![]() | ![]() |
2007 | ||
---|---|---|
3 | EE | Scott E. Coull, Charles V. Wright, Fabian Monrose, Michael P. Collins, Michael K. Reiter: Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. NDSS 2007 |
2006 | ||
2 | EE | Michael P. Collins, Michael K. Reiter: Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors. ESORICS 2006: 1-17 |
2004 | ||
1 | EE | Michael P. Collins, Michael K. Reiter: An Empirical Analysis of Target-Resident DoS Filters. IEEE Symposium on Security and Privacy 2004: 103-114 |
1 | Scott E. Coull | [3] |
2 | Fabian Monrose | [3] |
3 | Michael K. Reiter | [1] [2] [3] |
4 | Charles V. Wright | [3] |