共 19 条
[1]
Almubayed Alaeddin, 2015, International Journal of Computer Network and Information Security, V7, P10, DOI 10.5815/ijcnis.2015.07.02
[2]
Aminuddin MAIM, 2018, INT J ADV COMPUT SC, V9, P113
[3]
[Anonymous], 2004, TOR 2 GENERATION ONI
[5]
Chaabane A., 2010, Proceedings of the 2010 Fourth International Conference on Network and System Security (NSS 2010), P167, DOI 10.1109/NSS.2010.47
[6]
Cuzzocrea A., 2017, TOR TRAFFIC ANAL DET
[7]
Hellebrandt L, 2019, 2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), P29, DOI [10.1109/bloc.2019.8751340, 10.1109/BLOC.2019.8751340]
[8]
Hodo E., 2017, ARES, P6
[9]
Jia LY, 2017, I C COMM SOFTW NET, P239, DOI 10.1109/ICCSN.2017.8230113
[10]
Characterization of Tor Traffic using Time based Features
[J].
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY,
2017,
:253-262