Author:
Joshi Preeti S.,Dinesha H. A.
Publisher
Springer Nature Singapore
Reference31 articles.
1. Garfinkel S (2007) Anti-forensics: techniques, detection and countermeasures. In: 2nd international conference in i-warefare and security. pp 77
2. Bleeding-edge anti-forensics. In: Infosec world conference and Expo. MIS Training Institute
3. https://support.torproject.org/about/
4. Zhu Y, Fu X, Graham B, Bettati R, Zhao W (2010) Correlation-based traffic analysis attacks on anonymity networks. IEEE Trans Parallel Distrib Syst 21(7):954–967
5. Chakravarty S, Barbera MV, Portokalidis G, Polychronakis M, Keromytis AD (2014) On the effectiveness of traffic analysis against anonymity networks using flow records. In: Faloutsos M, Kuzmanovic A (eds) Passive and active measurement. PAM. Lecture notes in computer science, vol 8362. Springer, Cham