-
2
-
-
0005540823
-
-
Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA
-
R. A. Baeza-Yates and B. Ribeiro-Neto. Modern Information Retrieval. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1999.
-
(1999)
Modern Information Retrieval
-
-
Baeza-Yates, R.A.1
Ribeiro-Neto, B.2
-
3
-
-
0041534324
-
Characteristics of network traffic flow anomalies
-
New York, NY, USA ACM
-
P. Barford and D. Plonka. Characteristics of network traffic flow anomalies. In Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, IMW '01, pages 69-73, New York, NY, USA, 2001. ACM.
-
(2001)
Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, IMW '01
, pp. 69-73
-
-
Barford, P.1
Plonka, D.2
-
5
-
-
77955197190
-
Side-channel leaks in web applications: A reality today, a challenge tomorrow
-
Ieee
-
S. Chen, R. Wang, X. Wang, and K. Zhang. Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, pages 191-206. Ieee, 2010.
-
(2010)
Proceedings of the 2010 IEEE Symposium on Security and Privacy
, pp. 191-206
-
-
Chen, S.1
Wang, R.2
Wang, X.3
Zhang, K.4
-
6
-
-
84883095467
-
Networkprofiler: Towards automatic fingerprinting of android apps
-
S. Dai, A. Tongaonkary, X. Wang, A. Nucci, and D. Song. Networkprofiler: Towards automatic fingerprinting of android apps. In Proceedings of the 32nd IEEE International Conference on Computer Communications, 2013.
-
(2013)
Proceedings of the 32nd IEEE International Conference on Computer Communications
-
-
Dai, S.1
Tongaonkary, A.2
Wang, X.3
Nucci, A.4
Song, D.5
-
8
-
-
56749098358
-
Identifying unique devices through wireless fingerprinting
-
New York, New York, USA ACM Press
-
L. C. C. Desmond, C. C. Yuan, T. C. Pheng, and R. S. Lee. Identifying unique devices through wireless fingerprinting. In Proceedings of the first ACM conference on Wireless network security-WiSec '08, page 46, New York, New York, USA, 2008. ACM Press.
-
(2008)
Proceedings of the First ACM Conference on Wireless Network Security-WiSec ' 08
, pp. 46
-
-
Desmond, L.C.C.1
Yuan, C.C.2
Pheng, T.C.3
Lee, R.S.4
-
10
-
-
84878355718
-
Peek-a-Boo, i still see you: Why efficient traffic analysis countermeasures fail
-
Washington, DC, USA IEEE Computer Society
-
K. P. Dyer, S. E. Coull, T. Ristenpart, and T. Shrimpton. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP '12, pages 332-346, Washington, DC, USA, 2012. IEEE Computer Society.
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP '12
, pp. 332-346
-
-
Dyer, K.P.1
Coull, S.E.2
Ristenpart, T.3
Shrimpton, T.4
-
12
-
-
85018108881
-
Passive data link layer 802.11 wireless device driver fingerprinting
-
J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. Van Randwyk, and D. Sicker. Passive data link layer 802.11 wireless device driver fingerprinting. Proceedings of the 15th conference on USENIX Security Symposium, 15:167-178, 2006.
-
(2006)
Proceedings of the 15th Conference on USENIX Security Symposium
, vol.15
, pp. 167-178
-
-
Franklin, J.1
McCoy, D.2
Tabriz, P.3
Neagoe, V.4
Van Randwyk, J.5
Sicker, D.6
-
13
-
-
84861590403
-
Analyzing characteristic host access patterns for re-identification of web user sessions
-
D. Herrmann, C. Gerber, C. Banse, and H. Federrath. Analyzing Characteristic Host Access Patterns for Re-Identification of Web User Sessions. In Proceedings of the 15th Nordic conference on Information Security Technology for Applications, pages 136-154, 2012.
-
(2012)
Proceedings of the 15th Nordic Conference on Information Security Technology for Applications
, pp. 136-154
-
-
Herrmann, D.1
Gerber, C.2
Banse, C.3
Federrath, H.4
-
16
-
-
0036647190
-
An efficient k-means clustering algorithm: Analysis and implementation
-
T. Kanungo, D. M. Mount, N. S. Netanyahu, C. D. Piatko, R. Silverman, and A. Y. Wu. An efficient k-means clustering algorithm: Analysis and implementation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(7):881-892, 2002.
-
(2002)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.24
, Issue.7
, pp. 881-892
-
-
Kanungo, T.1
Mount, D.M.2
Netanyahu, N.S.3
Piatko, C.D.4
Silverman, R.5
Wu, A.Y.6
-
17
-
-
33847303101
-
BLINC: Multilevel traffic classification in the dark
-
T. Karagiannis, K. Papagiannaki, and M. Faloutsos. BLINC: Multilevel traffic classification in the dark. In Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, pages 229-240, 2005.
-
(2005)
Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 229-240
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
18
-
-
38049181167
-
Profiling the end host
-
T. Karagiannis, K. Papagiannaki, N. Taft, and M. Faloutsos. Profiling the end host. In Passive and Active Network Measurement, 8th Internatinoal Conference, PAM 2007, pages 186-196, 2007.
-
(2007)
Passive and Active Network Measurement, 8th Internatinoal Conference, PAM 2007
, pp. 186-196
-
-
Karagiannis, T.1
Papagiannaki, K.2
Taft, N.3
Faloutsos, M.4
-
19
-
-
24344507334
-
Remote physical device fingerprinting
-
T. Kohno, A. Broido, and K. C. Claffy. Remote physical device fingerprinting. IEEE Trans. Dependable Secur. Comput., 2(2):93-108, 2005.
-
(2005)
IEEE Trans. Dependable Secur. Comput.
, vol.2
, Issue.2
, pp. 93-108
-
-
Kohno, T.1
Broido, A.2
Claffy, K.C.3
-
20
-
-
0023850553
-
Large-vocabulary speaker-independent continuous speech recognition using hmm
-
apr
-
K.-F. Lee and H.-W. Hon. Large-vocabulary speaker-independent continuous speech recognition using hmm. In Acoustics, Speech, and Signal Processing, 1988. ICASSP-88., 1988 International Conference on, pages 123-126 vol.1, apr 1988.
-
(1988)
Acoustics, Speech, and Signal Processing 1988. ICASSP-88., 1988 International Conference on
, vol.1
, pp. 123-126
-
-
Lee, K.-F.1
Hon, H.-W.2
-
22
-
-
84907804902
-
-
The Washington Post 5 December 2013. Available [Last accessed: 6 December 2013]
-
M. Ehrenfreund. NSA tracking phone locations on planetary scale. The Washington Post, 5 December 2013. Available: http://www.washingtonpost.com/world/national-security/nsa-tracking-phone-locations-on-planetary-scale/2013/12/05/dfe21740-5db2-11e3-bc56-c6ca94801fac story.html [Last accessed: 6 December 2013], 2013.
-
(2013)
NSA Tracking Phone Locations on Planetary Scale
-
-
Ehrenfreund, M.1
-
23
-
-
60949108379
-
Passive network forensics: Behavioural classification of network hosts based on connection patterns
-
Apr.
-
J. McHugh, R. McLeod, and V. Nagaonkar. Passive network forensics: Behavioural classification of network hosts based on connection patterns. SIGOPS Oper. Syst. Rev., 42(3):99-111, Apr. 2008.
-
(2008)
SIGOPS Oper. Syst. Rev.
, vol.42
, Issue.3
, pp. 99-111
-
-
McHugh, J.1
McLeod, R.2
Nagaonkar, V.3
-
24
-
-
77954869647
-
Cybermetrics: User identification through network flow analysis
-
Zurich, Switzerland
-
N. Melnikov and J. Schonwalder. Cybermetrics: User identification through network flow analysis. In Proceedings of the 4th international conference on Autonomous infrastructure, management and security, pages 167-170, Zurich, Switzerland, 2010.
-
(2010)
Proceedings of the 4th International Conference on Autonomous Infrastructure, Management and Security
, pp. 167-170
-
-
Melnikov, N.1
Schonwalder, J.2
-
25
-
-
85042755349
-
Timely and continuous machine-learning-based classification for interactive ip traffic
-
Dec.
-
T. T. T. Nguyen, G. Armitage, P. Branch, and S. Zander. Timely and continuous machine-learning-based classification for interactive ip traffic. IEEE/ACM Trans. Netw., 20(6):1880-1894, Dec. 2012.
-
(2012)
IEEE/ACM Trans. Netw.
, vol.20
, Issue.6
, pp. 1880-1894
-
-
Nguyen, T.T.T.1
Armitage, G.2
Branch, P.3
Zander, S.4
-
26
-
-
37749006403
-
802.11 User Fingerprinting
-
New York, NY, USA ACM
-
J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall. 802.11 User Fingerprinting. In Proceedings of the 13th annual ACM international conference on Mobile computing and networking, pages 99-110, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking
, pp. 99-110
-
-
Pang, J.1
Greenstein, B.2
Gummadi, R.3
Seshan, S.4
Wetherall, D.5
-
27
-
-
84870637005
-
Flowscan: A network traffic flow reporting and visualization tool
-
Berkeley, CA, USA USENIX Association
-
D. Plonka. Flowscan: A network traffic flow reporting and visualization tool. In Proceedings of the 14th USENIX conference on System administration, LISA '00, pages 305-318, Berkeley, CA, USA, 2000. USENIX Association.
-
(2000)
Proceedings of the 14th USENIX Conference on System Administration, LISA '00
, pp. 305-318
-
-
Plonka, D.1
-
28
-
-
84907748495
-
-
The Verge 4 December 2013. Available [Last accessed: 6 December 2013]
-
R. Brandom. The NSA tracks the location of hundreds of millions of phones. The Verge, 4 December 2013. Available: http://www.theverge.com/2013/12/4/5175778/the-nsa-tracks-the-location-of-hundreds-of-millions-of-phones [Last accessed: 6 December 2013], 2013.
-
(2013)
The NSA Tracks the Location of Hundreds of Millions of Phones
-
-
Brandom, R.1
-
29
-
-
0024610919
-
A tutorial on hidden markov models and selected applications in speech recognition
-
L. R. Rabiner. A tutorial on hidden markov models and selected applications in speech recognition. Proceedings of the IEEE, 77(2):257-286, 1989.
-
(1989)
Proceedings of the IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
-
30
-
-
84907783965
-
Obfuscation of sensitive data for incremental release of network flows
-
D. Riboni, A. Villani, D. Vitali, C. Bettini, and L. Mancini. Obfuscation of sensitive data for incremental release of network flows. Networking, IEEE/ACM Transactions on, PP(99):1-1, 2014.
-
(2014)
Networking IEEE/ACM Transactions on
, Issue.99
, pp. 1-1
-
-
Riboni, D.1
Villani, A.2
Vitali, D.3
Bettini, C.4
Mancini, L.5
-
32
-
-
84879515461
-
Who do you sync you are?: Smartphone fingerprinting via application behaviour
-
T. Stöber, M. Frank, J. Schmitt, and I. Martinovic. Who do you sync you are?: Smartphone fingerprinting via application behaviour. In Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, pages 7-12, 2013.
-
(2013)
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks
, pp. 7-12
-
-
Stöber, T.1
Frank, M.2
Schmitt, J.3
Martinovic, I.4
-
34
-
-
65249141597
-
Unconstrained endpoint profiling (googling the internet)
-
New York, New York, USA ACM Press
-
I. Trestian, S. Ranjan, A. Kuzmanovi, and A. Nucci. Unconstrained endpoint profiling (googling the internet). In Proceedings of the ACM SIGCOMM 2008 conference on Data communication-SIGCOMM '08, page 279, New York, New York, USA, 2008. ACM Press.
-
(2008)
Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication-SIGCOMM '08
, pp. 279
-
-
Trestian, I.1
Ranjan, S.2
Kuzmanovi, A.3
Nucci, A.4
-
35
-
-
70449469997
-
Profiling and clustering internet hosts
-
Las Vegas
-
S. Wei, J. Mirkovic, and E. Kissel. Profiling and clustering internet hosts. In Proceedings of the 2006 International Conference on Data Mining, DMIN 2006, pages 269-275, Las Vegas, 2006.
-
(2006)
Proceedings of the 2006 International Conference on Data Mining, DMIN 2006
, pp. 269-275
-
-
Wei, S.1
Mirkovic, J.2
Kissel, E.3
-
36
-
-
50249140706
-
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations
-
Washington, DC, USA, May IEEE Computer Society
-
C. V. Wright, L. Ballard, S. E. Coull, F. Monrose, and G. M. Masson. Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations. In Proceedings of the 2008 IEEE Symposium on Security and Privacy, pages 35-49, Washington, DC, USA, May 2008. IEEE Computer Society.
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 35-49
-
-
Wright, C.V.1
Ballard, L.2
Coull, S.E.3
Monrose, F.4
Masson, G.M.5
-
37
-
-
33750711125
-
Profiling internet backbone traffic: Behavior models and applications
-
K. Xu, Z. Zhang, and S. Bhattacharyya. Profiling internet backbone traffic: Behavior models and applications. In Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, pages 169-180, 2005.
-
(2005)
Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 169-180
-
-
Xu, K.1
Zhang, Z.2
Bhattacharyya, S.3
-
38
-
-
85008008496
-
Internet traffic behavior profiling for network
-
K. Xu, Z.-J. Zhang, and S. Bhattacharyya. Internet Traffic Behavior Profiling for Network. IEEE/ACM Trans. Netw., 16(6):1241-1252, 2008.
-
(2008)
IEEE/ACM Trans. Netw.
, vol.16
, Issue.6
, pp. 1241-1252
-
-
Xu, K.1
Zhang, Z.-J.2
Bhattacharyya, S.3
-
39
-
-
84865656170
-
How much can behavioral targeting help online advertising?
-
New York, NY, USA ACM
-
J. Yan, N. Liu, G. Wang, W. Zhang, Y. Jiang, and Z. Chen. How much can behavioral targeting help online advertising? In Proceedings of the 18th International Conference on World Wide Web, WWW '09, pages 261-270, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 18th International Conference on World Wide Web WWW '09
, pp. 261-270
-
-
Yan, J.1
Liu, N.2
Wang, G.3
Zhang, W.4
Jiang, Y.5
Chen, Z.6
-
40
-
-
80051914578
-
Inferring users' online activities through traffic analysis
-
New York, NY, USA ACM
-
F. Zhang, W. He, X. Liu, and P. G. Bridges. Inferring users' online activities through traffic analysis. In Proceedings of the Fourth ACM Conference on Wireless Network Security, WiSec '11, pages 59-70, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the Fourth ACM Conference on Wireless Network Security, WiSec '11
, pp. 59-70
-
-
Zhang, F.1
He, W.2
Liu, X.3
Bridges, P.G.4
|