Author:
Maghsoudlou Aniss,Vermeulen Lukas,Poese Ingmar,Gasser Oliver
Publisher
Springer Nature Switzerland
Reference59 articles.
1. OpenVPN is open to VPN fingerprinting. In: 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA (2022). https://www.usenix.org/conference/usenixsecurity22/presentation/xue-diwen
2. ul Abideen, M.Z., Saleem, S., Ejaz, M.: VPN traffic detection in SSL-protected channel. Secur. Commun. Netw. 2019, 1–17 (2019)
3. Adrian, D., et al.: Imperfect forward secrecy: how Diffie-Hellman fails in practice. In: 22nd ACM Conference on Computer and Communications Security (2015)
4. Al-Fayoumi, M., Al-Fawa’reh, M., Nashwan, S.: VPN and Non-VPN network traffic classification using time-related features. Comput. Mater. Continua 72, 3091–3111 (2022). https://doi.org/10.32604/cmc.2022.025103
5. AlFardan, N., Bernstein, D.J., Paterson, K.G., Poettering, B., Schuldt, J.C.N.: On the security of RC4 in TLS. In: 22nd USENIX Security Symposium (USENIX Security 13), pp. 305–320. USENIX Association, Washington, D.C. (2013). https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/alFardan
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Why E.T. Can’t Phone Home: A Global View on IP-based Geoblocking at VoWiFi;Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services;2024-06-03
2. Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services;Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks;2024-05-27
3. Дослідження ефективності функціонування Site-to-Site VPN в умовах затримок в електронних комунікаційних мережах;Системи обробки інформації;2024-05-21
4. Investigating the Practicality of DNS-Based Authentication for Securing Wireless Networks;2023 3rd International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON);2023-12-29