One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users.
Stevens Le BlondPere ManilsChaabane AbdelberiMohamed Ali KâafarClaude CastellucciaArnaud LegoutWalid DabbousPublished in: LEET (2011)
Keyphrases
- user profiles
- file sharing
- social media
- collaborative filtering
- peer to peer
- user requirements
- novice users
- website
- user interface
- end users
- information retrieval
- web content
- information access
- domain experts
- user centric
- query formulation
- recommendation systems
- user feedback
- daily life
- response time
- information systems