-
1
-
-
84879538315
-
-
[Online; accessed 11/10/2012]
-
Gartner. http://tinyurl.com/d7ptpqc, 2012. [Online; accessed 11/10/2012].
-
(2012)
-
-
-
2
-
-
84879534021
-
-
[Online; accessed 11/10/2012]
-
Nielsen. http://tinyurl.com/8y2e773, 2012. [Online; accessed 11/10/2012].
-
(2012)
-
-
-
5
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless device identification with radiometric signatures. In Proceedings of the 14th ACM international conference on Mobile Computing and Networking, MobiCom'08, 2008.
-
(2008)
Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, MobiCom'08
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
7
-
-
56749098358
-
Identifying unique devices through wireless fingerprinting
-
L. C. C. Desmond, C. C. Yuan, T. C. Pheng, and R. S. Lee. Identifying unique devices through wireless fingerprinting. In Proceedings of the first ACM conference on Wireless Network Security, WiSec'08, 2008.
-
(2008)
Proceedings of the First ACM Conference on Wireless Network Security, WiSec'08
-
-
Desmond, L.C.C.1
Yuan, C.C.2
Pheng, T.C.3
Lee, R.S.4
-
8
-
-
84878355718
-
Peek-A-boo, i still see you: Why efficient traffic analysis countermeasures fail
-
K. P. Dyer, S. E. Coull, T. Ristenpart, and T. Shrimpton. Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail. In IEEE Symposium on Security and Privacy, SP'12, 2012.
-
(2012)
IEEE Symposium on Security and Privacy, SP'12
-
-
Dyer, K.P.1
Coull, S.E.2
Ristenpart, T.3
Shrimpton, T.4
-
10
-
-
78650882260
-
A first look at traffic on smartphones
-
H. Falaki, D. Lymberopoulos, R. Mahajan, S. Kandula, and D. Estrin. A first look at traffic on smartphones. In Proceedings of the 10th annual conference on Internet Measurement, IMC'10, 2010.
-
(2010)
Proceedings of the 10th Annual Conference on Internet Measurement, IMC'10
-
-
Falaki, H.1
Lymberopoulos, D.2
Mahajan, R.3
Kandula, S.4
Estrin, D.5
-
11
-
-
85018108881
-
Passive data link layer 802.11 wireless device driver fingerprinting
-
J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. Van Randwyk, and D. Sicker. Passive data link layer 802.11 wireless device driver fingerprinting. In Proceedings of the 15th conference on USENIX Security Symposium, USENIX-SS'06, 2006.
-
(2006)
Proceedings of the 15th Conference on USENIX Security Symposium, USENIX-SS'06
-
-
Franklin, J.1
McCoy, D.2
Tabriz, P.3
Neagoe, V.4
Van Randwyk, J.5
Sicker, D.6
-
12
-
-
85180626613
-
Device identification via analog signal fingerprinting: A matched filter approach
-
R. M. Gerdes, T. E. Daniels, M. Mina, and S. F. Russell. Device identification via analog signal fingerprinting: A matched filter approach. In In Proceedings of the Network and Distributed System Security Symposium, NDSS'06, 2006.
-
(2006)
Proceedings of the Network and Distributed System Security Symposium, NDSS'06
-
-
Gerdes, R.M.1
Daniels, T.E.2
Mina, M.3
Russell, S.F.4
-
13
-
-
33745561205
-
An introduction to variable and feature selection
-
I. Guyon and A. Elisseeff. An introduction to variable and feature selection. J. Mach. Learn. Res., 2003.
-
(2003)
J. Mach. Learn. Res.
-
-
Guyon, I.1
Elisseeff, A.2
-
14
-
-
84879513222
-
The breakdown points of the mean combined with some rejection rules
-
F. R. Hampel. The breakdown points of the mean combined with some rejection rules. Technometrics.
-
Technometrics
-
-
Hampel, F.R.1
-
18
-
-
78650117270
-
Devices that tell on you: Privacy trends in consumer ubiquitous computing
-
T. S. Saponas, J. Lester, C. Hartung, S. Agarwal, and T. Kohno. Devices that tell on you: privacy trends in consumer ubiquitous computing. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS'07, 2007.
-
(2007)
Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS'07
-
-
Saponas, T.S.1
Lester, J.2
Hartung, C.3
Agarwal, S.4
Kohno, T.5
-
20
-
-
50249140706
-
Spot me if you can: Uncovering spoken phrases in encrypted voip conversations
-
C. Wright, L. Ballard, S. Coull, F. Monrose, and G. Masson. Spot me if you can: Uncovering spoken phrases in encrypted voip conversations. In IEEE Symposium on Security and Privacy, SP'08, 2008.
-
(2008)
IEEE Symposium on Security and Privacy, SP'08
-
-
Wright, C.1
Ballard, L.2
Coull, S.3
Monrose, F.4
Masson, G.5
-
22
-
-
80051914578
-
Inferring users' online activities through traffic analysis
-
F. Zhang, W. He, X. Liu, and P. G. Bridges. Inferring users' online activities through traffic analysis. In Proceedings of the fourth ACM conference on Wireless Network Security, WiSec'11, 2011.
-
(2011)
Proceedings of the Fourth ACM Conference on Wireless Network Security, WiSec'11
-
-
Zhang, F.1
He, W.2
Liu, X.3
Bridges, P.G.4
|