Refreshing results…
Building a Scalable System for Stealthy P2P-Botnet Detection
Download from hdl.handle.netSGor: Trust graph based onion routing
Download from hdl.handle.netInference attacks against trust-based onion routing: Trust degree to the rescue
Download from hdl.handle.netCharacterizing Inter-Domain Rerouting by Betweenness Centrality after Disruptive Events
Download from hdl.handle.netMore Anonymity through Trust Degree in Trust-Based Onion Routing
Download from hdl.handle.netACC: Anonymous Cooperative Caching in Wireless Ad Hoc Networks
Download from hdl.handle.netRobust Network Covert Communications Based on TCP and Enumerative Combinatorics
Download from hdl.handle.netFlow level detection and filtering of low-rate DDoS
Download from www.researchgate.netQDASH: a QoE-aware DASH system.
Download from www.researchgate.netCharacterizing Inter-domain Rerouting after Japan Earthquake
Download from hdl.handle.netA combinatorial approach to network covert communications with applications in Web Leaks
Download from hdl.handle.netDetecting stealthy P2P botnets using statistical traffic fingerprints
Download from www.researchgate.netPlanetopus: A system for facilitating collaborative network monitoring
Download from hdl.handle.netExposing Invisible Timing-based Traffic Watermarks with BACKLIT
Download from hdl.handle.netNon-cooperative Diagnosis of Submarine Cable Faults
Download from www.researchgate.netInferring the QoE of HTTP video streaming from user-viewing activities
Download from hdl.handle.netMissing publications? Search for publications with a matching author name.