Traffic Analysis Attacks on Sensor Networks

[1]  Jason M. Schwier,et al.  Side-Channel Analysis for Detecting Protocol Tunneling , 2011, Adv. Internet Things.

[2]  Jason M. Schwier,et al.  Methods to Window Data to Differentiate Between Markov Models , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[3]  Jason M. Schwier,et al.  A Hybrid Statistical Technique for Modeling Recurrent Tracks in a Compact Set , 2011, IEEE Transactions on Automatic Control.

[4]  Jason M. Schwier,et al.  Behavior Detection Using Confidence Intervals of Hidden Markov Models , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[5]  Cristina Alcaraz,et al.  Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.

[6]  Bernd Fritzke,et al.  Fast learning with incremental RBF networks , 1994, Neural Processing Letters.

[7]  Claudia Picardi,et al.  Keystroke analysis of free text , 2005, TSEC.

[8]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[9]  Dakshi Agrawal,et al.  The EM Side-Channel(s) , 2002, CHES.

[10]  Dawn Xiaodong Song,et al.  Timing Analysis of Keystrokes and Timing Attacks on SSH , 2001, USENIX Security Symposium.

[11]  Lawrence R. Rabiner,et al.  A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.

[12]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.