-
1
-
-
84870641963
-
-
Accessed February 2012
-
Alexa: The Web Information Company. http://www.alexa.com/topsites, 2012. Accessed February 2012.
-
(2012)
-
-
-
2
-
-
84870635038
-
-
iMacros for Firefox. Accessed February 2012
-
iMacros for Firefox. https://addons.mozilla.org/en-US/firefox/addon/ imacros-for-firefox/, 2012. Accessed February 2012.
-
(2012)
-
-
-
4
-
-
79961205200
-
DefenestraTor: Throwing out windows in tor
-
July
-
ALSABAH, M., BAUER, K., GOLDBERG, I., GRUNWALD, D., MCCOY, D., SAVAGE, S., AND VOELKER, G. M. DefenestraTor: Throwing out Windows in Tor. In 11th Privacy Enhancing Technologies Symposium (July 2011), pp. 134-154.
-
(2011)
11th Privacy Enhancing Technologies Symposium
, pp. 134-154
-
-
Alsabah, M.1
Bauer, K.2
Goldberg, I.3
Grunwald, D.4
McCoy, D.5
Savage, S.6
Voelker, G.M.7
-
5
-
-
33846098197
-
Bayesian neural networks for internet traffic classification
-
January
-
AULD, T., MOORE, A., AND GULL, S. Bayesian Neural Networks for Internet Traffic Classification. IEEE Transactions on Neural Networks 18, 1 (January 2007), 223-239.
-
(2007)
IEEE Transactions on Neural Networks 18
, vol.1
, pp. 223-239
-
-
Auld, T.1
Moore, A.2
Gull, S.3
-
6
-
-
85084164002
-
ExperimenTor: A testbed for safe and realistic tor experimentation
-
August
-
BAUER, K., SHERR, M., MCCOY, D., AND GRUNWALD, D. ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation. In Proceedings of the 4th USENIX Workshop on Cyber Security Experimentation and Test (CSET) (August 2011), pp. 51-59.
-
(2011)
Proceedings of the 4th USENIX Workshop on Cyber Security Experimentation and Test (CSET)
, pp. 51-59
-
-
Bauer, K.1
Sherr, M.2
McCoy, D.3
Grunwald, D.4
-
7
-
-
33646890686
-
Traffic classification on the fly
-
April
-
BERNAILLE, L., TEIXEIRA, R., AKODKENOU, I., SOULE, A., AND SALAMATIAN, K. Traffic Classification on the Fly. SIGCOMM Comput. Commun. Rev. 36, 2 (April 2006), 23-26.
-
(2006)
SIGCOMM Comput. Commun. Rev.
, vol.36
, Issue.2
, pp. 23-26
-
-
Bernaille, L.1
Teixeira, R.2
Akodkenou, I.3
Soule, A.4
Salamatian, K.5
-
8
-
-
85084096178
-
One bad apple spoils the bunch: Exploiting P2P applications to trace and profile tor users
-
March
-
BLOND, S. L., MANILS, P., CHAABANE, A., KAAFAR, M. A., CASTELLUCCIA, C., LEGOUT, A., AND DABBOUS, W. One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. In Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats (LEET) (March 2011).
-
(2011)
Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats (LEET)
-
-
Blond, S.L.1
Manils, P.2
Chaabane, A.3
Kaafar, M.A.4
Castelluccia, C.5
Legout, A.6
Dabbous, W.7
-
9
-
-
78650349115
-
Digging into anonymous traffic: A deep analysis of the tor anonymizing network
-
September
-
CHAABANE, A., MANILS, P., AND KAAFAR, M. A. Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network. In Proceedings of the 4th International Conference on Network and System Security (NSS) (September 2010), pp. 167-174.
-
(2010)
Proceedings of the 4th International Conference on Network and System Security (NSS)
, pp. 167-174
-
-
Chaabane, A.1
Manils, P.2
Kaafar, M.A.3
-
11
-
-
85084161366
-
Tor: The second-generation onion router
-
August
-
DINGLEDINE, R., MATHEWSON, N., AND SYVERSON, P. Tor: The Second-Generation Onion Router. In Proceedings of the 13th USENIX Security Symposium (August 2004), pp. 303-320.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
12
-
-
84878355718
-
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
-
May
-
DYER, K. P., COULL, S. E., RISTENPART, T., AND SHRIMPTON, T. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail. In Proceedings of the 2012 IEEE Symposium on Security and Privacy (May 2012), pp. 332-346.
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy
, pp. 332-346
-
-
Dyer, K.P.1
Coull, S.E.2
Ristenpart, T.3
Shrimpton, T.4
-
13
-
-
84944746481
-
Behavioral authentication of server flows
-
December
-
EARLY, J. P., BRODLEY, C. E., AND ROSENBERG, C. Behavioral Authentication of Server Flows. In Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC) (December 2003), pp. 46-56.
-
(2003)
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC)
, pp. 46-56
-
-
Early, J.P.1
Brodley, C.E.2
Rosenberg, C.3
-
14
-
-
0031276011
-
Bayesian network classifiers
-
November/December
-
FRIEDMAN, N., GEIGER, D., AND GOLDSZMIDT, M. Bayesian Network Classifiers. Mach. Learn. 29, 2-3 (November/December 1997), 131-163.
-
(1997)
Mach. Learn.
, vol.29
, Issue.2-3
, pp. 131-163
-
-
Friedman, N.1
Geiger, D.2
Goldszmidt, M.3
-
16
-
-
43249121087
-
Characterizing user sessions on YouTube
-
January
-
GILL, P., ARLITT, M., LI, Z., AND MAHANTI, A. Characterizing User Sessions on YouTube. In Proceedings of the 15th IEEE Multimedia Computing and Networking (MMCN) (January 2008).
-
(2008)
Proceedings of the 15th IEEE Multimedia Computing and Networking (MMCN)
-
-
Gill, P.1
Arlitt, M.2
Li, Z.3
Mahanti, A.4
-
17
-
-
76749092270
-
The WEKA data mining software: An update
-
November
-
HALL, M., FRANK, E., HOLMES, G., PFAHRINGER, B., REUTEMANN, P., AND WITTEN, I. H. The WEKA Data Mining Software: An Update. SIGKDD Explor. Newsl. 11, 1 (November 2009), 10-18.
-
(2009)
SIGKDD Explor. Newsl.
, vol.11
, Issue.1
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
18
-
-
84947902272
-
Tracking the evolution of web traffic: 1995-2003
-
HERNÁNDEZ-CAMPOS, F., JEFFAY, K., AND SMITH, F. D. Tracking the Evolution of Web Traffic: 1995-2003. In Proceedings of the 11th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer Telecommunication Systems (MASCOTS) (2003), pp. 16-25.
-
(2003)
Proceedings of the 11th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer Telecommunication Systems (MASCOTS)
, pp. 16-25
-
-
Hernández-Campos, F.1
Jeffay, K.2
Smith, F.D.3
-
19
-
-
74049147408
-
Website fingerprinting: Attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier
-
November
-
HERRMANN, D., WENDOLSKY, R., AND FEDERRATH, H. Website Fingerprinting: Attacking Popular Privacy Enhancing Technologies with the Multinomial Naïve-Bayes Classifier. In Proceedings of the ACM Cloud Computing Security Workshop (CCSW) (November 2009), pp. 31-42.
-
(2009)
Proceedings of the ACM Cloud Computing Security Workshop (CCSW)
, pp. 31-42
-
-
Herrmann, D.1
Wendolsky, R.2
Federrath, H.3
-
21
-
-
78650009813
-
Recruiting new tor relays with BRAIDS
-
(New York, NY, USA), CCS '10, ACM
-
JANSEN, R., HOPPER, N., AND KIM, Y. Recruiting New Tor Relays with BRAIDS. In Proceedings of the 17th ACM Conference on Computer and Communications Security (New York, NY, USA, 2010), CCS '10, ACM, pp. 319-328.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 319-328
-
-
Jansen, R.1
Hopper, N.2
Kim, Y.3
-
23
-
-
84870636523
-
-
Accessed January, 2012
-
KARDI, T. Recursive Average and Variance. http://people.revoledu.com/ kardi/tutorial/RecursiveStatistic/index.html, 2006. Accessed January, 2012.
-
(2006)
Recursive Average and Variance
-
-
Kardi, T.1
-
24
-
-
70350771144
-
Internet traffic classification demystified: Myths, caveats, and the best practices
-
December
-
KIM, H., CLAFFY, K., FOMENKOV, M., BARMAN, D., FALOUTSOS, M., AND LEE, K. Internet Traffic Classification Demystified: Myths, Caveats, and the Best Practices. In Proceedings of the ACM CoNEXT Conference (December 2008), pp. 11:1-11:12.
-
(2008)
Proceedings of the ACM CoNEXT Conference
, pp. 111-1112
-
-
Kim, H.1
Claffy, K.2
Fomenkov, M.3
Barman, D.4
Faloutsos, M.5
Lee, K.6
-
25
-
-
21244500957
-
Logistic model trees
-
May
-
LANDWEHR, N., HALL, M., AND FRANK, E. Logistic Model Trees. Mach. Learn. 59, 1-2 (May 2005), 161-205.
-
(2005)
Mach. Learn.
, vol.59
, Issue.1-2
, pp. 161-205
-
-
Landwehr, N.1
Hall, M.2
Frank, E.3
-
28
-
-
84877785008
-
On dominant characteristics of residential broadband internet traffic
-
November
-
MAIER, G., FELDMANN, A., PAXSON, V., AND ALLMAN, M. On Dominant Characteristics of Residential Broadband Internet Traffic. In Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement (November 2009), pp. 90-102.
-
(2009)
Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement
, pp. 90-102
-
-
Maier, G.1
Feldmann, A.2
Paxson, V.3
Allman, M.4
-
29
-
-
50249133191
-
Shining light in dark places: Understanding the tor network
-
July
-
MCCOY, D., BAUER, K., GRUNWALD, D., KOHNO, T., AND SICKER, D. Shining Light in Dark Places: Understanding the Tor Network. In Proceedings of the 8th Privacy Enhancing Technologies Symposium (July 2008), pp. 63-76.
-
(2008)
Proceedings of the 8th Privacy Enhancing Technologies Symposium
, pp. 63-76
-
-
McCoy, D.1
Bauer, K.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
31
-
-
84855656395
-
Exploring the potential benefits of expanded rate limiting in tor: Slow and steady wins the race with tortoise
-
December
-
MOORE, W. B., WACEK, C., AND SHERR, M. Exploring the Potential Benefits of Expanded Rate Limiting in Tor: Slow and Steady Wins the Race with Tortoise. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC) (December 2011), pp. 207-216.
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC)
, pp. 207-216
-
-
Moore, W.B.1
Wacek, C.2
Sherr, M.3
-
32
-
-
77955329624
-
Building incentives into tor
-
January
-
NGAN, T.-W. J., DINGLEDINE, R., AND WALLACH, D. S. Building Incentives into Tor. In Proceedings of the 14th International Conference on Financial Cryptography and Data Security (FC) (January 2010), pp. 238-256.
-
(2010)
Proceedings of the 14th International Conference on Financial Cryptography and Data Security (FC)
, pp. 238-256
-
-
Ngan, T.-W.J.1
Dingledine, R.2
Wallach, D.S.3
-
33
-
-
80955131237
-
Website fingerprinting in onion routing based anonymization networks
-
October
-
PANCHENKO, A., NIESSEN, L., ZINNEN, A., AND ENGEL, T. Website Fingerprinting in Onion Routing Based Anonymization Networks. In Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES) (October 2011), pp. 103-114.
-
(2011)
Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES)
, pp. 103-114
-
-
Panchenko, A.1
Niessen, L.2
Zinnen, A.3
Engel, T.4
-
34
-
-
14944383480
-
Class-of-service Mapping for QoS: A statistical signature-based approach to IP traffic classification
-
October
-
ROUGHAN, M., SEN, S., SPATSCHECK, O., AND DUFFIELD, N. Class-of-service Mapping for QoS: A Statistical Signature-based Approach to IP Traffic Classification. In Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement (October 2004), pp. 135-148.
-
(2004)
Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement
, pp. 135-148
-
-
Roughan, M.1
Sen, S.2
Spatscheck, O.3
Duffield, N.4
-
35
-
-
84870648192
-
-
October
-
SANDVINE. Sandvine Global Internet Phenomena Report - Fall 2011. http://www.sandvine.com/downloads/documents/10-26-2011-phenomena/ Sandvine%20Global%20Internet%20Phenomena%20Report%20-%20Fall%202011.pdf, October 2011.
-
(2011)
Sandvine Global Internet Phenomena Report - Fall 2011
-
-
-
37
-
-
84870633783
-
-
Accessed January 2012
-
THE TOR PROJECT. Tor Metrics Portal: Data. https://metrics.torproject. org/data.html#performance. Accessed January 2012.
-
Tor Metrics Portal: Data
-
-
|