-
1
-
-
85008646365
-
-
Aircrack-ng.airdecap-ng
-
Aircrack-ng.airdecap-ng.
-
-
-
-
2
-
-
33746053876
-
Privacy vulnerabilities in encrypted http streams
-
G. D. Bissias, M. Liberatore, D. Jensen, B. N. Levine. Privacy vulnerabilities in encrypted http streams. Lecture notes in computer science, 3856:1, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3856
, pp. 1
-
-
Bissias, G.D.1
Liberatore, M.2
Jensen, D.3
Levine, B.N.4
-
4
-
-
84878355718
-
Peek-A-Boo i still see you: Why efficient traffic analysis countermeasures fail
-
IEEE
-
K. P. Dyer, S. E. Coull, T. Ristenpart, T. Shrimpton. Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail. In Security and Privacy (SP), 2012 IEEE Symposium on, pages 332-346. IEEE, 2012.
-
(2012)
Security and Privacy (SP) 2012 IEEE Symposium on
, pp. 332-346
-
-
Dyer, K.P.1
Coull, S.E.2
Ristenpart, T.3
Shrimpton, T.4
-
5
-
-
50249091568
-
Analytical and empirical analysis of countermeasures to traffic analysis attacks
-
IEEE
-
X. Fu, B. Graham, R. Bettati, W. Zhao, D. Xuan. Analytical and empirical analysis of countermeasures to traffic analysis attacks. In Parallel Processing, 2003. Proceedings. 2003 International Conference on, pages 483-492. IEEE, 2003.
-
(2003)
Parallel Processing 2003. Proceedings. 2003 International Conference on
, pp. 483-492
-
-
Fu, X.1
Graham, B.2
Bettati, R.3
Zhao, W.4
Xuan, D.5
-
8
-
-
84957796461
-
Fingerprinting websites using traffic analysis
-
Springer
-
A. Hintz. Fingerprinting websites using traffic analysis. In Privacy Enhancing Technologies, pages 171-178. Springer, 2003.
-
(2003)
Privacy Enhancing Technologies
, pp. 171-178
-
-
Hintz, A.1
-
11
-
-
85180621815
-
Httpos Sealing information leaks with Browser-Side obfuscation of encrypted flows
-
X. Luo, P. Zhou, E. W. Chan, W. Lee, R. K. Chang, R. Perdisci. Httpos: Sealing information leaks with browser-side obfuscation of encrypted flows. In NDSS, 2011.
-
(2011)
NDSS
-
-
Luo, X.1
Zhou, P.2
Chan, E.W.3
Lee, W.4
Chang, R.K.5
Perdisci, R.6
-
12
-
-
84907405567
-
Short paper: Extrapolation and prediction of user behaviour from wireless home automation communication
-
New York, NY, USA ACM
-
F. Mollers, S. Seitz, A. Hellmann, C. Sorge. Short paper: Extrapolation and prediction of user behaviour from wireless home automation communication. In Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless 38; Mobile Networks, WiSec '14, pages 195-200, New York, NY, USA, 2014. ACM.
-
(2014)
Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless 38; Mobile Networks, WiSec
, vol.14
, pp. 195-200
-
-
Mollers, F.1
Seitz, S.2
Hellmann, A.3
Sorge, C.4
-
13
-
-
80955131237
-
Website fingerprinting in onion routing based anonymization networks
-
ACM
-
A. Panchenko, L. Niessen, A. Zinnen, T. Engel. Website fingerprinting in onion routing based anonymization networks. In Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, pages 103-114. ACM, 2011.
-
(2011)
Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society
, pp. 103-114
-
-
Panchenko, A.1
Niessen, L.2
Zinnen, A.3
Engel, T.4
-
14
-
-
0033295259
-
Bro a System for Detecting Network Intruders in Real-Time
-
V. Paxson. Bro: a System for Detecting Network Intruders in Real-Time. Computer Networks, 31(23-24):2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
15
-
-
84864253438
-
Statistical identification of encrypted web browsing traffic
-
IEEE
-
Q. Sun, D. R. Simon, Y.-M. Wang, W. Russell, V. N. Padmanabhan, L. Qiu. Statistical identification of encrypted web browsing traffic. In Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium on, pages 19-30. IEEE, 2002.
-
(2002)
Security and Privacy 2002. Proceedings. 2002 IEEE Symposium on
, pp. 19-30
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.-M.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
17
-
-
85008636953
-
-
Wireshark. dumpcap
-
Wireshark. dumpcap.
-
-
-
-
18
-
-
80755134983
-
Traffic morphing: An efficient defense against statistical traffic analysis
-
C. V. Wright, S. E. Coull, F. Monrose. Traffic morphing: An efficient defense against statistical traffic analysis. In NDSS, 2009.
-
(2009)
NDSS
-
-
Wright, C.V.1
Coull, S.E.2
Monrose, F.3
|