Author:
Huang Wentao,Wu Han,Li Zeyu,Zhang Qingfeng,Wang Xuebin,Zhao Jiapeng,Shi Jinqiao
Publisher
Springer Nature Singapore
Reference47 articles.
1. Akhoondi, M., Yu, C., Madhyastha, H.V.: Lastor: A low-latency as-aware tor client. In: 2012 IEEE Symposium on Security and Privacy, pp. 476–490. IEEE (2012)
2. Anderson, C.: Docker [software engineering]. IEEE Softw. 32(3), 102-c3 (2015)
3. Bang, J., Jeong, J., Lee, J.: Fedfingerprinting: a federated learning approach to website fingerprinting attacks in tor networks. IEEE Access 11, 78431–78444 (2023). https://doi.org/10.1109/ACCESS.2023.3299174
4. Bauer, K., McCoy, D., Grunwald, D., Kohno, T., Sicker, D.: Low-resource routing attacks against tor. In: Proceedings of the 2007 ACM workshop on Privacy in electronic society, pp. 11–20 (2007)
5. Bauer, K., Sherr, M., Grunwald, D.: {ExperimenTor}: a testbed for safe and realistic tor experimentation. In: 4th Workshop on Cyber Security Experimentation and Test (CSET 11) (2011)