Journal: ACM Trans. Inf. Syst. Secur.

Volume 15, Issue 3

11 -- 0Norman Danner, Sam DeFabbia-Kane, Danny Krizanc, Marc Liberatore. Effectiveness and detection of denial-of-service attacks in tor
12 -- 0Michael Brennan, Sadia Afroz, Rachel Greenstadt. Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity
13 -- 0David A. Basin, Samuel J. Burri, Günter Karjoth. Dynamic enforcement of abstract separation of duty constraints
14 -- 0Joan Feigenbaum, Aaron Johnson, Paul F. Syverson. Probabilistic analysis of onion routing in a black-box model