Sciweavers

Share
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
9 years 9 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
LCN
2007
IEEE
9 years 10 months ago
Efficient Multi-Dimensional Flow Correlation
—Flow correlation algorithms compare flows to determine similarity, and are especially useful and well studied for detecting flow chains through “stepping stone” hosts. Most ...
W. Timothy Strayer, Christine E. Jones, Beverly Sc...
books