Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Tor
biblio
Privacy-Preserving Dynamic Learning of Tor Network Traffic
Submitted by
grigby1
on Wed, 10/30/2019 - 9:31am
collaboration
comparability
Human behavior
Measurement
Metrics
modeling
Performance
pubcrawl
Resiliency
Scalability
Science of Security
simulation
Tor
biblio
Tor Browser Forensics in Exploring Invisible Evidence
Submitted by
grigby1
on Fri, 04/05/2019 - 9:27am
internet
tools
resilience
pubcrawl
Human behavior
Metrics
Browsers
Cryptography
Forensics
Computer crime
online front-ends
Browser Security
Compositionality
Digital Forensics
Tor
Resiliency
DH-HEMTs
digital evidence
endeavors
Facebook
incognito
information security incidents
information security offenses
Internet crimes
invisible evidence
onion router
onion routing
perpetrators
Relays
Tor browser forensics
biblio
Tracking Private Browsing Sessions Using CPU-Based Covert Channels
Submitted by
grigby1
on Fri, 04/05/2019 - 9:26am
Browser Security
Compositionality
covert channels
CPU
CSS
electromagnetic emanations
HTML5
Human behavior
JavaScript
Metrics
pubcrawl
resilience
Resiliency
Tor
user identification
Web Tracking
biblio
Measuring Information Leakage in Website Fingerprinting Attacks and Defenses
Submitted by
grigby1
on Thu, 01/31/2019 - 11:19am
anonymity
composability
Human behavior
Human Factors
Metrics
pubcrawl
resilience
Resiliency
Tor
website fingerprinting
biblio
How Far Can We Push Flow Analysis to Identify Encrypted Anonymity Network Traffic?
Submitted by
grigby1
on Thu, 01/31/2019 - 11:19am
anonymity
anonymity network users
Bandwidth
composability
Cryptography
data privacy
dataset
encrypted anonymity network traffic
encryption
flow analysis approach
Human behavior
Human Factors
I2P
internet
JonDonym
learning (artificial intelligence)
machine learning
Metrics
Protocols
pubcrawl
resilience
Resiliency
telecommunication traffic
tools
Tor
Traffic flow
traffic flow behavior
traffic flow Identification
biblio
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark
Submitted by
grigby1
on Wed, 09/12/2018 - 10:15am
anonymity
anonymity services
Bandwidth
Bayes methods
Bayesian network
belief networks
classifiers
communication content
Cryptography
dark web
data privacy
encryption
Human behavior
Human Factors
I2P
internet
JonDonym
learning (artificial intelligence)
machine learning
Naive Bayes
network traffic
pattern classification
privacy
pubcrawl
public dataset
Relays
security
security of data
sole statistical features
specific anonymity tool
statistical analysis
telecommunication traffic
tools
Tor
Traffic classification
users privacy
biblio
DPS-Discuss: Demonstrating Decentralized, Pseudonymous, Sybil-resistant Communication
Submitted by
K_Hooper
on Wed, 05/02/2018 - 9:40am
bitcoin
censorship
composability
Metrics
Pseudonymity
pubcrawl
Resiliency
sybil attacks
Sybil-Resistance
Tor
biblio
Cyber Anonymity Based on Software-Defined Networking and Onion Routing (SOR)
Submitted by
grigby1
on Mon, 04/02/2018 - 11:30am
anonymity
Cloud Computing
cloud networks
composability
computer network security
cyber anonymity service
cyber anonymity technique
E-cash
Government
Human behavior
internet
Metrics
multiple anonymity service providers
network traffic censorship
onion routing
OpenFlow
privacy
Protocols
pubcrawl
Relays
resilience
Resiliency
Routing
Servers
software defined networking
software-defined networking
software-defined networking and onion routing
SOR architecture
telecommunication network routing
telecommunication traffic
Token
Tor
traffic surveillance
biblio
Hybrid Focused Crawling for Homemade Explosives Discovery on Surface and Dark Web
Submitted by
grigby1
on Fri, 11/03/2017 - 10:29am
pubcrawl
Human behavior
Human Factors
dark web
internet
classifier-guided hyperlink selection strategy
Context
Crawlers
Darknets
explosives
focused crawling
Freenet
government data processing
homemade explosives discovery
hybrid focused crawling
I2P
information retrieval
search engines
surface Web
Terrorism
Tor
Uniform resource locators
Web pages
Web resource discovery
biblio
Mining the Dark Web: Drugs and Fake Ids
Submitted by
grigby1
on Fri, 11/03/2017 - 10:28am
security
pubcrawl
Human behavior
Human Factors
cryptocurrencies
security of data
Agora
authomation
bitcoins
counterfeit documents
dark web
dark Web marketplaces
dark Web mining
Data collection
Data mining
data wrangling
drugs
etl processing
Europol
fake ids
FBI
governmental bodies
illegal item marketplace
internet
law administration
nonstandard communication protocols
Roads
The Silk Road
Tor
Weapons
Web sites
1
2
next ›
last »