Securing the internet through the detection of anonymous proxy usage
暂无分享,去创建一个
[1] S. O. Khanna,et al. Overview of Emerging Trends in Network Security and Cryptography , 2014 .
[2] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[3] Bjoern M. Luettmann,et al. Man-in-the-middle attacks on auto-updating software , 2007 .
[4] Dawn Xiaodong Song,et al. Design and Evaluation of a Real-Time URL Spam Filtering Service , 2011, 2011 IEEE Symposium on Security and Privacy.
[5] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[6] Alan O. Freier,et al. Internet Engineering Task Force (ietf) the Secure Sockets Layer (ssl) Protocol Version 3.0 , 2022 .
[7] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[8] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[9] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[10] Robin Sommer,et al. Here's my cert, so trust me, maybe?: understanding TLS errors on the web , 2013, WWW.
[11] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[12] T. Chomsiri. Sniffing Packets on LAN without ARP Spoofing , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[13] Matt Bishop,et al. What Is Computer Security? , 2003, IEEE Secur. Priv..