Finding a Needle in a Haystack: The Traffic Analysis Version. | 0 | 0.34 | 2019 |
An empirical study of web browsers' resistance to traffic analysis and website fingerprinting attacks. | 0 | 0.34 | 2018 |
On PLC network security. | 2 | 0.42 | 2018 |
NetInfoMiner: High-level information extraction from network traffic | 0 | 0.34 | 2017 |
SCADA-SST: a SCADA security testbed | 0 | 0.34 | 2016 |
Analyzing anonymity attacks through noisy channels. | 2 | 0.35 | 2015 |
The web browser factor in traffic analysis attacks | 1 | 0.35 | 2015 |
Attacking Tor through Unpopular Ports | 2 | 0.36 | 2013 |
Testing probabilistic equivalence through Reinforcement Learning | 3 | 0.41 | 2013 |
Tor traffic analysis using Hidden Markov Models. | 2 | 0.37 | 2013 |
The Middle East under Malware Attack Dissecting Cyber Weapons | 5 | 0.54 | 2013 |
Bootstrapping trust of Web services based on trust patterns and Hidden Markov Models. | 3 | 0.38 | 2013 |
Anonymity attacks on mix systems: a formal analysis | 3 | 0.55 | 2011 |
Bootstrapping trust of web services through behavior observation | 4 | 0.40 | 2011 |
A New Information Leakage Measure for Anonymity Protocols | 2 | 0.37 | 2010 |
Learning the Difference between Partially Observable Dynamical Systems | 1 | 0.35 | 2009 |
Common Criteria Approach to J2ME CLDC Security Requirements | 0 | 0.34 | 2006 |
Security Evaluation Of J2me Cldc Embedded Java Platform | 11 | 2.26 | 2006 |
Trace equivalence characterization through reinforcement learning | 1 | 0.35 | 2006 |
E-Bunny: A Dynamic Compiler For Embedded Java Virtual Machines | 5 | 0.70 | 2005 |
Java for Mobile Devices: A Security Study | 7 | 0.78 | 2005 |
Security Analysis of Wireless Java | 1 | 0.51 | 2005 |
Security Analysis of Mobile Java | 6 | 0.79 | 2005 |
A dynamic compiler for embedded Java virtual machines | 7 | 0.62 | 2004 |
a synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines | 4 | 0.44 | 2004 |