-
1
-
-
0004141648
-
-
MIT Press, Cambridge, MA
-
Diffie, W. and Landau, S., Privacy on the Line: The Politics of Wiretapping and Encryption, MIT Press, Cambridge, MA, 1998.
-
(1998)
Privacy on the Line: The Politics of Wiretapping and Encryption
-
-
Diffie, W.1
Landau, S.2
-
5
-
-
85056511317
-
British Ruse Held Iraqi’s Attention While Real Invasion Came Elsewhere
-
3 March
-
Fullerton, J., British Ruse Held Iraqi’s Attention While Real Invasion Came Elsewhere, The Philadelphia Inquirer, 3 March 1991.
-
(1991)
The Philadelphia Inquirer
-
-
Fullerton, J.1
-
6
-
-
85056548539
-
Planespotting: Nerds with binoculars bust the CIA’s torture taxis
-
15 October
-
Paglen, T. and Thompson, A.C., Planespotting: Nerds with binoculars bust the CIA’s torture taxis, The Village Voice, 15 October, 2006.
-
(2006)
The Village Voice
-
-
Paglen, T.1
Thompson, A.C.2
-
9
-
-
0001504032
-
An experimental study of the small world problem
-
Travers, J. and Milgram, S., An experimental study of the small world problem, Sociometry, 32, 1969.
-
(1969)
Sociometry
, pp. 32
-
-
Travers, J.1
Milgram, S.2
-
10
-
-
0003692261
-
-
Cambridge University Press, London
-
Lin, N. and Smith, J., Social Capital: A Theory of Social Structure and Action, vol. 19 of Structural Analysis in the Social Sciences, Cambridge University Press, London, 2002.
-
(2002)
Social Capital: A Theory of Social Structure and Action, vol. 19 of Structural Analysis in the Social Sciences
-
-
Lin, N.1
Smith, J.2
-
11
-
-
84917038100
-
A brief introduction to scale-free networks
-
Department of Mathematics and Statistics, University of Victoria, British Columbia
-
Reed, W.J., A brief introduction to scale-free networks, Technical report, Department of Mathematics and Statistics, University of Victoria, British Columbia, 2004.
-
(2004)
Technical report
-
-
Reed, W.J.1
-
12
-
-
0242549048
-
Destabilizing networks
-
Carley, K.M., Lee, J.S., and Krackhardt, D., Destabilizing networks, Connections, 22, 79, 2002.
-
(2002)
Connections
, vol.22
, pp. 79
-
-
Carley, K.M.1
Lee, J.S.2
Krackhardt, D.3
-
13
-
-
7644231652
-
Leaderless resistance today
-
Garfinkel, S.L., Leaderless resistance today, First Monday, 3, 2003.
-
(2003)
First Monday
, pp. 3
-
-
Garfinkel, S.L.1
-
14
-
-
48649088885
-
The topology of covert conflict
-
University of Cambridge, Computer Laboratory
-
Nagaraja, S. and Anderson, R., The topology of covert conflict, Technical Report UCAM-CL-TR-637, University of Cambridge, Computer Laboratory, 2005.
-
(2005)
Technical Report UCAM-CL-TR-637
-
-
Nagaraja, S.1
Anderson, R.2
-
15
-
-
0012254042
-
The application of network analysis to criminal intelligence: An assessment of the prospects
-
Sparrow, M.K., The application of network analysis to criminal intelligence: An assessment of the prospects, Social Networks, 13, 251, 1991.
-
(1991)
Social Networks
, vol.13
, pp. 251
-
-
Sparrow, M.K.1
-
16
-
-
0242465495
-
The network paradigm applied to criminal organisations
-
Klerks, P., The network paradigm applied to criminal organisations, Connections, 24, 53, 2001.
-
(2001)
Connections
, vol.24
, pp. 53
-
-
Klerks, P.1
-
18
-
-
34547152602
-
-
U.S. Army, Washington, D.C
-
U.S. Army Headquarters Department, Field Manual 3-24: Counterinsurgency, U.S. Army, Washington, D.C., 2006.
-
(2006)
Field Manual 3-24: Counterinsurgency
-
-
-
19
-
-
7644224668
-
Uncloaking terrorist networks
-
Krebs, V.E., Uncloaking terrorist networks, First Monday, 7, 2002.
-
(2002)
First Monday
, pp. 7
-
-
Krebs, V.E.1
-
20
-
-
33646402199
-
Estimating the shape of covert networks
-
National Defense War College, Washington D.C. Evidence-Based Research, Track 3, Electronic Publication, Vienna, VA., CCRP
-
Dombroski, M., Fischbeck, P., and Carley, K., Estimating the shape of covert networks, in Proceedings of the 8th International Command and Control Research and Technology Symposium. National Defense War College, Washington D.C. Evidence-Based Research, Track 3, Electronic Publication, Vienna, VA., CCRP, 2003.
-
(2003)
Proceedings of the 8th International Command and Control Research and Technology Symposium
-
-
Dombroski, M.1
Fischbeck, P.2
Carley, K.3
-
21
-
-
0013113240
-
Adaptive fraud detection
-
Fawcett, T. and Provost, F., Adaptive fraud detection, Journal Data Mining and Knowledge Discovery, 1, 291, 1997.
-
(1997)
Journal Data Mining and Knowledge Discovery
, vol.1
, pp. 291
-
-
Fawcett, T.1
Provost, F.2
-
23
-
-
0031617713
-
Inferring web communities from link topology
-
ACM Press, New York
-
Gibson, D., Kleinberg, J., and Raghavan, P., Inferring web communities from link topology, in Proceedings of the 9th ACM Conference on Hypertext and Hypermedia, ACM Press, New York, 1998.
-
(1998)
Proceedings of the 9th ACM Conference on Hypertext and Hypermedia
-
-
Gibson, D.1
Kleinberg, J.2
Raghavan, P.3
-
24
-
-
0003780986
-
The pagerank citation ranking: Bringing order to the web
-
Stanford Digital Library Technologies Project
-
Page, L. et al., The pagerank citation ranking: Bringing order to the web, Technical report, Stanford Digital Library Technologies Project, 1998.
-
(1998)
Technical report
-
-
Page, L.1
-
25
-
-
84893721621
-
Hubs, authorities, and communities
-
Kleinberg, J.M., Hubs, authorities, and communities, ACM Computing Surveys, 31, 5, 1999.
-
(1999)
ACM Computing Surveys
, vol.31
, pp. 5
-
-
Kleinberg, J.M.1
-
27
-
-
85084161110
-
Timing analysis of keystrokes and timing attacks on SSH
-
USENIX, Washington, D.C
-
Song, D.X., Wagner, D., and Tian, X., Timing analysis of keystrokes and timing attacks on SSH, in Tenth USENIX Security Symposium, USENIX, Washington, D.C., 2001.
-
(2001)
Tenth USENIX Security Symposium
-
-
Song, D.X.1
Wagner, D.2
Tian, X.3
-
28
-
-
0033281372
-
Password hardening based on keystroke dynamics
-
ACM Press, New York
-
Monrose, F., Reiter, M.K., and Wetzel, S., Password hardening based on keystroke dynamics, in ACM Conference on Computer and Communications Security, 73, ACM Press, New York, 1999.
-
(1999)
ACM Conference on Computer and Communications Security
, pp. 73
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
30
-
-
84957796461
-
Fingerprinting websites using traffic analysis
-
R. Dingledine and P.F. Syverson, Eds, Springer-Verlag, Heidelberg, Germany
-
Hintz, A., Fingerprinting websites using traffic analysis, in R. Dingledine and P.F. Syverson, Eds., Privacy Enhancing Technologies, vol. 2482 of Lecture Notes in Computer Science, 171, Springer-Verlag, Heidelberg, Germany, 2002.
-
(2002)
Privacy Enhancing Technologies, vol. 2482 of Lecture Notes in Computer Science
, pp. 171
-
-
Hintz, A.1
-
31
-
-
0036086129
-
Statistical identification of encrypted web browsing traffic
-
IEEE Computer Security Press, Los Alamitos, CA
-
Sun, Q. et al., Statistical identification of encrypted web browsing traffic, in IEEE Symposium on Security and Privacy, 19, IEEE Computer Security Press, Los Alamitos, CA, 2002.
-
(2002)
IEEE Symposium on Security and Privacy
, pp. 19
-
-
Sun, Q.1
-
33
-
-
38549152519
-
Privacy vulnerabilities in encrypted HTTP streams
-
G. Danezis and D. Martin, Eds, Springer-Verlag, Heidelberg, Germany
-
Bissias, G.D. et al., Privacy vulnerabilities in encrypted HTTP streams, in G. Danezis and D. Martin, Eds., Privacy Enhancing Technologies, vol. 3856 of Lecture Notes in Computer Science, 1, Springer-Verlag, Heidelberg, Germany, 2005.
-
(2005)
Privacy Enhancing Technologies, vol. 3856 of Lecture Notes in Computer Science
, pp. 1
-
-
Bissias, G.D.1
-
34
-
-
33646432160
-
Computing the entropy of user navigation in the web
-
Levene, M. and Loizou, G., Computing the entropy of user navigation in the web, International Journal of Information Technology and Decision Making, 2, 459, 2003.
-
(2003)
International Journal of Information Technology and Decision Making
, vol.2
, pp. 459
-
-
Levene, M.1
Loizou, G.2
-
35
-
-
0034449227
-
Timing attacks on web privacy
-
ACM Press, New York
-
Felten, E.W. and Schneider, M.A., Timing attacks on web privacy, in ACM Conference on Computer and Communications Security, 25, ACM Press, New York, 2000.
-
(2000)
ACM Conference on Computer and Communications Security
, pp. 25
-
-
Felten, E.W.1
Schneider, M.A.2
-
36
-
-
27544460278
-
Remote physical device fingerprinting
-
IEEE Computer Society Press, Los Alamitos, CA
-
Kohno, T., Broido, A., and Claffy, k.c., Remote physical device fingerprinting, in IEEE Symposium on Security and Privacy [?], IEEE Computer Society Press, Los Alamitos, CA, 211.
-
IEEE Symposium on Security and Privacy [?]
, pp. 211
-
-
Kohno, T.1
Broido, A.2
Claffy, K.C.3
-
37
-
-
34547339276
-
Hot or not: Revealing hidden services by their clock skew
-
A. Juels, R.N.Wright, and S.D.C. di Vimercati, Eds, Alexandria, VA, ACM Press, New York
-
Murdoch, S.J., Hot or not: Revealing hidden services by their clock skew, in A. Juels, R.N.Wright, and S.D.C. di Vimercati, Eds., 13th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, 27, ACM Press, New York, 2006.
-
(2006)
13th ACM Conference on Computer and Communications Security (CCS)
, pp. 27
-
-
Murdoch, S.J.1
-
38
-
-
85084161366
-
Tor: The secondgeneration onion router
-
USENIX, San Diego, CA
-
Dingledine, R., Mathewson, N., and Syverson, P., Tor: The secondgeneration onion router, in Proceedings of the 13th USENIX Security Symposium, USENIX, San Diego, CA, 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
39
-
-
0141762463
-
A technique for counting NATted hosts
-
ACM Press, New York
-
Bellovin, S.M., A technique for counting NATted hosts, in Internet Measurement Workshop, 267, ACM Press, New York, 2002.
-
(2002)
Internet Measurement Workshop
, pp. 267
-
-
Bellovin, S.M.1
-
42
-
-
85056553125
-
Privacy extensions for stateless address autoconfiguration in IPv6-“requirements for unobservability,”
-
Stockholm
-
Pascual, A.E., Privacy extensions for stateless address autoconfiguration in IPv6-“requirements for unobservability,” in RVP02, Stockholm, Stockholm, 2002.
-
(2002)
RVP02, Stockholm
-
-
Pascual, A.E.1
-
44
-
-
85056500595
-
-
Snort team, Snort, http://www.snort.org/.
-
Snort
-
-
-
45
-
-
85056502794
-
-
Fyodor, Nmap manual, 2006, http://www.insecure.org/nmap/man/.
-
(2006)
Nmap manual
-
-
Fyodor1
-
46
-
-
2442556704
-
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
-
S. Jajodia, V. Atluri, and T. Jaeger, Eds, ACM Press, New York
-
Wang, X. and Reeves, D.S., Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays, in S. Jajodia, V. Atluri, and T. Jaeger, Eds., ACM Conference on Computer and Communications Security, 20, ACM Press, New York, 2003.
-
(2003)
ACM Conference on Computer and Communications Security
, pp. 20
-
-
Wang, X.1
Reeves, D.S.2
-
47
-
-
35048846490
-
Detection of interactive stepping stones: Algorithms and confidence bounds
-
E. Jonsson, A. Valdes, and M. Almgren, Eds, Springer-Verlag, Heidelberg, Germany
-
Blum, A., Song, D.X., and Venkataraman, S., Detection of interactive stepping stones: Algorithms and confidence bounds, in E. Jonsson, A. Valdes, and M. Almgren, Eds., RAID, vol. 3224 of Lecture Notes in Computer Science, 258, Springer-Verlag, Heidelberg, Germany, 2004.
-
(2004)
RAID, vol. 3224 of Lecture Notes in Computer Science
, pp. 258
-
-
Blum, A.1
Song, D.X.2
Venkataraman, S.3
-
48
-
-
84957003012
-
Inter-packet delay-based correlation for tracing encrypted connections through stepping stones
-
D. Gollmann, G. Karjoth, and M. Waidner, Eds, Springer-Verlag, Heidelberg, Germany
-
Wang, X., Reeves, D.S., and Wu, S.F., Inter-packet delay-based correlation for tracing encrypted connections through stepping stones, in D. Gollmann, G. Karjoth, and M. Waidner, Eds., ESORICS, vol. 2502 of Lecture Notes in Computer Science, 244, Springer-Verlag, Heidelberg, Germany, 2002.
-
(2002)
ESORICS, vol. 2502 of Lecture Notes in Computer Science
, pp. 244
-
-
Wang, X.1
Reeves, D.S.2
Wu, S.F.3
-
49
-
-
33751040560
-
On the secrecy of timing-based active watermarking trace-back techniques
-
IEEE Computer Society Press, Los Alamitos, CA
-
Peng, P., Ning, P., and Reeves, D.S., On the secrecy of timing-based active watermarking trace-back techniques, in S&P 2006 [?], IEEE Computer Society Press, Los Alamitos, CA, 334.
-
S&P 2006 [?]
, pp. 334
-
-
Peng, P.1
Ning, P.2
Reeves, D.S.3
-
50
-
-
0012768657
-
-
Ph.D. thesis, Royal Institute of Technology-KTH/IMIT, Stockholm, Sweden
-
Pascual, A.E., Anonymous untraceable communications: Location privacy in mobile internetworking, Ph.D. thesis, Royal Institute of Technology-KTH/IMIT, Stockholm, Sweden, 2001.
-
(2001)
Anonymous untraceable communications: Location privacy in mobile internetworking
-
-
Pascual, A.E.1
-
51
-
-
38349013851
-
-
MIT Media Lab Human Dynamics Group, Reality mining, http://reality.media.mit.edu/.
-
Reality mining
-
-
-
52
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D., Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, 24, 84, 1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 84
-
-
Chaum, D.1
-
53
-
-
33646064357
-
Designing and attacking anonymous communication systems
-
University of Cambridge, Computer Laboratory
-
Danezis, G., Designing and attacking anonymous communication systems, Technical Report UCAM-CL-TR-594, University of Cambridge, Computer Laboratory, 2004.
-
(2004)
Technical Report UCAM-CL-TR-594
-
-
Danezis, G.1
-
54
-
-
31844450130
-
On the anonymity of anonymity systems
-
University of Cambridge, Computer Laboratory
-
Serjantov, A., On the anonymity of anonymity systems, Technical Report UCAM-CL-TR-604, University of Cambridge, Computer Laboratory, 2004.
-
(2004)
Technical Report UCAM-CL-TR-604
-
-
Serjantov, A.1
-
55
-
-
20144367905
-
Mixmaster Remailers
-
A. Oram, Ed, O’Reilly, Sevastapol, CA
-
Langley, A., Mixmaster Remailers. In A. Oram, Ed., Peer-to-Peer: Harnessing the Benefits of a Disruptive Technology, O’Reilly, Sevastapol, CA, 2001.
-
(2001)
Peer-to-Peer: Harnessing the Benefits of a Disruptive Technology
-
-
Langley, A.1
-
56
-
-
84954409133
-
Mixminion: Design of a type III anonymous remailer protocol
-
IEEE, Berkeley, CA
-
Danezis, G., Dingledine, R., and Mathewson, N., Mixminion: Design of a type III anonymous remailer protocol, in IEEE Symposium on Security and Privacy, IEEE, Berkeley, CA, 2003.
-
(2003)
IEEE Symposium on Security and Privacy
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
57
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable Internet access
-
H. Federrath, Ed., Springer-Verlag, Heidelberg, Germany
-
Berthold, O., Federrath, H., and Köpsell, S., Web MIXes: A system for anonymous and unobservable Internet access, in H. Federrath, Ed., Designing Privacy Enhancing Technologies, vol. 2009 of LNCS, 115, Springer-Verlag, Heidelberg, Germany, 2000.
-
(2000)
Designing Privacy Enhancing Technologies, vol. 2009 of LNCS
, pp. 115
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
58
-
-
3042699909
-
Measuring anonymity: The disclosure attack
-
Agrawal, D. and Kesdogan, D., Measuring anonymity: The disclosure attack, IEEE Security and Privacy, 1, 27, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, pp. 27
-
-
Agrawal, D.1
Kesdogan, D.2
-
61
-
-
33751039759
-
-
S&P, [?], IEEE Computer Society Press, Los Alamitos, CA
-
Kesdogan, D. et al., Fundamental limits on the anonymity provided by the mix technique, in S&P 2006 [?], IEEE Computer Society Press, Los Alamitos, CA, 86.
-
(2006)
Fundamental limits on the anonymity provided by the mix technique
, pp. 86
-
-
Kesdogan, D.1
-
62
-
-
85180737609
-
An analysis of the degradation of anonymous protocols
-
The Internet Society
-
Wright, M. et al., An analysis of the degradation of anonymous protocols, in NDSS, The Internet Society, 2002.
-
(2002)
NDSS
-
-
Wright, M.1
-
63
-
-
27544454707
-
-
S&P, [?], IEEE Computer Society Press, Los Alamitos, CA
-
Murdoch, S.J. and Danezis, G., Low-cost traffic analysis of Tor, in S&P 2005 [?], IEEE Computer Society Press, Los Alamitos, CA, 183.
-
(2005)
Low-cost traffic analysis of Tor
, pp. 183
-
-
Murdoch, S.J.1
Danezis, G.2
-
64
-
-
85056495458
-
And bomb the anchovies
-
13 August
-
Gray, P., And bomb the anchovies, Time, 13 August, 1990.
-
(1990)
Time
-
-
Gray, P.1
-
66
-
-
0030642878
-
Probable plaintext cryptanalysis of the IP security protocols
-
IEEE Computer Society Press, Los Alamitos, CA
-
Bellovin, S.M., Probable plaintext cryptanalysis of the IP security protocols, in NDSS, IEEE Computer Society Press, Los Alamitos, CA, 1997.
-
(1997)
NDSS
-
-
Bellovin, S.M.1
-
68
-
-
70749088653
-
Transmission schedules to prevent traffic analysis
-
IEEE, New York
-
Venkatraman, B. and Newman-Wolfe, R., Transmission schedules to prevent traffic analysis, Proceedings of the Ninth Annual Computer Security Applications Conference, IEEE, New York, 108, 1993.
-
(1993)
Proceedings of the Ninth Annual Computer Security Applications Conference
, pp. 108
-
-
Venkatraman, B.1
Newman-Wolfe, R.2
-
69
-
-
35248877248
-
Metrics for trafic analysis prevention
-
R. Dingledine, Ed, Springer-Verlag, Heidelberg, Germany
-
Newman, R.E. et al., Metrics for trafic analysis prevention, in R. Dingledine, Ed., Privacy Enhancing Technologies, vol. 2760 of Lecture Notes in Computer Science, 48, Springer-Verlag, Heidelberg, Germany, 2003.
-
(2003)
Privacy Enhancing Technologies, vol. 2760 of Lecture Notes in Computer Science
, pp. 48
-
-
Newman, R.E.1
-
70
-
-
0020762394
-
Security mechanisms in high-level network protocols
-
Voydock, V. and Kent, S., Security mechanisms in high-level network protocols, ACM Computing Surveys (CSUR), 15, 135, 1983.
-
(1983)
ACM Computing Surveys (CSUR)
, vol.15
, pp. 135
-
-
Voydock, V.1
Kent, S.2
-
72
-
-
0033282985
-
Preventing traffic analysis for real-time communication networks
-
IEEE Computer Society Press, Los Alamitos, CA
-
Guan, Y. et al., Preventing traffic analysis for real-time communication networks, in Proceedings of The IEEE Military Communication Conference (MILCOM) '99, November 1999, IEEE Computer Society Press, Los Alamitos, CA, 1999.
-
(1999)
Proceedings of The IEEE Military Communication Conference (MILCOM) '99, November 1999
-
-
Guan, Y.1
-
73
-
-
0006890169
-
Efficient traffic camouflaging in mission-critical QoSguaranteed networks
-
IEEE Computer Society Press, Los Alamitos, CA
-
Guan, Y. et al., Efficient traffic camouflaging in mission-critical QoSguaranteed networks, in Proceedings of IEEE Information Assurance and Security Workshop, West Point, June 2000, 143, IEEE Computer Society Press, Los Alamitos, CA, 2000.
-
(2000)
Proceedings of IEEE Information Assurance and Security Workshop, West Point, June 2000
, pp. 143
-
-
Guan, Y.1
-
74
-
-
0035402083
-
Netcamo: Camouflaging network traffic for QoS-guaranteed mission critical applications
-
Guan, Y. et al., Netcamo: Camouflaging network traffic for QoS-guaranteed mission critical applications, IEEE Transactions on Systems, Man, and Cybernetics, Part A, 31, 253, 2001.
-
(2001)
IEEE Transactions on Systems, Man, and Cybernetics, Part A
, vol.31
, pp. 253
-
-
Guan, Y.1
-
75
-
-
85056549806
-
Towards a U.S. data-retention standard for ISPs
-
Petersen, R., Towards a U.S. data-retention standard for ISPs, Educause Review, 41, 78, 2006.
-
(2006)
Educause Review
, vol.41
, pp. 78
-
-
Petersen, R.1
-
77
-
-
44349151297
-
Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC
-
European Union, Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC, Official Journal of the European Union, L 105, 54, 2006.
-
(2006)
Official Journal of the European Union
, vol.L 105
, pp. 54
-
-
|