Cited By
View all- Yang JWang L(2024)Explore Utilizing Network Traffic Distribution to Detect Stepping-Stone IntrusionElectronics10.3390/electronics1316325813:16(3258)Online publication date: 16-Aug-2024
- Zohaib ASheffey JHoumansadr A(2023)Investigating Traffic Analysis Attacks on Apple iCloud Private RelayProceedings of the 2023 ACM Asia Conference on Computer and Communications Security10.1145/3579856.3595793(773-784)Online publication date: 10-Jul-2023
- Chen XWu CLiu XHuang QZhang DZhou HYang QKhan M(2023)Empowering Network Security With Programmable Switches: A Comprehensive SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2023.326598425:3(1653-1704)Online publication date: Nov-2024
- Show More Cited By