共 41 条
[1]
AlSabah M, 2011, LECT NOTES COMPUT SC, V6794, P134, DOI 10.1007/978-3-642-22263-4_8
[2]
AlSabah Mashael, 2012, P 2012 ACM C COMP CO, P73, DOI [10.1145/2382196.2382208, DOI 10.1145/2382196.2382208]
[3]
[Anonymous], 2006, HOT NOT REVEALING HI, DOI [DOI 10.1145/1180405.1180410, 10.1145/1180405.1180410]
[4]
[Anonymous], 2009, P 2009 ACM WORKSH CL
[5]
Bhargava Aditya., 2009, ACL SRW, P43
[6]
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization
[J].
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2013,
:80-94
[7]
Cai X., 2012, P 2012 ACM C COMP CO, P605, DOI [DOI 10.1145/2382196.2382260, 10.1145/2382196.2382260]
[9]
Dengle S, 2014, INT J SCI RES, V8, P691
[10]
Dingledine R, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, P303