-
1
-
-
2442556704
-
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
-
X. Wang and D. Reeves, "Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays," in Proc. ACM CCS, 2003.
-
(2003)
Proc. ACM CCS
-
-
Wang, X.1
Reeves, D.2
-
2
-
-
34548314612
-
Tracing traffic through intermediate hosts that repacketize flows
-
Y. Pyun, Y. Park, X. Wang, D. Reeves, and P. Ning, "Tracing traffic through intermediate hosts that repacketize flows," in Proc. IEEE INFOCOM, 2007.
-
(2007)
Proc. IEEE INFOCOM
-
-
Pyun, Y.1
Park, Y.2
Wang, X.3
Reeves, D.4
Ning, P.5
-
4
-
-
78049393668
-
A first step towards live botmaster traceback
-
D. Ramsbrock, X. Wang, and X. Jiang, "A first step towards live botmaster traceback," in Proc. RAID, 2008.
-
(2008)
Proc. RAID
-
-
Ramsbrock, D.1
Wang, X.2
Jiang, X.3
-
5
-
-
33745773302
-
Tracking anonymous peer-to-peer voip calls on the Internet
-
X. Wang, S. Chen, and S. Jajodia, "Tracking anonymous peer-to-peer voip calls on the Internet," in Proc. ACM CCS, 2005.
-
(2005)
Proc. ACM CCS
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
6
-
-
85177693003
-
RAINBOW: A robust and invisible non-blind watermark for network flows
-
A. Houmansadr, N. Kiyavash, and N. Borisov, "RAINBOW: A robust and invisible non-blind watermark for network flows," in Proc. NDSS, 2009.
-
(2009)
Proc. NDSS
-
-
Houmansadr, A.1
Kiyavash, N.2
Borisov, N.3
-
7
-
-
85180621070
-
SWIRL: A scalable watermark to detect correlated network flows
-
A. Houmansadr and N. Borisov, "SWIRL: A scalable watermark to detect correlated network flows," in Proc. NDSS, 2011.
-
(2011)
Proc. NDSS
-
-
Houmansadr, A.1
Borisov, N.2
-
8
-
-
70349301114
-
Timing analysis in low-latency mix networks: Attacks and defenses?
-
V. Shmatikov and M. Wang, "Timing analysis in low-latency mix networks: attacks and defenses?" in Proc. ESORICS, 2006.
-
(2006)
Proc. ESORICS
-
-
Shmatikov, V.1
Wang, M.2
-
9
-
-
84862973659
-
Studying timing analysis on the Internet with SubRosa
-
H. Daginawala and M. Wright, "Studying timing analysis on the Internet with SubRosa," in Proc. PET, 2008.
-
(2008)
Proc. PET
-
-
Daginawala, H.1
Wright, M.2
-
10
-
-
69749095702
-
Dependent link padding algorithms for low latency anonymity systems
-
W. Wang, M. Motani, and V. Srinivasan, "Dependent link padding algorithms for low latency anonymity systems," in Proc. ACM CCS, 2008.
-
(2008)
Proc. ACM CCS
-
-
Wang, W.1
Motani, M.2
Srinivasan, V.3
-
13
-
-
47049102528
-
One-way delay measurement and characterization
-
A. Hernandez and E. Magana, "One-way delay measurement and characterization," in Proc. IEEE ICNS, 2007.
-
(2007)
Proc. IEEE ICNS
-
-
Hernandez, A.1
Magana, E.2
-
14
-
-
0036629689
-
Traffic characterisation and modelling
-
N. Macfadyen, "Traffic characterisation and modelling," BT Technology Journal, vol. 20, no. 3, 2002.
-
(2002)
BT Technology Journal
, vol.20
, Issue.3
-
-
MacFadyen, N.1
-
16
-
-
42149086458
-
Analysis of Internet backbone traffic and header anomalies observed
-
W. John and S. Tafvelin, "Analysis of Internet backbone traffic and header anomalies observed," in Proc. ACM/USENIX IMC, 2007.
-
(2007)
Proc. ACM/USENIX IMC
-
-
John, W.1
Tafvelin, S.2
-
21
-
-
11844255712
-
Packet dispersion techniques and a capacity-estimation methodology
-
C. Dovrolis, P. Ramanathan, and D. Moore, "Packet dispersion techniques and a capacity-estimation methodology," IEEE/ACM Trans. Networking, vol. 12, no. 6, 2004.
-
(2004)
IEEE/ACM Trans. Networking
, vol.12
, Issue.6
-
-
Dovrolis, C.1
Ramanathan, P.2
Moore, D.3
-
24
-
-
60349101742
-
Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems
-
R. Perdisci, G. Gu, and W. Lee., "Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems," in Proc. IEEE ICDM, 2006.
-
(2006)
Proc. IEEE ICDM
-
-
Perdisci, R.1
Gu, G.2
Lee, W.3
-
25
-
-
17444379739
-
Packet reordering, high speed networks and transport protocol performance
-
L. Gharai, C. Perkins, and T. Lehman, "Packet reordering, high speed networks and transport protocol performance," in Proc. IEEE ICCCN, 2004.
-
(2004)
Proc. IEEE ICCCN
-
-
Gharai, L.1
Perkins, C.2
Lehman, T.3
-
27
-
-
33947517231
-
Measurement and classification of out-of-sequence packets in a tier-1 IP backbone
-
S. Jaiswal, G. Iannaccone, C.Diot, J. Kurose, and D. Towsley, "Measurement and classification of out-of-sequence packets in a tier-1 IP backbone," IEEE/ACM Trans. Networking, vol. 15, no. 1, 2007.
-
(2007)
IEEE/ACM Trans. Networking
, vol.15
, Issue.1
-
-
Jaiswal, S.1
Iannaccone, G.2
Diot, C.3
Kurose, J.4
Towsley, D.5
-
31
-
-
84862913334
-
-
"libssh2," http://www.libssh2.org/, 2011.
-
(2011)
-
-
-
33
-
-
33745802064
-
Detection of interactive stepping stones: Algorithms and confidence bounds
-
A. Blum, D. Song, and S. Venkataraman, "Detection of interactive stepping stones: Algorithms and confidence bounds," in Proc. RAID, 2004.
-
(2004)
Proc. RAID
-
-
Blum, A.1
Song, D.2
Venkataraman, S.3
-
34
-
-
48649102224
-
Efficient detection of delay-constrained relay nodes
-
B. Coskun and N. Memon, "Efficient detection of delay-constrained relay nodes," in Proc. ACSAC, 2007.
-
(2007)
Proc. ACSAC
-
-
Coskun, B.1
Memon, N.2
-
35
-
-
34548755641
-
DSSS-based flow marking technique for invisible traceback
-
W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao, "DSSS-based flow marking technique for invisible traceback," in Proc. IEEE Symp. Security and Privacy, 2007.
-
(2007)
Proc. IEEE Symp. Security and Privacy
-
-
Yu, W.1
Fu, X.2
Graham, S.3
Xuan, D.4
Zhao, W.5
-
36
-
-
84862947832
-
On the secrecy of spread-spectrum flow watermarks
-
X. Luo, J. Zhang, R. Perdisci, and W. Lee, "On the secrecy of spread-spectrum flow watermarks," in Proc. ESORICS, 2010.
-
(2010)
Proc. ESORICS
-
-
Luo, X.1
Zhang, J.2
Perdisci, R.3
Lee, W.4
|