메뉴 건너뛰기




Volumn , Issue , 2012, Pages

Shadow: Running Tor in a Box for Accurate and Efficient Experimentation

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY; OPEN SOURCE SOFTWARE;

EID: 85180760932     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (98)

References (47)
  • 6
    • 78049387804 scopus 로고    scopus 로고
    • Traffic analysis against low-latency anonymity networks using available bandwidth estimation
    • S. Chakravarty, A. Stavrou, and A. Keromytis. Traffic analysis against low-latency anonymity networks using available bandwidth estimation. In Computer Security - ESORICS, pages 249-267, 2010.
    • (2010) Computer Security - ESORICS , pp. 249-267
    • Chakravarty, S.1    Stavrou, A.2    Keromytis, A.3
  • 19
    • 79960511472 scopus 로고    scopus 로고
    • Accessed July, 2011
    • J. D. Little and S. C. Graves. Little's Law. web.mit.edu/sgraves/www/papers/Little' s%20Law-Published.pdf, 2008. Accessed July, 2011.
    • (2008) Little's Law
    • Little, J. D.1    Graves, S. C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.