共 39 条
[1]
AlSabah M., 2012, Proceedings of the 2012 ACM conference on Computer and communications security, P73, DOI [10.1145/2382196.2382208, DOI 10.1145/2382196.2382208]
[2]
[Anonymous], 2011, P USENIX WORKSH OFF
[3]
[Anonymous], 2001, J. Clin. Microbiol
[4]
[Anonymous], 2011, Acm T. Intel. Syst. Tec., DOI DOI 10.1145/1961189.1961199
[5]
Ateniese G., 2015, Network and System Security, P46
[6]
Bhoraskar R, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P1021
[7]
Cai X., 2012, P ACM C COMP COMM SE, P605, DOI 10.1145/2382196.2382260
[8]
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:227-238
[9]
Conti M., 2015, P ACM CODASPY, P297, DOI 10.1145/2699026.2699119