Investigating Commercial {Pay-Per-Install} and the Distribution of Unwanted Software K Thomas, JAE Crespo, R Rasti, JM Picod, C Phillips, MA Decoste, ... 25th USENIX Security Symposium (USENIX Security 16), 721-739, 2016 | 91 | 2016 |
Locating Tor hidden services through an interval-based traffic-correlation attack JA Elices, F Pérez-González 2013 IEEE Conference on Communications and Network Security (CNS), 385-386, 2013 | 15 | 2013 |
Fingerprinting Tor's hidden service log files using a timing channel JA Elices, F Perez-Gonzalez, C Troncoso 2011 IEEE International Workshop on Information Forensics and Security, 1-6, 2011 | 12 | 2011 |
Fingerprinting a flow of messages to an anonymous server JA Elices, F Pérez-González 2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012 | 8 | 2012 |
The flow fingerprinting game JA Elices, F Pérez-González 2013 IEEE International Workshop on Information Forensics and Security (WIFS …, 2013 | 5 | 2013 |
A highly optimized flow-correlation attack JA Elices, F Pérez-González arXiv preprint arXiv:1310.4577, 2013 | 4 | 2013 |
Measures to model delays on internet JA Elices, F Pérez-González | 3 | 2013 |
Linking correlated network flows through packet timing: a game-theoretic approach JA Elices, F Pérez-González arXiv preprint arXiv:1307.3136, 2013 | 2 | 2013 |
Neyman-Pearson Decision in Traffic Analysis JA Elices The University of New Mexico, 2014 | | 2014 |
Estudio de la influencia del EGNOS en la magnitud del error y en la velocidad de variación JA Elices-Crespo, J Gómez-Gil | | |