Similar Items: Convolutional-Neural-Networks for Deanonymisation of I2P Traffic
- Noisy Networks, Nosy Neighbors: Simple Privacy Attacks Against Residential Wireless Traffic
- Analyzing Unsolicited Internet Traffic: Measuring IoT Security Threats via Network Telescopes
- HELO Cryptography: A Lightweight Cryptographic System for Enhancing IoT Security in P2P Data Transmission
- Machine Unlearning for Class Removal through SISA-based Deep Neural Network Architectures
- Reflecthernet: Exfiltrating 100BASE-TX Ethernet Traffic Using a Retroreflector Hardware Trojan
- Can I Check What I Designed? Mapping Security Design DSLs to Code Analyzers