共 35 条
- [1] CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1455 - 1466
- [2] Deanonymizing Schemes of Hidden Services in Tor Network: A Survey 2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 468 - 473
- [3] Leveraging the Users Graph and Trustful Transactions for the Analysis of Bitcoin Price IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02): : 1338 - 1352
- [4] Tracing Tor Hidden Service Through Protocol Characteristics 2022 31ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2022), 2022,
- [5] POSTER: Fingerprinting Tor Hidden Service CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1766 - 1768
- [6] Forensic Analysis of Bitcoin Transactions 2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2019, : 167 - 169
- [10] Is Bitcoin gathering dust? An analysis of low-amount Bitcoin transactions Applied Network Science, 8