Author:
Freire Emanuel P.,Ziviani Artur,Salles Ronaldo M.
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Demystifying Video Traffic from IoT (Spy) Camera using Undecrypted Network Traffic;Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy;2022-04-14
2. RExACtor: Automatic Regular Expression Signature Generation for Stateless Packet Inspection;2021 IEEE 20th International Symposium on Network Computing and Applications (NCA);2021-11-23
3. Vulnerability of Virtual Private Networks to Web Fingerprinting Attack;Advances in Security, Networks, and Internet of Things;2021
4. Snort Rule Detection for Countering in Network Attacks;Advances in Intelligent Systems and Computing;2017
5. Over-The-Top Bypass;Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security;2016-10-24