Sciweavers

Share
CCS   2003 Conference on Computer and Communications Security
Wall of Fame | Most Viewed CCS-2003 Paper
CCS
2003
ACM
9 years 11 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source592
2Download preprint from source221
3Download preprint from source192
4Download preprint from source185
5Download preprint from source172
6Download preprint from source142
7Download preprint from source140
8Download preprint from source134
9Download preprint from source131
10Download preprint from source119
11Download preprint from source114
12Download preprint from source109
13Download preprint from source105
14Download preprint from source104
15Download preprint from source104
16Download preprint from source103
17Download preprint from source103
18Download preprint from source98
19Download preprint from source96
20Download preprint from source95
21Download preprint from source92
22Download preprint from source92
23Download preprint from source91
24Download preprint from source90
25Download preprint from source89
26Download preprint from source88
27Download preprint from source88
28Download preprint from source87
29Download preprint from source87
30Download preprint from source86
31Download preprint from source85
32Download preprint from source79
33Download preprint from source79
34Download preprint from source77
35Download preprint from source72
36Download preprint from source66
books