共 27 条
[1]
Al-Naami K., 2016, Proceedings of the 32nd Annual Conference on Computer Security Applications, P177, DOI DOI 10.1145/2991079.2991123
[2]
Alexa, TOP VIS SIT WEB
[3]
[Anonymous], 2001, IPSEC SECURING VPNS
[4]
[Anonymous], APACHE SPARK
[5]
Cai X., 2012, P 2012 ACM C COMP CO, P605, DOI DOI 10.1145/2382196.2382260
[6]
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:227-238
[7]
Dingledine R, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, P303
[8]
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
[J].
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2012,
:332-346
[9]
Gu XD, 2015, INT C COMP SUPP COOP, P234, DOI 10.1109/CSCWD.2015.7230964
[10]
Hayes J, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P1187