Login / Signup

Analysis of flow-correlation attacks in anonymity network.

Ye ZhuXinwen FuRiccardo BettatiWei Zhao
Published in: Int. J. Secur. Networks (2007)
Keyphrases
  • traffic analysis
  • correlation analysis
  • peer to peer
  • mobile devices
  • anomaly detection
  • network traffic
  • computer networks
  • network model
  • security threats
  • forensic analysis