Author:
Ejeta Tekachew Gobena,Kim Hyoung Joong
Publisher
Springer International Publishing
Reference14 articles.
1. Psiphon, Privacy Policy.
https://psiphon.ca/en/privacy.html
. Accessed 24 Apr 2017
2. Herrmann, D., Wendolsky, R., Federrath, H.: Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial Naïve Bayes classifier. In: Proceedings of the 2009 ACM workshop on Cloud Computing Security, pp. 31–42 (2009)
3. Wang, T.: Website fingerprinting: attacks and defenses, Ph.D. Dissertation, University of Waterloo (2016)
4. Dyer, K.P., Coull, S.E., Ristenpart, T., Shrimpton, T.: Peek-a-boo, I still see you: why efficient traffic analysis countermeasures fail. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 332–346 (2012)
5. Cai, X., Zhang, X., Joshi, B., Johnson, R.: Touching from a distance: website fingerprinting attacks and defenses. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 605–616 (2012)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. MDS coding enabled proxy‐based Internet censorship circumvention system;Electronics Letters;2023-07
2. Blind matching algorithm based proxy distribution against internet censorship;IET Communications;2023-02-27
3. A Survey on Deep Learning for Website Fingerprinting Attacks and Defenses;IEEE Access;2023
4. TunnelScanner: A Novel Approach For Tunnel Mixed Traffic Classification Using Machine Learning;2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys);2021-12
5. LFETT2021: A Large-scale Fine-grained Encrypted Tunnel Traffic Dataset;2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2021-10