-
2
-
-
84910608702
-
DefenestraTor: Throwing out Windows in Tor
-
M. AlSabah, K. Bauer, I. Goldberg, D. Grunwald, D. McCoy, S. Savage, and G. Voelker. DefenestraTor: Throwing out Windows in Tor. In Proceedings of the 11th International Symposium on Privacy Enhancing Technologies (PETS'11), 2011.
-
(2011)
Proceedings of the 11th International Symposium on Privacy Enhancing Technologies (PETS'11)
-
-
AlSabah, M.1
Bauer, K.2
Goldberg, I.3
Grunwald, D.4
McCoy, D.5
Savage, S.6
Voelker, G.7
-
3
-
-
79959681025
-
Low-resource routing attacks against Tor
-
K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker. Low-resource routing attacks against Tor. In Proceedings of the 6th ACM Workshop on Privacy in the Electronic Society (WPES'07), pages 11-20, 2007.
-
(2007)
Proceedings of the 6th ACM Workshop on Privacy in the Electronic Society (WPES'07)
, pp. 11-20
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
5
-
-
85082364656
-
Design, deployment, and use of the DETER testbed
-
T. Benzel, R. Braden, D. Kim, C. Neuman, A. Joseph, K. Sklower, R. Ostrenga, and S. Schwab. Design, deployment, and use of the DETER testbed. In Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test, 2007.
-
(2007)
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test
-
-
Benzel, T.1
Braden, R.2
Kim, D.3
Neuman, C.4
Joseph, A.5
Sklower, K.6
Ostrenga, R.7
Schwab, S.8
-
6
-
-
78049387804
-
Traffic analysis against low-latency anonymity networks using available bandwidth estimation
-
S. Chakravarty, A. Stavrou, and A. Keromytis. Traffic analysis against low-latency anonymity networks using available bandwidth estimation. In Computer Security - ESORICS, pages 249-267, 2010.
-
(2010)
Computer Security - ESORICS
, pp. 249-267
-
-
Chakravarty, S.1
Stavrou, A.2
Keromytis, A.3
-
7
-
-
10444287344
-
Planetlab: an overlay testbed for broad-coverage services
-
B. Chun, D. Culler, T. Roscoe, A. Bavier, L. Peterson, M. Wawrzoniak, and M. Bowman. Planetlab: an overlay testbed for broad-coverage services. SIGCOMM Computer Communication Review, 33:3-12, 2003.
-
(2003)
SIGCOMM Computer Communication Review
, vol.33
, pp. 3-12
-
-
Chun, B.1
Culler, D.2
Roscoe, T.3
Bavier, A.4
Peterson, L.5
Wawrzoniak, M.6
Bowman, M.7
-
10
-
-
84940563682
-
-
Technical Report 10-029, University of Minnesota
-
D. Foo Kune, T. Malchow, J. Tyra, N. Hopper, and Y. Kim. The Distributed Virtual Network for High Fidelity Large Scale Peer to Peer Network Simulation. Technical Report 10-029, University of Minnesota, 2010.
-
(2010)
The Distributed Virtual Network for High Fidelity Large Scale Peer to Peer Network Simulation
-
-
Foo Kune, D.1
Malchow, T.2
Tyra, J.3
Hopper, N.4
Kim, Y.5
-
12
-
-
84947902272
-
Tracking the evolution of web traffic: 1995-2003
-
F. Hernandez-Campos, K. Jeffay, and F. Smith. Tracking the evolution of web traffic: 1995-2003. In The 11th IEEE/ACM International Symposium on Modeling, Analysis, and Simulation of Computer Telecommunications Systems (MASCOTS'03), pages 16-25, 2003.
-
(2003)
The 11th IEEE/ACM International Symposium on Modeling, Analysis, and Simulation of Computer Telecommunications Systems (MASCOTS'03)
, pp. 16-25
-
-
Hernandez-Campos, F.1
Jeffay, K.2
Smith, F.3
-
13
-
-
77949464624
-
How much anonymity does network latency leak?
-
N. Hopper, E. Vasserman, and E. Chan-Tin. How much anonymity does network latency leak? ACM Transactions on Information and System Security (TISSEC'10), 13(2):1-28, 2010.
-
(2010)
ACM Transactions on Information and System Security (TISSEC'10)
, vol.13
, Issue.2
, pp. 1-28
-
-
Hopper, N.1
Vasserman, E.2
Chan-Tin, E.3
-
18
-
-
33646926224
-
Wids: an integrated toolkit for distributed system development
-
S. Lin, A. Pan, Z. Zhang, R. Guo, and Z. Guo. Wids: an integrated toolkit for distributed system development. In Proceedings of the 10th conference on Hot Topics in Operating Systems (HOTOS'05), 2005.
-
(2005)
Proceedings of the 10th conference on Hot Topics in Operating Systems (HOTOS'05)
-
-
Lin, S.1
Pan, A.2
Zhang, Z.3
Guo, R.4
Guo, Z.5
-
19
-
-
79960511472
-
-
Accessed July, 2011
-
J. D. Little and S. C. Graves. Little's Law. web.mit.edu/sgraves/www/papers/Little' s%20Law-Published.pdf, 2008. Accessed July, 2011.
-
(2008)
Little's Law
-
-
Little, J. D.1
Graves, S. C.2
-
22
-
-
50249133191
-
Shining light in dark places: Understanding the Tor network
-
D. Mccoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker. Shining light in dark places: Understanding the Tor network. In Proceedings of the 8th International Symposium on Privacy Enhancing Technologies (PETS'08), pages 63-76, 2008.
-
(2008)
Proceedings of the 8th International Symposium on Privacy Enhancing Technologies (PETS'08)
, pp. 63-76
-
-
Mccoy, D.1
Bauer, K.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
26
-
-
50149119752
-
Towards yet another peer-to-peer simulator
-
S. Naicken, A. Basu, B. Livingston, S. Rodhetbhai, and I. Wakeman. Towards yet another peer-to-peer simulator. In Proceedings of the 4th International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET-NETs'06), 2006.
-
(2006)
Proceedings of the 4th International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET-NETs'06)
-
-
Naicken, S.1
Basu, A.2
Livingston, B.3
Rodhetbhai, S.4
Wakeman, I.5
-
27
-
-
47349087850
-
The state of peer-to-peer simulators and simulations
-
S. Naicken, B. Livingston, A. Basu, S. Rodhetbhai, I. Wakeman, and D. Chalmers. The state of peer-to-peer simulators and simulations. SIGCOMM Computer Communication Review, 37(2):95-98, 2007.
-
(2007)
SIGCOMM Computer Communication Review
, vol.37
, Issue.2
, pp. 95-98
-
-
Naicken, S.1
Livingston, B.2
Basu, A.3
Rodhetbhai, S.4
Wakeman, I.5
Chalmers, D.6
-
37
-
-
0032074579
-
Anonymous connections and onion routing
-
M. Reed, P. Syverson, and D. Goldschlag. Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, 16(4):482-494, 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
46
-
-
84978397901
-
Scalability and accuracy in a largescale network emulator
-
A. Vahdat, K. Yocum, K. Walsh, P. Mahadevan, D. Kostić, J. Chase, and D. Becker. Scalability and accuracy in a largescale network emulator. SIGOPS Operating Systems Review, 36(SI):271-284, 2002.
-
(2002)
SIGOPS Operating Systems Review
, vol.36
, Issue.SI
, pp. 271-284
-
-
Vahdat, A.1
Yocum, K.2
Walsh, K.3
Mahadevan, P.4
Kostić, D.5
Chase, J.6
Becker, D.7
|