Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Katharina Kohls"'
Publikováno v:
Electronics; Volume 12; Issue 12; Pages: 2584
We designed a Network Exfiltration Detection System (NEDS) to detect data exfiltration as occurring in ransomware attacks. The NEDS operates on aggregated metadata, which is more privacy-friendly and allows analysis of large volumes of high-speed net
Publikováno v:
NDSS Symposium 2023: The Network and Distributed System Security Symposium (NDSS) 2023 will take place from 27 February – 3 March 2023 in San Diego, California., pp. 1-18
NDSS Symposium 2023: The Network and Distributed System Security Symposium (NDSS) 2023 will take place from 27 February – 3 March 2023 in San Diego, California., 1-18. S.l. : NDSS
STARTPAGE=1;ENDPAGE=18;TITLE=NDSS Symposium 2023: The Network and Distributed System Security Symposium (NDSS) 2023 will take place from 27 February – 3 March 2023 in San Diego, California.
NDSS Symposium 2023: The Network and Distributed System Security Symposium (NDSS) 2023 will take place from 27 February – 3 March 2023 in San Diego, California., 1-18. S.l. : NDSS
STARTPAGE=1;ENDPAGE=18;TITLE=NDSS Symposium 2023: The Network and Distributed System Security Symposium (NDSS) 2023 will take place from 27 February – 3 March 2023 in San Diego, California.
Mobile instant messengers such as WhatsApp use delivery status notifications in order to inform users if a sent message has successfully reached its destination. This is useful and important information for the sender due to the often asynchronous us
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bc81947136306a4cd0f349eaf803a89f
https://repository.ubn.ru.nl/handle/2066/289928
https://repository.ubn.ru.nl/handle/2066/289928
Autor:
Vera Rimmer, Theodor Schnitzler, Tom Van Goethem, Abel Rodríguez Romero, Wouter Joosen, Katharina Kohls
Publikováno v:
Proceedings on Privacy Enhancing Technologies, 2022, 314-335
Proceedings on Privacy Enhancing Technologies, 2022, 3, pp. 314-335
Proceedings on Privacy Enhancing Technologies, 2022, 3, pp. 314-335
Traffic analysis attacks against encrypted web traffic are a persisting problem. However, there is a large gap between the scientific estimate of attack threats and the real-world situation. As traffic analysis attacks depend on very specific metadat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1955a71ceed42c9b10b7e02a32807191
http://hdl.handle.net/2066/283073
http://hdl.handle.net/2066/283073
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031168147
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::df0db48d305a5823f8daff0d0de0d7a6
https://doi.org/10.1007/978-3-031-16815-4_26
https://doi.org/10.1007/978-3-031-16815-4_26
Publikováno v:
EuroS&P
Ruhr-Universität Bochum
Maffei, M. (ed.), EuroS&P2021: 2021 IEEE European Symposium on Security and Privacy, Virtual Conference 6-10 September 2021. Proceedings, pp. 319-336
Ruhr-Universität Bochum
Maffei, M. (ed.), EuroS&P2021: 2021 IEEE European Symposium on Security and Privacy, Virtual Conference 6-10 September 2021. Proceedings, pp. 319-336
Traffic analysis attacks against the Tor network are a persisting threat to the anonymity of its users. The technical capabilities of attacks against encrypted Internet traffic have come a long way. Although the current state-of-the-art predicts high
Publikováno v:
CCS
Remote censorship measurement techniques offer capabilities for monitoring Internet reachability around the world. However, operating these techniques continuously is labor-intensive and requires specialized knowledge and synchronization, leading to
Publikováno v:
NDSS
Publikováno v:
WiSec
Long Term Evolution (LTE) provides the communication infrastructure for both professional and private use cases and has become an integral part of our everyday life. Even though LTE/4G overcomes many security issues of previous standards, recent work
Publikováno v:
IEEE Symposium on Security and Privacy
Long Term Evolution (LTE) is the latest mobile communication standard and has a pivotal role in our information society: LTE combines performance goals with modern security mechanisms and serves casual use cases as well as critical infrastructure and
Publikováno v:
NDSS
Voice interfaces are becoming accepted widely as input methods for a diverse set of devices. This development is driven by rapid improvements in automatic speech recognition (ASR), which now performs on par with human listening in many tasks. These i