Author of the publication

Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.

, , , , and . NDSS, The Internet Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The response of reinforced concrete to in-plane shear and normal stresses, and . University of Toronto, Dept. of Civil Engineering, (March 1982)PSI: Precise Security Instrumentation for Enterprise Networks., , , , and . NDSS, The Internet Society, (2017)An Empirical Analysis of Target-Resident DoS Filters., and . S&P, page 103-114. IEEE Computer Society, (2004)The modified compression-field theory for reinforced concrete elements subjected to shear., and . ACI Journal, 83 (2): 219--231 (1986)Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces., , , , and . NDSS, The Internet Society, (2007)A Model for Opportunistic Network Exploits: The Case of P2P Worms., , and . WEIS, (2006)Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors., and . ESORICS, volume 4189 of Lecture Notes in Computer Science, page 1-17. Springer, (2006)On Web Browsing Privacy in Anonymized NetFlows., , , , and . USENIX Security Symposium, USENIX Association, (2007)Creating Shared Information Spaces to Support Collaborative Design Work., , , , , and . Inf. Syst. Frontiers, 3 (3): 377-392 (2001)More Netflow Tools for Performance and Security., , , , and . LISA, page 121-132. USENIX, (2004)