暂无分享,去创建一个
[1] Thomas Engel,et al. Website fingerprinting in onion routing based anonymization networks , 2011, WPES.
[2] Fan Zhang,et al. Inferring users' online activities through traffic analysis , 2011, WiSec '11.
[3] Mun Choon Chan,et al. Website Fingerprinting and Identification Using Ordered Feature Sequences , 2010, ESORICS.
[4] Charles V. Wright,et al. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis , 2009, NDSS.
[5] Brijesh Joshi,et al. Touching from a distance: website fingerprinting attacks and defenses , 2012, CCS.
[6] Tao Wang,et al. Improved website fingerprinting on Tor , 2013, WPES.
[7] Andrew Hintz,et al. Fingerprinting Websites Using Traffic Analysis , 2002, Privacy Enhancing Technologies.
[8] Riccardo Bettati,et al. On countermeasures to traffic analysis attacks , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[9] Hannes Federrath,et al. Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier , 2009, CCSW '09.
[10] Jiankun Hu,et al. Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics , 2012, Comput. J..
[11] Thomas Ristenpart,et al. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail , 2012, 2012 IEEE Symposium on Security and Privacy.
[12] David D. Jensen,et al. Privacy Vulnerabilities in Encrypted HTTP Streams , 2005, Privacy Enhancing Technologies.
[13] Xun Gong,et al. Fingerprinting websites using remote traffic analysis , 2010, CCS '10.
[14] Lili Qiu,et al. Statistical identification of encrypted Web browsing traffic , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[15] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[16] Brian Neil Levine,et al. Inferring the source of encrypted HTTP connections , 2006, CCS '06.
[17] G. Danezis. Traffic Analysis of the HTTP Protocol over TLS , .
[18] Xiapu Luo,et al. HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows , 2011, NDSS.