Cited By
View all- Dyer KCoull SShrimpton T(2015)MarionetteProceedings of the 24th USENIX Conference on Security Symposium10.5555/2831143.2831167(367-382)Online publication date: 12-Aug-2015
- Deri LMartinelli MCardigliano AVelasquez N(2014)Realtime high-speed network traffic monitoring using ntopngProceedings of the 28th USENIX conference on Large Installation System Administration10.5555/2717491.2717496(69-79)Online publication date: 9-Nov-2014
- Dyer KCoull SRistenpart TShrimpton TSadeghi AGligor VYung M(2013)Protocol misidentification made easy with format-transforming encryptionProceedings of the 2013 ACM SIGSAC conference on Computer & communications security10.1145/2508859.2516657(61-72)Online publication date: 4-Nov-2013
- Show More Cited By