Cited By
View all- Yuan YGe JCheng G(2025)DeMarking: A defense for network flow watermarking in real-timeComputers & Security10.1016/j.cose.2025.104355152(104355)Online publication date: May-2025
- Yang JWang L(2024)Explore Utilizing Network Traffic Distribution to Detect Stepping-Stone IntrusionElectronics10.3390/electronics1316325813:16(3258)Online publication date: 16-Aug-2024
- Zohaib ASheffey JHoumansadr A(2023)Investigating Traffic Analysis Attacks on Apple iCloud Private RelayProceedings of the 2023 ACM Asia Conference on Computer and Communications Security10.1145/3579856.3595793(773-784)Online publication date: 10-Jul-2023
- Show More Cited By