802.11 user fingerprinting
暂无分享,去创建一个
Srinivasan Seshan | David Wetherall | Ben Greenstein | Ramakrishna Gummadi | Jeffrey Pang | S. Seshan | D. Wetherall | R. Gummadi | Jeffrey Pang | Ben Greenstein
[1] Fabian Monrose,et al. Authentication via keystroke dynamics , 1997, CCS '97.
[2] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[3] Saul Greenberg,et al. How people revisit web pages: empirical findings and implications for the design of history systems , 1997, Int. J. Hum. Comput. Stud..
[4] Dawn Xiaodong Song,et al. Timing Analysis of Keystrokes and Timing Attacks on SSH , 2001, USENIX Security Symposium.
[5] Martín Abadi,et al. Private authentication , 2004, Theor. Comput. Sci..
[6] Srinivasan Seshan,et al. Self-management in chaotic wireless deployments , 2005, MobiCom '05.
[7] Michalis Faloutsos,et al. BLINC: multilevel traffic classification in the dark , 2005, SIGCOMM '05.
[8] Srinivasan Seshan,et al. Self-management in chaotic wireless deployments , 2007, Wirel. Networks.
[9] Stefan Savage,et al. Jigsaw: solving the puzzle of enterprise 802.11 analysis , 2006, SIGCOMM.
[10] Dan S. Wallach,et al. Wireless LAN location-sensing for security applications , 2003, WiSe '03.
[11] Stefan Savage,et al. Jigsaw: solving the puzzle of enterprise 802.11 analysis , 2006, SIGCOMM.
[12] Henry Haverinen,et al. Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM) , 2006, RFC.
[13] Andrew W. Moore,et al. Internet traffic classification using bayesian analysis techniques , 2005, SIGMETRICS '05.
[14] Simson L. Garfinkel,et al. RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.
[15] Ratul Mahajan,et al. CRAWDAD dataset uw/sigcomm2004 (v.2006-10-17) , 2006 .
[16] Sebastian Zander,et al. Automated traffic classification and application identification using machine learning , 2005, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l.
[17] Damon McCoy,et al. Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting , 2006, USENIX Security Symposium.
[18] Pierangela Samarati,et al. Location privacy in pervasive computing , 2008 .
[19] Helen J. Wang,et al. Preserving location privacy in wireless lans , 2007, MobiSys '07.
[20] David D. Jensen,et al. Privacy Vulnerabilities in Encrypted HTTP Streams , 2005, Privacy Enhancing Technologies.
[21] Alexander Dekhtyar,et al. Information Retrieval , 2018, Lecture Notes in Computer Science.
[22] Charles V. Wright,et al. On Inferring Application Protocol Behaviors in Encrypted Network Traffic , 2006, J. Mach. Learn. Res..
[23] Michalis Faloutsos,et al. Transport layer identification of P2P traffic , 2004, IMC '04.
[24] Frank Stajano,et al. Location Privacy in Bluetooth , 2005, ESAS.
[25] Marco Gruteser,et al. Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis , 2003, WMASH '03.
[26] Lili Qiu,et al. Statistical identification of encrypted Web browsing traffic , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[27] Li Fan,et al. Web caching and Zipf-like distributions: evidence and implications , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[28] T. Kohno,et al. Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[29] Balaji Padmanabhan,et al. Clickprints on the Web: Are There Signatures in Web Browsing Data? , 2007 .
[30] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..