Remote Physical Device Fingerprinting
IEEE Transactions on Dependable and Secure Computing
Usage-based dhcp lease time optimization
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
One hop reputations for peer to peer file sharing workloads
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
BitBlender: light-weight anonymity for BitTorrent
Proceedings of the workshop on Applications of private and anonymous communications
Monitoring the Bittorrent Monitors: A Bird's Eye View
PAM '09 Proceedings of the 10th International Conference on Passive and Active Network Measurement
Privacy-preserving P2P data sharing with OneSwarm
Proceedings of the ACM SIGCOMM 2010 conference
Pretty good packet authentication
HotDep'08 Proceedings of the Fourth conference on Hot topics in system dependability
LEET'10 Proceedings of the 3rd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more
Crawling BitTorrent DHTs for fun and profit
WOOT'10 Proceedings of the 4th USENIX conference on Offensive technologies
Pushing BitTorrent locality to the limit
Computer Networks: The International Journal of Computer and Telecommunications Networking
One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
Omnify: investigating the visibility and effectiveness of copyright monitors
PAM'11 Proceedings of the 12th international conference on Passive and active measurement
Effective digital forensics research is investigator-centric
HotSec'11 Proceedings of the 6th USENIX conference on Hot topics in security
Dark clouds on the horizon: using cloud storage as attack vector and online slack space
SEC'11 Proceedings of the 20th USENIX conference on Security
Forensic investigation of the OneSwarm anonymous filesharing system
Proceedings of the 18th ACM conference on Computer and communications security
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Only the good... get pirated: game piracy activity vs. metacritic score
Proceedings of the 6th International Conference on Foundations of Digital Games
Understanding BitTorrent: A reality check from the ISP's perspective
Computer Networks: The International Journal of Computer and Telecommunications Networking
Distribution of digital games via BitTorrent
Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments
Forensic investigation of peer-to-peer file sharing networks
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Patterns in the distribution of digital games via BitTorrent
International Journal of Advanced Media and Communication
Predicting the impact of measures against P2P networks: transient behavior and phase transition
IEEE/ACM Transactions on Networking (TON)
Policy implications of technology for detecting P2P and copyright violations
Telecommunications Policy
Hi-index | 0.00 |
Security proponents heavily emphasize the importance of choosing a strong password (one with high entropy). Unfortunately, by design, most humans are apparently incapable of generating such passwords, or memorizing a random-looking, machine-generated ...