Author of the publication

Where art thou, Eve? Experiences laying traps for Internet eavesdroppers.

, , , and . CSET @ USENIX Security Symposium, USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition., , , and . WOOT, USENIX Association, (2015)HIP - a protocol for hierarchical multicast routing., and . Comput. Commun., 23 (7): 628-641 (2000)A system for the proactive, continuous, and efficient collection of digital forensic evidence., , and . Digit. Investig., 8 (Supplement): S3-S13 (2011)The Ordered Core Based Tree Protocol., and . INFOCOM, page 884-891. IEEE Computer Society, (1997)Accountable Wiretapping -or- I know they can hear you now., , , , , and . NDSS, The Internet Society, (2012)A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data Centers., , , , , , , , , and 4 other author(s). SIGCOMM Posters and Demos, page 71-73. ACM, (2017)Defending Anonymous Communications Against Passive Logging Attack., , , and . S&P, page 28-41. IEEE Computer Society, (2003)Providing Process Origin Information to Aid in Network Traceback., and . USENIX Annual Technical Conference, General Track, page 261-274. USENIX, (2002)Dispersing Asymmetric DDoS Attacks with SplitStack., , , , , , , , , and . HotNets, page 197-203. ACM, (2016)DeDoS: Defusing DoS with Dispersion Oriented Software., , , , , , , , , and 4 other author(s). ACSAC, page 712-722. ACM, (2018)