Author:
Barbera Marco Valerio,Kemerlis Vasileios P.,Pappas Vasilis,Keromytis Angelos D.
Publisher
Springer Berlin Heidelberg
Reference31 articles.
1. Bellovin, S.M., Gansner, E.R.: Using link cuts to attack Internet routing. Tech. rep. (2002)
2. Borisov, N., Danezis, G., Mittal, P., Tabriz, P.: Denial of service or denial of security? In: CCS. ACM (2007)
3. Lecture Notes in Computer Science;S. Chakravarty,2010
4. Lecture Notes in Computer Science;N. Danner,2009
5. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. Tech. rep., DTIC Document (2004)
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Anonymous Traffic Detection Based on Feature Engineering and Reinforcement Learning;Sensors;2024-04-04
2. A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization;IEEE Communications Surveys & Tutorials;2024
3. Cell Manipulation Attack Against Onion Services;2023 IEEE International Conference on High Performance Computing & Communications, Data Science & Systems, Smart City & Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys);2023-12-17
4. The Anonymity of the Dark Web: A Survey;IEEE Access;2022
5. Foundations, Properties, and Security Applications of Puzzles;ACM Computing Surveys;2021-07-31