-
1
-
-
83055183581
-
-
Amazon EC2. http://aws.amazon.com/.
-
-
-
-
2
-
-
83055191021
-
-
BitTorrent. http://www.bittorrent.com/.
-
-
-
-
3
-
-
83055197769
-
-
eMule. http://www.emule-project.net.
-
-
-
-
4
-
-
83055183580
-
-
FaceBook. http://www.facebook.com.
-
-
-
-
5
-
-
83055189917
-
-
Google. http://www.google.com.
-
-
-
-
6
-
-
83055165104
-
-
MaxMind. http://www.maxmind.com/.
-
-
-
-
7
-
-
83055190417
-
-
μTorrent. http://www.utorrent.com/.
-
-
-
-
12
-
-
83055191020
-
-
Xunlei. http://www.xunlei.com.
-
-
-
-
13
-
-
83055182984
-
-
OS Market Share, 2010. http://tinyurl.com/6myem6.
-
(2010)
OS Market Share
-
-
-
16
-
-
84938824980
-
The Carmen Sandiego Project
-
BAILEY, D., AND DEPETRILLO, N. The Carmen Sandiego Project. In Proc. of BlackHat (Las Vegas, NV, USA, 2010).
-
Proc. of BlackHat (Las Vegas, NV, USA, 2010)
-
-
Bailey, D.1
Depetrillo, N.2
-
17
-
-
77951539275
-
Where is that Phone?: Geolocating IP Addresses on 3G Network
-
BALAKRISHNAN, M., MOHOMED, I., AND RAMASUBRAMANIAN, V. Where is that Phone?: Geolocating IP Addresses on 3G Network. In Proc. of IMC (Chicago, Illinois, USA, 2009).
-
Proc. of IMC (Chicago, Illinois, USA, 2009)
-
-
Balakrishnan, M.1
Mohomed, I.2
Ramasubramanian, V.3
-
19
-
-
85084096676
-
Spying the World from Your Laptop - Identifying and Profiling Content Providers and Big Downloaders in BitTorrent
-
BLOND, S. L., LEGOUT, A., LEFESSANT, F., DABBOUS, W., AND KAAFAR, M. A. Spying the World from Your Laptop - Identifying and Profiling Content Providers and Big Downloaders in BitTorrent. In Proc. of LEET (San Jose, CA, USA, 2010).
-
Proc. of LEET (San Jose, CA, USA, 2010)
-
-
Blond, S.L.1
Legout, A.2
Lefessant, F.3
Dabbous, W.4
Kaafar, M.A.5
-
20
-
-
85084096178
-
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users
-
BLOND, S. L., MANILS, P., CHAABANE, A., KAAFAR, M. A., CASTELLUCCIA, C., LEGOUT, A., AND DABBOUS, W. One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. In Proc. of LEET (Boston, MA, USA, 2011).
-
Proc. of LEET (Boston, MA, USA, 2011)
-
-
Blond, S.L.1
Manils, P.2
Chaabane, A.3
Kaafar, M.A.4
Castelluccia, C.5
Legout, A.6
Dabbous, W.7
-
21
-
-
83055189912
-
Waiting for Anonymity
-
DHUNGEL, P., STEINER, M., RIMAC, I., HILT, V., AND ROSS, K. W. Waiting for Anonymity. In Proc. of P2P (2010).
-
Proc. of P2P (2010)
-
-
Dhungel, P.1
Steiner, M.2
Rimac, I.3
Hilt, V.4
Ross, K.W.5
-
22
-
-
85084161366
-
Tor: The Second-generation Onion Router
-
DINGLEDINE, R., MATHEWSON, N., AND SYVERSON, P. Tor: the Second-generation Onion Router. In Proc. of USENIX (Boston, MA, 2004).
-
Proc. of USENIX (Boston, MA, 2004)
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
24
-
-
78149324869
-
Privacy-Preserving P2P Data Sharing with OneSwarm
-
ISDAL, T., PIATEK, M., KRISHNAMURTHY, A., AND ANDERSON, T. Privacy-Preserving P2P Data Sharing with OneSwarm. In Proc. of SIGCOMM (Bangalore, India, 2010).
-
Proc. of SIGCOMM (Bangalore, India, 2010)
-
-
Isdal, T.1
Piatek, M.2
Krishnamurthy, A.3
Anderson, T.4
-
25
-
-
41949126461
-
Why and How to Perform Fraud Experiments
-
JAKOBSSON, M., FINN, P., AND JOHNSON, N. Why and How to Perform Fraud Experiments. Proc. of IEEE Security & Privacy 6, 2 (2008), 66-68.
-
(2008)
Proc. of IEEE Security & Privacy
, vol.6
, Issue.2
, pp. 66-68
-
-
Jakobsson, M.1
Finn, P.2
Johnson, N.3
-
26
-
-
27544460278
-
Remote Physical Device Fingerprinting
-
KOHNO, T., BROIDO, A., AND CLAFFY, K. C. Remote Physical Device Fingerprinting. In Proc. of Security & Privacy (Oakland, CA, 2005).
-
Proc. of Security & Privacy (Oakland, CA, 2005)
-
-
Kohno, T.1
Broido, A.2
Claffy, K.C.3
-
27
-
-
83055189908
-
Challenges and Directions for Monitoring P2P File Sharing Networks or Why My Printer Received a DMCA Takedown Notice
-
PIATEK, M., KOHNO, T., AND KRISHNAMURTHY, A. Challenges and Directions for Monitoring P2P File Sharing Networks or Why My Printer Received a DMCA Takedown Notice. In Proc. of HotSec (San Jose, CA, 2010).
-
Proc. of HotSec (San Jose, CA, 2010)
-
-
Piatek, M.1
Kohno, T.2
Krishnamurthy, A.3
-
28
-
-
83055190413
-
Monitoring the Bittorrent Monitors: A Bird's Eye View
-
SIGANOS, G., PUJOL, J., AND RODRIGUEZ, P. Monitoring the Bittorrent Monitors: A Bird's Eye View. In Proc. of PAM (Seoul, South Korea, 2009).
-
Proc. of PAM (Seoul, South Korea, 2009)
-
-
Siganos, G.1
Pujol, J.2
Rodriguez, P.3
-
29
-
-
84992744857
-
What's in a Name: A Study of Names, Gender Inference, and Gender Behavior in Facebook
-
TANG, C., ROSS, K. W., SAXENA, N., AND CHEN, R. What's in a Name: A Study of Names, Gender Inference, and Gender Behavior in Facebook. In SNSMW (2011).
-
SNSMW (2011)
-
-
Tang, C.1
Ross, K.W.2
Saxena, N.3
Chen, R.4
-
30
-
-
85010335250
-
Towards Street-Level Client-Independent IP Geolocalization
-
WANG, Y., BURGENER, D., FLORES, M., KUZMANOVIC, A., AND HUANG, C. Towards Street-Level Client-Independent IP Geolocalization. In Proc. of NSDI (Boston, MA, 2011).
-
Proc. of NSDI (Boston, MA, 2011)
-
-
Wang, Y.1
Burgener, D.2
Flores, M.3
Kuzmanovic, A.4
Huang, C.5
-
31
-
-
84874527222
-
Crawling BitTorrent DHTs for Fun and Profit
-
WOLCHOK, S., AND HALDERMAN, J. A. Crawling BitTorrent DHTs for Fun and Profit. In Proc. of WOOT (Washington, DC, USA, 2010).
-
Proc. of WOOT (Washington, DC, USA, 2010)
-
-
Wolchok, S.1
Halderman, J.A.2
-
32
-
-
77955214796
-
A Practical Attack to De-anonymize Social Network Users
-
WONDRACEK, G., HOLZ, T., KIRDA, E., AND KRUEGEL, C. A Practical Attack to De-anonymize Social Network Users. In Proc. of Security & Privacy (Oakland, CA, USA, 2010).
-
Proc. of Security & Privacy (Oakland, CA, USA, 2010)
-
-
Wondracek, G.1
Holz, T.2
Kirda, E.3
Kruegel, C.4
-
33
-
-
79957594613
-
Unraveling the BitTorrent Ecosystem
-
ZHANG, C., DHUNGEL, P., WU, D., AND ROSS, K. W. Unraveling the BitTorrent Ecosystem. TPDS (2010).
-
TPDS (2010)
-
-
Zhang, C.1
Dhungel, P.2
D, W.U.3
Ross, K.W.4
|