T. Karagiannis, A. Broido, and M. Faloutsos. Transport layer identification of P2P traffic. In Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pages 121-134. ACM, 2004. (Pubitemid 40372037)
-
(2004)
Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, IMC 2004
, pp. 121-134
-
-
Karagiannis, T.1
Broido, A.2
Faloutsos, M.3
Claffy, K.4
-
16
-
-
33847303101
-
BLINC: Multilevel traffic classification in the dark
-
DOI 10.1145/1090191.1080119
-
T. Karagiannis, K. Papagiannaki, and M. Faloutsos. BLINC: multilevel traffic classification in the dark. ACM SIGCOMM Computer Communication Review, 35(4):229-240, 2005. (Pubitemid 46323507)
-
(2005)
Computer Communication Review
, vol.35
, Issue.4
, pp. 229-240
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
17
-
-
33750711125
-
Profiling internet backbone traffic: Behavior models and applications
-
DOI 10.1145/1090191.1080112
-
K. Xu, Z.L. Zhang, and S. Bhattacharyya. Profiling internet backbone traffic: behavior models and applications. ACM SIGCOMM Computer Communication Review, 35(4):169-180, 2005. (Pubitemid 46323502)
-
(2005)
Computer Communication Review
, vol.35
, Issue.4
, pp. 169-180
-
-
Xu, K.1
Zhang, Z.-L.2
Bhattacharyya, S.3
-
19
-
-
33845735523
-
On inferring application protocol behaviors in encrypted network traffic
-
C.V. Wright, F. Monrose, and G.M. Masson. On inferring application protocol behaviors in encrypted network traffic. The Journal of Machine Learning Research, 7:2745-2769, 2006. (Pubitemid 46011489)
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 2745-2769
-
-
Wright, C.V.1
Monrose, F.2
Masson, G.M.3
-
20
-
-
67249118576
-
Classification of network traffic via packet-level hidden Markov models
-
IEEE
-
A. Dainotti, W.D. Donato, A. Pescape, S. Rossi, et al. Classification of network traffic via packet-level hidden Markov models. In Proceedings of GLOBECOM, pages 1-5. IEEE, 2008.
-
(2008)
Proceedings of GLOBECOM
, pp. 1-5
-
-
Dainotti, A.1
Donato, W.D.2
Pescape, A.3
Rossi, S.4
-
21
-
-
34548118248
-
Offline/realtime traffic classification using semi-supervised learning
-
DOI 10.1016/j.peva.2007.06.014, PII S0166531607000648
-
J. Erman, A. Mahanti, M. Arlitt, I. Cohen, and C. Williamson. Offline/realtime traffic classification using semi-supervised learning. Performance Evaluation, 64(9-12):1194-1213, 2007. (Pubitemid 47302132)
-
(2007)
Performance Evaluation
, vol.64
, Issue.9-12
, pp. 1194-1213
-
-
Erman, J.1
Mahanti, A.2
Arlitt, M.3
Cohen, I.4
Williamson, C.5
-
22
-
-
36949009834
-
Revealing skype traffic: When randomness plays with you
-
DOI 10.1145/1282380.1282386, ACM SIGCOMM 2007: Conference on Computer Communications
-
D. Bonfiglio, M. Mellia, M. Meo, D. Rossi, and P. Tofanelli. Revealing skype traffic: when randomness plays with you. ACM SIGCOMM Computer Communication Review, 37(4):37-48, 2007. (Pubitemid 350239771)
-
(2007)
ACM SIGCOMM 2007: Conference on Computer Communications
, pp. 37-48
-
-
Bonfiglio, D.1
Mellia, M.2
Meo, M.3
Rossi, D.4
Tofanelli, P.5
-
23
-
-
33646890686
-
Traffic classification on the fly
-
L. Bernaille, R. Teixeira, I. Akodkenou, A. Soule, and K. Salamatian. Traffic classification on the fly. ACM SIGCOMM Computer Communication Review, 36(2):23-26, 2006. (Pubitemid 43780945)
-
(2006)
Computer Communication Review
, vol.36
, Issue.2
, pp. 23-26
-
-
Bernaille, L.1
Teixeira, R.2
Akodkenou, I.3
Soule, A.4
Salamatian, K.5
-
25
-
-
33244467936
-
Internet traffic classification using bayesian analysis techniques
-
DOI 10.1145/1064212.1064220, SIGMETRICS 2005: International Conference on Measurement and Modeling of Computer Systems - Proceedings
-
A. Moore and D. Zuev. Internet traffic classification using Bayesian analysis techniques. ACM SIGMETRICS Performance Evaluation Review, 33(1):50-60, 2005. (Pubitemid 43275409)
-
(2005)
Performance Evaluation Review
, vol.33
, Issue.1
, pp. 50-60
-
-
Moore, A.W.1
Zuev, D.2
-
26
-
-
70350771144
-
Internet traffic classification demystified: Myths, caveats, and the best practices
-
ACM
-
H. Kim, K. Claffy, M. Fomenkov, D. Barman, M. Faloutsos, and K. Lee. Internet traffic classification demystified: myths, caveats, and the best practices. In Proceedings of the 2008 ACM CoNEXT conference, pages 1-12. ACM, 2008.
-
(2008)
Proceedings of the 2008 ACM CoNEXT Conference
, pp. 1-12
-
-
Kim, H.1
Claffy, K.2
Fomenkov, M.3
Barman, D.4
Faloutsos, M.5
Lee, K.6
-
27
-
-
37749006403
-
802.11 user fingerprinting
-
ACM Press
-
J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall. 802.11 user fingerprinting. In Proceedings of MobiCom, pages 99-110. ACM Press, 2007.
-
(2007)
Proceedings of MobiCom
, pp. 99-110
-
-
Pang, J.1
Greenstein, B.2
Gummadi, R.3
Seshan, S.4
Wetherall, D.5
-
28
-
-
24744455341
-
Converting signal strength percentage to dBm values
-
J. Bardwell. Converting signal strength percentage to dBm values. WildPackets, 2002.
-
(2002)
WildPackets
-
-
Bardwell, J.1
-
29
-
-
33750283653
-
A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification
-
N. Williams, S. Zander, and G. Armitage. A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification. ACM SIGCOMM Computer Communication Review, 36(5):5-16, 2006.
-
(2006)
ACM SIGCOMM Computer Communication Review
, vol.36
, Issue.5
, pp. 5-16
-
-
Williams, N.1
Zander, S.2
Armitage, G.3
-
30
-
-
0036505670
-
A comparison of methods for multiclass support vector machines
-
C.W. Hsu and C.J. Lin. A comparison of methods for multiclass support vector machines. Neural Networks, IEEE Transactions on, 13(2):415-425, 2002.
-
(2002)
Neural Networks, IEEE Transactions On
, vol.13
, Issue.2
, pp. 415-425
-
-
Hsu, C.W.1
Lin, C.J.2
-
31
-
-
13444293728
-
Support vector machines with binary tree architecture for multi-class classification
-
S. Cheong, S.H. Oh, and S.Y. Lee. Support vector machines with binary tree architecture for multi-class classification. Neural Information Processing-Letters and Reviews, 2(3):47-51, 2004.
-
(2004)
Neural Information Processing-letters and Reviews
, vol.2
, Issue.3
, pp. 47-51
-
-
Cheong, S.1
Oh, S.H.2
Lee, S.Y.3
-
32
-
-
33646495490
-
Binary tree of SVM: A new fast multiclass training and classification algorithm
-
IEEE Transactions on
-
B. Fei and J. Liu. Binary tree of SVM: a new fast multiclass training and classification algorithm. Neural Networks, IEEE Transactions on, 17(3):696-704, 2006.
-
(2006)
Neural Networks
, vol.17
, Issue.3
, pp. 696-704
-
-
Fei, B.1
Liu, J.2
-
33
-
-
70449644554
-
Multi-class classification using support vector machines in decision tree architecture
-
IEEE
-
G. Madzarov and D. Gjorgjevikj. Multi-class classification using support vector machines in decision tree architecture. In Proceedings of EUROCON 2009, pages 288-295. IEEE.
-
Proceedings of EUROCON 2009
, pp. 288-295
-
-
Madzarov, G.1
Gjorgjevikj, D.2
-
34
-
-
67650661159
-
Improving wireless privacy with an identifier-free link layer protocol
-
B. Greenstein, D. Mccoy, J. Pang, T. Kohno, S. Seshan, and D. Wetherall. Improving wireless privacy with an identifier-free link layer protocol. In Proceeding of MobiSys, 2008.
-
(2008)
Proceeding of MobiSys
-
-
Greenstein, B.1
Mccoy, D.2
Pang, J.3
Kohno, T.4
Seshan, S.5
Wetherall, D.6
-
35
-
-
80755134983
-
Traffic morphing: An efficient defense against statistical traffic analysis
-
C.V. Wright, S.E. Coull, and F. Monrose. Traffic morphing: an efficient defense against statistical traffic analysis. In Proceedings of NDSS, 2009.
-
(2009)
Proceedings of NDSS
-
-
Wright, C.V.1
Coull, S.E.2
Monrose, F.3
|