Personensuche
X
?
Computer Security. ESORICS 2022 International Workshops; Lecture Notes in Computer Science ,
1
Challenges and Pitfalls in Generating Representative ICS Da..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
3
POSTER: How Dangerous is My Click? Boosting Website Fingerp..:
, In:
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Security and Privacy in Communication Networks ,
4
GuardedGossip: Secure and Anonymous Node Discovery in Untru..:
, In:
?
ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology ,
5
Security and Performance Implications of BGP Rerouting-Resi..:
, In:
?
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security ,
6
TrafficSliver: Fighting Website Fingerprinting Attacks with..:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
7
POSTER : Traffic Splitting to Counter Website Fingerprin..:
, In:
?
Data and Applications Security and Privacy XXXIII; Lecture Notes in Computer Science ,
8
Analysis of Multi-path Onion Routing-Based Anonymization Ne..:
, In:
?
2019 IEEE 27th International Conference on Network Protocols (ICNP) ,
9
Multipathing Traffic to Reduce Entry Node Exposure in Onion..:
, In:
?
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society ,
11
Analysis of Fingerprinting Techniques for Tor Hidden Servic..:
, In:
?
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security ,
12