![]() |
| 2007 | ||
|---|---|---|
| 3 | EE | Scott E. Coull, Charles V. Wright, Fabian Monrose, Michael P. Collins, Michael K. Reiter: Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. NDSS 2007 |
| 2006 | ||
| 2 | EE | Michael P. Collins, Michael K. Reiter: Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors. ESORICS 2006: 1-17 |
| 2004 | ||
| 1 | EE | Michael P. Collins, Michael K. Reiter: An Empirical Analysis of Target-Resident DoS Filters. IEEE Symposium on Security and Privacy 2004: 103-114 |
| 1 | Scott E. Coull | [3] |
| 2 | Fabian Monrose | [3] |
| 3 | Michael K. Reiter | [1] [2] [3] |
| 4 | Charles V. Wright | [3] |