-
2
-
-
33745798251
-
Timing attacks in low-latency mix-based systems
-
Feb
-
B.N. Levine, M.K. Reiter, C. Wang, and M. Wright, "Timing Attacks in Low-Latency Mix-Based Systems," Proc. Eighth Int'l Financial Cryptography (FC) Conf., Feb. 2004.
-
(2004)
Proc. Eighth Int'l Financial Cryptography (FC) Conf.
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.4
-
3
-
-
34250785454
-
On flow correlation attacks and countermeasures in mix networks
-
May
-
Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao, "On Flow Correlation Attacks and Countermeasures in Mix Networks," Proc. Workshop Privacy Enhancing Technologies (PET), May 2004.
-
(2004)
Proc. Workshop Privacy Enhancing Technologies (PET)
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
5
-
-
54049153176
-
Low- resource routing attacks against anonymous systems
-
Oct
-
K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker, "Low- Resource Routing Attacks against Anonymous Systems," Proc. ACM Workshop Privacy Electronic Soc. (WPES), Oct. 2007.
-
(2007)
Proc. ACM Workshop Privacy Electronic Soc. (WPES)
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
7
-
-
34548755641
-
DSSS-based flow marking technique for invisible traceback
-
May
-
W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao, "DSSS-Based Flow Marking Technique for Invisible Traceback," Proc. IEEE Symp. Security and Privacy (S&P), May 2007.
-
(2007)
Proc. IEEE Symp. Security and Privacy (S&P)
-
-
Yu, W.1
Fu, X.2
Graham, S.3
Xuan, D.4
Zhao, W.5
-
10
-
-
74049162773
-
A new cell counter based attack against tor
-
Nov
-
Z. Ling, J. Luo, W. Yu, X. Fu, D. Xuan, and W. Jia, "A New Cell Counter Based Attack against Tor," Proc. 16th ACM Conf. Computer and Comm. Security (CCS), Nov. 2009.
-
(2009)
Proc. 16th ACM Conf. Computer and Comm. Security (CCS)
-
-
Ling, Z.1
Luo, J.2
Yu, W.3
Fu, X.4
Xuan, D.5
Jia, W.6
-
11
-
-
0036086129
-
Statistical identification of encrypted web browsing traffic
-
May
-
Q.X. Sun, D.R. Simon, Y. Wang, W. Russell, V.N. Padmanabhan, and L.L. Qiu, "Statistical Identification of Encrypted Web Browsing Traffic," Proc. IEEE Symp. Security and Privacy (S&P), May 2002.
-
(2002)
Proc. IEEE Symp. Security and Privacy (S&P)
-
-
Sun, Q.X.1
Simon, D.R.2
Wang, Y.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.L.6
-
13
-
-
50249161557
-
Language identification of encrypted VOIP traffic: Alejandra y roberto or alice and bob
-
Aug
-
C.V. Wright, L. Ballard, S.E. Coull, F. Monrose, and G.M. Masson, "Language Identification of Encrypted VOIP Traffic: Alejandra y Roberto or Alice and Bob," Proc. 16th Ann. USENIX Security Symp. (Security), Aug. 2007.
-
(2007)
Proc. 16th Ann. USENIX Security Symp. (Security)
-
-
Wright, C.V.1
Ballard, L.2
Coull, S.E.3
Monrose, F.4
Masson, G.M.5
-
14
-
-
50249140706
-
Spot me if you can: Uncovering spoken phrases in encrypted VOIPconversation
-
May
-
C.V. Wright, L. Ballard, S.E. Coull, F. Monrose, and G.M. Masson, "Spot Me If You Can: Uncovering Spoken Phrases in Encrypted VOIPConversation," Proc. IEEE Symp. Security and Privacy (S&P), May 2008.
-
(2008)
Proc. IEEE Symp. Security and Privacy (S&P)
-
-
Wright, C.V.1
Ballard, L.2
Coull, S.E.3
Monrose, F.4
Masson, G.M.5
-
15
-
-
0028377540
-
On the self-similar nature of ethernet traffic (Extended)
-
Feb
-
W.E. Leland, M.S. Taqqu, W. Willinger, and D.V. Wilson, "On the Self-Similar Nature of Ethernet Traffic (Extended)," IEEE/ACM Trans. Networking, vol. 2, no. 1, pp. 1-15, Feb. 1994.
-
(1994)
IEEE/ACM Trans. Networking
, vol.2
, Issue.1
, pp. 1-15
-
-
Leland, W.E.1
Taqqu, M.S.2
Willinger, W.3
Wilson, D.V.4
-
17
-
-
84887968867
-
-
Anonymizer, Inc., http://www.anonymizer.com/, 2011.
-
(2011)
-
-
-
22
-
-
69749103883
-
Model- based covert timing channels: Automated modeling and evasion
-
Sept
-
S. Gianvecchio, H. Wang, D. Wijesekera, and S. Jajodia, "Model- Based Covert Timing Channels: Automated Modeling and Evasion," Proc. 11th Int'l Symp. Recent Advances in Intrusion Detection (RAID), Sept. 2008.
-
(2008)
Proc. 11th Int'l Symp. Recent Advances in Intrusion Detection (RAID)
-
-
Gianvecchio, S.1
Wang, H.2
Wijesekera, D.3
Jajodia, S.4
-
23
-
-
0000759022
-
Long term storage capacity of reservoirs
-
H.E. Hurst, "Long Term Storage Capacity of Reservoirs," Trans. Am. Soc. Civil Engineers, vol. 116, pp. 770-799, 1951.
-
(1951)
Trans. Am. Soc. Civil Engineers.
, vol.116
, pp. 770-799
-
-
Hurst, H.E.1
-
24
-
-
83055172515
-
A practical guide to measuring the hurst parameter
-
Workshop
-
R.G. Clegg, "A Practical Guide to Measuring the Hurst Parameter," Proc. 21st UK Performance Eng. Workshop, 2005.
-
(2005)
Proc. 21st UK Performance Eng.
-
-
Clegg, R.G.1
-
25
-
-
0000501589
-
Fractional brownian motions, fractional noises and applications
-
Oct
-
B.B. Mandelbrot and J.W.V. Ness, "Fractional Brownian Motions, Fractional Noises and Applications," Soc. Industrial and Applied Math., vol. 10, no. 4, pp. 422-437, Oct. 1968.
-
(1968)
Soc. Industrial and Applied Math.
, vol.10
, Issue.4
, pp. 422-437
-
-
Mandelbrot, B.B.1
Ness, J.W.V.2
-
26
-
-
53349159971
-
-
second ed. Morgan Kaufmann
-
I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, second ed. Morgan Kaufmann, 2007.
-
(2007)
Digital Watermarking and Steganography
-
-
Cox, I.1
Miller, M.2
Bloom, J.3
Fridrich, J.4
Kalker, T.5
-
28
-
-
0033356590
-
A behavioral model of web traffic
-
Network Protocols (ICNP) Sept
-
H.-K. Choi and J.O. Limb, A Behavioral Model of Web Traffic," Proc. IEEE Int'l Conf. Network Protocols (ICNP), Sept. 1999.
-
(1999)
Proc. IEEE Int'l Conf.
-
-
Choi, H.-K.1
Limb, J.O.2
-
29
-
-
67651212225
-
-
Technical Report Intel Corp., Santa Clara, Calif
-
J.J. Lee and M. Gupta, "A New Traffic Model for Current User Web Browsing Behavior," technical report, Intel Corp., Santa Clara, Calif, 2007.
-
(2007)
A New Traffic Model for Current User Web Browsing Behavior
-
-
Lee, J.J.1
Gupta, M.2
-
30
-
-
84887873777
-
NetCamo: Camouflaging network traffic for real-time applications
-
Apr
-
X. Fu, B. Graham, Y. Guan, R. Bettati, and W. Zhao, "NetCamo: Camouflaging Network Traffic for Real-Time Applications," Proc. Texas Workshop Security of Information Systems, Apr. 2003.
-
(2003)
Proc. Texas Workshop Security of Information Systems
-
-
Fu, X.1
Graham, B.2
Guan, Y.3
Bettati, R.4
Zhao, W.5
-
31
-
-
84887885580
-
-
W. Dai, "Pipenet 1.1," http://weidai.com/pipenet.txt, 2011.
-
(2011)
-
-
Dai, W.1
-
33
-
-
50249091568
-
Analytical and empirical analysis of countermeasures to traffic analysis attacks
-
X. Fu, B. Graham, R. Bettati, and W. Zhao, "Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks," Proc. Int'l Conf. Parallel Processing (ICPP), 1 2003.
-
(2003)
Proc. Int'l Conf. Parallel Processing (ICPP)
-
-
Fu, X.1
Graham, B.2
Bettati, R.3
Zhao, W.4
-
35
-
-
84887899205
-
-
"Pen," http://siag.nu/pen, 2011.
-
(2011)
Pen
-
-
-
36
-
-
84861584767
-
-
"Adobe Flash Player," http://www.adobe.com/products/ flashplayer/, 2011.
-
(2011)
Adobe Flash Player
-
-
-
39
-
-
34548314612
-
Tracing Traffic through Intermediate Hosts that Repacketize Flows
-
May
-
Y.J. Pyun, Y.H. Park, X. Wang, D.S. Reeves, and P. Ning, "Tracing Traffic through Intermediate Hosts that Repacketize Flows," Proc. IEEE INFOCOM, May 2007.
-
(2007)
Proc. IEEE INFOCOM
-
-
Pyun, Y.J.1
Park, Y.H.2
Wang, X.3
Reeves, D.S.4
Ning, P.5
-
42
-
-
2442556704
-
Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter- packet delays
-
Nov
-
X. Wang and D.S. Reeves, "Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Manipulation of Inter- Packet Delays," Proc. ACM Conf. Computer and Comm. Security (CCS), Nov. 2003.
-
(2003)
Proc. ACM Conf. Computer and Comm. Security (CCS)
-
-
Wang, X.1
Reeves, D.S.2
|