共 80 条
[2]
P2V: Effective Website Fingerprinting Using Vector Space Representations
[J].
2015 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI),
2015,
:59-66
[3]
Anagnostakis Kostas G., 2010, International Journal of Computer and Network Security, V2, P1
[4]
[Anonymous], 2009, ACM SIGKDD explorations newsletter, DOI 10.1145/1656274.1656278
[5]
[Anonymous], 2011, P 20 INT C WORLD WID
[6]
[Anonymous], 2002, Honeypots: Tracking Hackers
[7]
Araujo F, 2015, P 8 USENIX C CYB SEC
[8]
Araujo F, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P145
[9]
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:942-953
[10]
Awad M, 2004, PROC INT C TOOLS ART, P663