-
1
-
-
84857346968
-
-
Anonymizer, Inc., http://www.anonymizer.com/
-
-
-
-
2
-
-
84857259781
-
-
Anonymouse, http://anonymouse.org/
-
-
-
-
6
-
-
84945898027
-
-
Tor Path Specification, https://gitweb.torproject.org/ torspec.git?a=blob plain;hb=HEAD;f=path-spec.txt
-
Tor Path Specification
-
-
-
7
-
-
35248893039
-
GAP - Practical anonymous networking
-
Dingledine, R. (ed.) PET 2003. Springer, Heidelberg
-
Bennett, K., Grothoff, C.: GAP - practical anonymous networking. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 141-160. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2760
, pp. 141-160
-
-
Bennett, K.1
Grothoff, C.2
-
8
-
-
84885891904
-
Baiting Inside Attackers Using Decoy Documents
-
September
-
Bowen, B.M., Hershkop, S., Keromytis, A.D., Stolfo, S.J.: Baiting Inside Attackers Using Decoy Documents. In: Proceedings of the 5th International ICST Conference on Security and Privacy in Communication Networks (SecureComm), pp. 51-70 (September 2009)
-
(2009)
Proceedings of the 5th International ICST Conference on Security and Privacy in Communication Networks (SecureComm)
, pp. 51-70
-
-
Bowen, B.M.1
Hershkop, S.2
Keromytis, A.D.3
Stolfo, S.J.4
-
9
-
-
77952367133
-
Automating the injection of believable decoys to detect snooping
-
Bowen, B.M., Kemerlis, V.P., Prabhu, P., Keromytis, A.D., Stolfo, S.J.: Automating the injection of believable decoys to detect snooping. In: Proceedings of the Third ACM Conference on Wireless Network Security (WiSec), pp. 81-86 (2010)
-
(2010)
Proceedings of the Third ACM Conference on Wireless Network Security (WiSec)
, pp. 81-86
-
-
Bowen, B.M.1
Kemerlis, V.P.2
Prabhu, P.3
Keromytis, A.D.4
Stolfo, S.J.5
-
10
-
-
75149143441
-
Designing host and network sensors to mitigate the insider threat
-
Bowen, B.M., Salem, M.B., Hershkop, S., Keromytis, A.D., Stolfo, S.J.: Designing host and network sensors to mitigate the insider threat. IEEE Security and Privacy 7, 22-29 (2009)
-
(2009)
IEEE Security and Privacy
, vol.7
, pp. 22-29
-
-
Bowen, B.M.1
Salem, M.B.2
Hershkop, S.3
Keromytis, A.D.4
Stolfo, S.J.5
-
11
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
Chaum, D.L.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 24(2), 84-90 (1981)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
13
-
-
84957800033
-
Towards measuring anonymity
-
Dingledine, R., Syverson, P.F. (eds.) PET 2002. Springer, Heidelberg
-
Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 54-68. Springer, Heidelberg (2003), http://portal.acm.org/citation.cfm?id= 1765299.1765304
-
(2003)
LNCS
, vol.2482
, pp. 54-68
-
-
Díaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
15
-
-
85084161366
-
Tor: The Second-Generation Onion Router
-
August
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium), pp. 303-319 (August 2004)
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 303-319
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
16
-
-
84857338872
-
-
Firesheep, http://codebutler.com/firesheep
-
Firesheep
-
-
-
18
-
-
78149324869
-
Privacy-preserving P2P data sharing with oneswarm
-
Isdal, T., Piatek, M., Krishnamurthy, A., Anderson, T.: Privacy-preserving P2P data sharing with oneswarm. In: Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), pp. 111-122 (2010)
-
(2010)
Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM)
, pp. 111-122
-
-
Isdal, T.1
Piatek, M.2
Krishnamurthy, A.3
Anderson, T.4
-
19
-
-
84857335451
-
-
JAP, http://anon.inf.tu-dresden.de/
-
JAP
-
-
-
21
-
-
50249133191
-
Shining light in dark places: Understanding the tor network
-
Borisov, N., Goldberg, I. (eds.) PETS 2008. Springer, Heidelberg
-
Mccoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.: Shining light in dark places: Understanding the tor network. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 63-76. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5134
, pp. 63-76
-
-
Mccoy, D.1
Bauer, K.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
22
-
-
77954649872
-
Tor HTTP usage and information leakage
-
De Decker, B., Schaumüller-Bichl, I. (eds.) CMS 2010. Springer, Heidelberg
-
Mulazzani, M., Huber, M., Weippl, E.R.: Tor HTTP usage and information leakage. In: De Decker, B., Schaumüller-Bichl, I. (eds.) CMS 2010. LNCS, vol. 6109, pp. 245-255. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6109
, pp. 245-255
-
-
Mulazzani, M.1
Huber, M.2
Weippl, E.R.3
-
23
-
-
77955046129
-
Hproxy: Client-side detection of ssl stripping attacks
-
Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. Springer, Heidelberg
-
Nikiforakis, N., Younan, Y., Joosen, W.: Hproxy: client-side detection of ssl stripping attacks. In: Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. LNCS, vol. 6201, pp. 200-218. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6201
, pp. 200-218
-
-
Nikiforakis, N.1
Younan, Y.2
Joosen, W.3
-
27
-
-
51849134963
-
Mediated overlay services (MOSES): Network security as a composable service
-
Sidiroglou, S., Stavrou, A., Keromytis, A.: Mediated overlay services (MOSES): Network security as a composable service. In: 2007 IEEE, Sarnoff Symposium, (April 30 - May 2) pp. 1-7 (2007)
-
(2007)
2007 IEEE, Sarnoff Symposium, (April 30 - May 2)
, pp. 1-7
-
-
Sidiroglou, S.1
Stavrou, A.2
Keromytis, A.3
-
28
-
-
71749099572
-
-
Song, D.: dsniff, http://www.monkey.org/~dugsong/dsniff/
-
dsniff
-
-
Song, D.1
-
31
-
-
0024011325
-
Stalking the wily hacker
-
Stoll, C.: Stalking the wily hacker. Communications of the ACM 31(5), 484-497 (1988)
-
(1988)
Communications of the ACM
, vol.31
, Issue.5
, pp. 484-497
-
-
Stoll, C.1
-
33
-
-
84857297231
-
-
Team Furry
-
Team Furry: TOR exit-node doing MITM attacks, http://www.teamfurry.com/ wordpress/2007/11/20/tor-exit-node-doing-mitm-attacks/
-
TOR Exit-node Doing MITM Attacks
-
-
-
34
-
-
85180628784
-
Detecting forged tcp reset packets
-
Weaver, N., Sommer, R., Paxson, V.: Detecting forged tcp reset packets. In: Proceedings of the 16th Network and Distributed System Security Symposium, NDSS (2009)
-
Proceedings of the 16th Network and Distributed System Security Symposium, NDSS (2009)
-
-
Weaver, N.1
Sommer, R.2
Paxson, V.3
-
35
-
-
85180737609
-
An analysis of the degradation of anonymous protocols
-
Wright, M.K., Adler, M., Levine, B.N., Shields, C.: An analysis of the degradation of anonymous protocols. In: Proceedings of the Network and Distributed Security Symposium, NDSS (2002)
-
Proceedings of the Network and Distributed Security Symposium, NDSS (2002)
-
-
Wright, M.K.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
36
-
-
15944397574
-
Honeyfiles: Deceptive Files for Intrusion Detection
-
Yuill, J., Zappe, M., Denning, D., Feer, F.: Honeyfiles: Deceptive Files for Intrusion Detection. In: Proceedings of the 2nd IEEE Workshop on Information Assurance (WIA), pp. 116-122 (2004)
-
(2004)
Proceedings of the 2nd IEEE Workshop on Information Assurance (WIA)
, pp. 116-122
-
-
Yuill, J.1
Zappe, M.2
Denning, D.3
Feer, F.4
|