Author:
Conrad Bernd,Shirazi Fatemeh
Reference9 articles.
1. The shadow simulator. http://shadow.github.io/.
2. Tor metrics portal: Data. https://metrics.torproject.org/data.html.
3. Tor metrics portal: Users. https://metrics.torproject.org/users.html.
4. K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker. Low-resource routing attacks against tor. In WPES, pages 11--20. ACM, 2007.
5. N. Borisov, G. Danezis, P. Mittal, and P. Tabriz. Denial of service or denial of security? In CCS, pages 92--102. ACM, 2007.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. P-I2Prange: An Automatic Construction Architecture for Scenarios in I2P Ranges;2024 International Joint Conference on Neural Networks (IJCNN);2024-06-30
2. Privacy-Preserving Dynamic Learning of Tor Network Traffic;Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security;2018-01-15