Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses
暂无分享,去创建一个
[1] Dinil Mon Divakaran,et al. A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes , 2021, ArXiv.
[2] Xiaobo Ma,et al. An Uncertainty-Based Traffic Training Approach to Efficiently Identifying Encrypted Proxies , 2020, 2020 12th International Conference on Advanced Infocomm Technology (ICAIT).
[3] Eduardo B. Fernandez,et al. TPM, a pattern for an architecture for trusted computing , 2020, EuroPLoP.
[4] Javier López,et al. A Security Pattern for Cloud service certification , 2019 .
[5] Matt Bishop,et al. What Is Computer Security? , 2003, IEEE Secur. Priv..
[6] Kevin Curran,et al. Detecting the Use of Anonymous Proxies , 2018, Int. J. Digit. Crime Forensics.
[7] C. E. Akabogu. IMPLICATIONS OF MASS MEDIA CENSORSHIP ON THE INDIVIDUAL AND THE NIGERIAN SOCIETY , 2017 .
[8] E. Giuliani,et al. Overcoming the liability of origin by doing no-harm: Emerging country firms’ social irresponsibility as they go global , 2017 .
[9] Nick Sullivan,et al. The Security Impact of HTTPS Interception , 2017, NDSS.
[10] Martin Schmiedecker,et al. NavigaTor: Finding Faster Paths to Anonymity , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[11] Kevin Curran,et al. Securing the internet through the detection of anonymous proxy usage , 2015, 2015 World Congress on Internet Security (WorldCIS).
[12] Kevin Curran,et al. Traffic Classification for the Detection of Anonymous Web Proxy Routing , 2015 .
[13] James F. Kurose,et al. Information-centric networking: The evolution from circuits to packets to content , 2014, Comput. Networks.
[14] George Bebis,et al. An overview of anonymity technology usage , 2013, Comput. Commun..
[15] Dilbag Singh,et al. An Explore View of Web Caching Techniques , 2011 .
[16] Jussi Kangasharju,et al. Content Routers: Fetching Data on Network Path , 2011, 2011 IEEE International Conference on Communications (ICC).
[17] Michael Ligh,et al. Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code , 2010 .
[18] Bülent Yener,et al. On anonymity in an electronic society: A survey of anonymous communication systems , 2009, CSUR.
[19] Christopher Krügel,et al. SWAP: Mitigating XSS attacks using a reverse proxy , 2009, 2009 ICSE Workshop on Software Engineering for Secure Systems.
[20] Hala ElAarag,et al. Web proxy cache replacement scheme based on back-propagation neural network , 2008, J. Syst. Softw..
[21] Daniel Serrano,et al. Towards Secure Agent Computing for Ubiquitous Computing and Ambient Intelligence , 2007, UIC.
[22] Antonio Maña,et al. A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios , 2006, UIC.
[23] Ming-Syan Chen,et al. On Exploring Aggregate Effect for Efficient Cache Replacement in Transcoding Proxies , 2003, IEEE Trans. Parallel Distributed Syst..
[24] Philip S. Yu,et al. Collaborative proxy system for distributed Web content transcoding , 2000, CIKM '00.
[25] Ari Luotonen,et al. World-Wide Web Proxies , 1994, Comput. Networks ISDN Syst..
[26] Shou-Hsuan Stephen Huang,et al. Detecting Malicious Users Behind Circuit-Based Anonymity Networks , 2020, IEEE Access.
[27] S. O. Khanna,et al. Overview of Emerging Trends in Network Security and Cryptography , 2014 .
[28] Antonio Maña,et al. Dynamic Security Properties Monitoring Architecture for Cloud Computing , 2013 .
[29] Antonio Maña,et al. TPM-based protection for mobile agents , 2011, Secur. Commun. Networks.
[30] Carsten Rudolph,et al. Verification of S&D Solutions for Network Communications and Devices , 2009, Security and Dependability for Ambient Intelligence.
[31] Antonio Maña,et al. Representation of Security and Dependability Solutions , 2009, Security and Dependability for Ambient Intelligence.
[32] Luca Compagna,et al. XACML as a Security and Dependability Pattern for Access Control in AmI environments , 2008 .
[33] S. Darwish,et al. An Approach for Improving Performance of a Packet Filtering Firewall Based on Fuzzy Petri Net 67 , 2022 .