Anonymity in the Service of Attackers
暂无分享,去创建一个
Arturo Ribagorda | Guillermo Suarez de Tangil-Rotaeche | Esther Palomar-González | Benjamín Ramos-Álvarez
[1] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[2] Philip K. Chan,et al. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.
[3] S. M. Bellovin,et al. Security problems in the TCP/IP protocol suite , 1989, CCRV.
[4] John McHugh,et al. Hiding Intrusions: From the Abnormal to the Normal and Beyond , 2002, Information Hiding.
[5] Dino Farinacci,et al. Generic Routing Encapsulation (GRE) , 2000, RFC.
[6] Craig A. Shue,et al. Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[7] Javier Areitio Bertolín,et al. Comunicaciones digitales: Identificación y análisis del anonimato en comunicaciones electrónicas , 2007 .
[8] Aaron Hackworth,et al. Botnets as a Vehicle for Online Crimes , 2006 .
[9] Nicolas Ianelli,et al. Botnets as a Vehicle for Online Crime , 2007 .
[10] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[11] Michal Zalewski. Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks , 2005 .