Author of the publication

Tracked Without a Trace: Linking Sessions of Users by Unsupervised Learning of Patterns in Their DNS Traffic.

, , , and . AISec@CCS, page 23-34. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Catching Inside Attackers: Balancing Forensic Detectability and Privacy of Employees., , , and . iNetSeC, volume 9591 of Lecture Notes in Computer Science, page 43-55. Springer, (2015)EncDNS: A Lightweight Privacy-Preserving Name Resolution Service., , , and . ESORICS (1), volume 8712 of Lecture Notes in Computer Science, page 37-55. Springer, (2014)Interpretation und Artikulation mit Äußerungs-Bedeutungs-Transduktoren.. Brandenburg University of Technology, Cottbus - Senftenberg, Germany, (2016)Anonymity Online for Everyone: What Is Missing for Zero-Effort Privacy on the Internet?, , , and . iNetSeC, volume 9591 of Lecture Notes in Computer Science, page 82-94. Springer, (2015)Tracked Without a Trace: Linking Sessions of Users by Unsupervised Learning of Patterns in Their DNS Traffic., , , and . AISec@CCS, page 23-34. ACM, (2016)Efficient Identification of Applications in Co-resident VMs via a Memory Side-Channel., and . SEC, volume 529 of IFIP Advances in Information and Communication Technology, page 245-259. Springer, (2018)Behavior-based tracking of Internet users with semi-supervised learning., , , and . PST, page 596-599. IEEE, (2016)A memory-deduplication side-channel attack to detect applications in co-resident virtual machines., and . SAC, page 183-192. ACM, (2018)Towards Abuse Detection and Prevention in IaaS Cloud Computing.. ARES, page 211-217. IEEE Computer Society, (2015)Obtaining personal data and asking for erasure: do app vendors and website owners honour your privacy rights?, and . Sicherheit, volume P-256 of LNI, page 149-160. GI, (2016)