Author:
Cheng Xinda,Chen Yixing,Zou Jincai,Zhang Yuqiang,Hu Ning
Publisher
Springer Nature Singapore
Reference30 articles.
1. Cisa.einstein[db/ol]. [DB/OL]. https://www.cisa.gov/Einstein. Accessed 31 July 2021
2. Abhishta, A., van Heeswijk, W., Junger, M., Nieuwenhuis, L.J.M., Joosten, R.: Why would we get attacked? An analysis of attacker’s aims behind DDoS attacks. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(2), 3–22 (2020)
3. Chaum, D.: The dining cryptographers problem: unconditional sender and recipient untraceability. J. Cryptol. 1(1), 65–75 (1988)
4. Chen, C., Asoni, D.E., Perrig, A., Barrera, D., Danezis, G., Troncoso, C.: TaraNet: traffic-analysis resistant anonymity at the network layer. In: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 137–152. IEEE (2018)
5. Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. Technical report, Naval Research Lab Washington DC (2004)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Forensic Analysis of I2P Communication Network in Android and macOS Environments;2024 11th International Conference on Computing for Sustainable Global Development (INDIACom);2024-02-28