-
1
-
-
33746053876
-
Privacy vulnerabilities in encrypted HTTP streams
-
May
-
BISSIAS, G., LIBERATORE, M., JENSEN, D., AND LEVINE, B. N. Privacy Vulnerabilities in Encrypted HTTP Streams. In Proceedings of the 5th International Workshop on Privacy Enhancing Technologies (May 2005), pp. 1–11.
-
(2005)
Proceedings of the 5th International Workshop on Privacy Enhancing Technologies
, pp. 1-11
-
-
Bissias, G.1
Liberatore, M.2
Jensen, D.3
Levine, B.N.4
-
3
-
-
79251645890
-
Anonymization of IP traffic monitoring data – attacks on two prefix-preserving anonymization schemes and some proposed remedies
-
May
-
BREKNE, T., ÅRNES, A., AND ØSLEBØ, A. Anonymization of IP Traffic Monitoring Data – Attacks on Two Prefix-preserving Anonymization Schemes and Some Proposed Remedies. In Proceedings of the Workshop on Privacy Enhancing Technologies (May 2005), pp. 179–196.
-
(2005)
Proceedings of the Workshop on Privacy Enhancing Technologies
, pp. 179-196
-
-
Brekne, T.1
Årnes, A.2
Øslebø, A.3
-
8
-
-
77955212743
-
-
Unpublished manuscript as of February 1
-
DANEZIS, G. Traffic Analysis of the HTTP Protocol over TLS. Unpublished manuscript available at http://homes.esat.kuleuven.be/∼gdanezis/TLSanon.pdf as of February 1, 2007.
-
(2007)
Traffic Analysis of the HTTP Protocol over TLS
-
-
Danezis, G.1
-
9
-
-
4444266989
-
Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme
-
October
-
FAN, J., XU, J., AMMAR, M., AND MOON, S. Prefix-preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme. Computer Networks 46, 2 (October 2004), 263–272.
-
(2004)
Computer Networks
, vol.46
, Issue.2
, pp. 263-272
-
-
Fan, J.1
Xu, J.2
Ammar, M.3
Moon, S.4
-
10
-
-
0033204142
-
Packet classification using hierarchical intelligent cuttings
-
GUPTA, P., AND MCKEOWN, N. Packet Classification Using Hierarchical Intelligent Cuttings. In Proceedings of Hot Interconnects VII (1999), pp. 147–160.
-
(1999)
Proceedings of Hot Interconnects
, vol.7
, pp. 147-160
-
-
Gupta, P.1
McKeown, N.2
-
12
-
-
33847303101
-
BliNC: Multilevel traffic classification in the dark
-
August
-
KARAGIANNIS, T., PAPAGIANNAKI, K., AND FALOUTSOS, M. BLINC: Multilevel Traffic Classification in the Dark. In Proceedings of ACM SIGCOMM (August 2005), pp. 229–240.
-
(2005)
Proceedings of ACM SIGCOMM
, pp. 229-240
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
13
-
-
0242276270
-
Towards peer-to-peer traffic analysis using flows
-
October
-
KIM, M., KANG, H., AND HONG, J. Towards Peer-to-Peer Traffic Analysis Using Flows. In Self-Managing Distributed Systems, 14th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (October 2003), pp. 55–67.
-
(2003)
Self-Managing Distributed Systems, 14th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management
, pp. 55-67
-
-
Kim, M.1
Kang, H.2
Hong, J.3
-
14
-
-
33845232198
-
On the privacy risks of publishing anonymized IP network traces
-
October
-
KOUKIS, D., ANTONATOS, S., AND ANAGNOSTAKIS, K. On the Privacy Risks of Publishing Anonymized IP Network Traces. In Proceedings ofCommunications andMultimedia Security (October 2006), pp. 22–32.
-
(2006)
Proceedings ofCommunications andMultimedia Security
, pp. 22-32
-
-
Koukis, D.1
Antonatos, S.2
Anagnostakis, K.3
-
17
-
-
33746650302
-
Canine: A combined conversion and anonymization tool for processing netflows for security
-
LI, Y., SLAGELL, A., LUO, K., AND YURCIK, W. CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for Security. In Proceedings of Tenth International Conference on Telecommunication Systems (2005).
-
(2005)
Proceedings of Tenth International Conference on Telecommunication Systems
-
-
Li, Y.1
Slagell, A.2
Luo, K.3
Yurcik, W.4
-
21
-
-
85094839698
-
Combining cisco netflow exports with relational database technology for usage statistics, intrusion detection, and network forensics
-
December
-
NICKLESS, W., NAVARRO, J., AND WINKLER, L. Combining CISCO NetFlow Exports with Relational Database Technology for Usage Statistics, Intrusion Detection, and Network Forensics. In Proceedings of the 14th Large Systems Administration Conference (LISA) (December 2000), pp. 285–290.
-
(2000)
Proceedings of the 14th Large Systems Administration Conference (LISA)
, pp. 285-290
-
-
Nickless, W.1
Navarro, J.2
Winkler, L.3
-
23
-
-
33847256529
-
The devil and packet trace anonymization
-
January
-
PANG, R., ALLMAN, M., PAXSON, V., AND LEE, J. The Devil and Packet Trace Anonymization. ACM Computer Communication Review 36, 1 (January 2006), 29–38.
-
(2006)
ACM Computer Communication Review
, vol.36
, Issue.1
, pp. 29-38
-
-
Pang, R.1
Allman, M.2
Paxson, V.3
Lee, J.4
-
25
-
-
33645759275
-
A blueprint for introducing disruptive technology into the internet
-
January
-
PETERSON, L., ANDERSON, T., CULLER, D., AND ROSCOE, T. A Blueprint for Introducing Disruptive Technology into the Internet. SIGCOMM Computer Communication Reviews 33, 1 (January 2003), 5964.
-
(2003)
SIGCOMM Computer Communication Reviews
, vol.33
, Issue.1
, pp. 5964
-
-
Peterson, L.1
Anderson, T.2
Culler, D.3
Roscoe, T.4
-
29
-
-
1242332555
-
Packet classification using multidimensional cutting
-
August
-
SINGH, S., BABOESCU, F., VARGHESE, G., AND WANG, J. Packet Classification Using Multidimensional Cutting. In Proceedings of ACM SIGCOMM (August 2003), pp. 213–224.
-
(2003)
Proceedings of ACM SIGCOMM
, pp. 213-224
-
-
Singh, S.1
Baboescu, F.2
Varghese, G.3
Wang, J.4
-
31
-
-
3242743560
-
A framework for the evaluation of session reconstruction heuristics in web-usage analysis
-
April
-
SPILIOPOULOU, M., MOBASHER, B., BERENDT, B., AND NAKAGAWA, M. A Framework for the Evaluation of Session Reconstruction Heuristics in Web-Usage Analysis. INFORMS Journal on Computing 15, 2 (April 2003), 171–190.
-
(2003)
INFORMS Journal on Computing
, vol.15
, Issue.2
, pp. 171-190
-
-
Spiliopoulou, M.1
Mobasher, B.2
Berendt, B.3
Nakagawa, M.4
-
32
-
-
0036086129
-
Statistical identification of encrypted web browsing traffic
-
May
-
SUN, Q., SIMON, D. R., WANG, Y., RUSSELL, W., PADMANABHAN, V. N., AND QIU, L. Statistical Identification of Encrypted Web Browsing Traffic. In Proceedings of the IEEE Symposium on Security and Privacy (May 2002), pp. 19–31.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 19-31
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
33
-
-
27544495684
-
Worm origin identification using random moonwalks
-
May
-
XIE, Y., SEKAR, V., MALTZ, D., REITER, M. K., AND ZHANG, H. Worm Origin Identification Using Random Moonwalks. In Proceedings of the 2005 IEEE Symposium on Security and Privacy (May 2005), pp. 242–256.
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy
, pp. 242-256
-
-
Xie, Y.1
Sekar, V.2
Maltz, D.3
Reiter, M.K.4
Zhang, H.5
|