How the Great Firewall of China is Blocking Tor P Winter, S Lindskog Free and Open Communications on the Internet (FOCI), 2012 | 272 | 2012 |
Analyzing the Great Firewall of China over space and time R Ensafi, P Winter, A Mueen, JR Crandall Proceedings on privacy enhancing technologies (PoPETs) 2015 (1), 61-76, 2015 | 161 | 2015 |
Inductive intrusion detection in flow-based network data using one-class support vector machines P Winter, E Hermann, M Zeilinger New Technologies, Mobility and Security (NTMS), 2011 | 156 | 2011 |
Examining how the Great Firewall discovers hidden circumvention servers R Ensafi, D Fifield, P Winter, N Feamster, N Weaver, V Paxson Internet Measurement Conference (IMC), 445-458, 2015 | 148 | 2015 |
ScrambleSuit: A polymorphic network protocol to circumvent censorship P Winter, T Pulls, J Fuss Workshop on Privacy in the Electronic Society (WPES), 213-224, 2013 | 148 | 2013 |
Spoiled onions: Exposing malicious Tor exit relays P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ... Privacy Enhancing Technologies Symposium (PETS), 304-331, 2014 | 131 | 2014 |
Identifying and Characterizing Sybils in the Tor Network. P Winter, R Ensafi, K Loesing, N Feamster USENIX Security Symposium, 1169-1185, 2016 | 73 | 2016 |
The Effect of DNS on Tor's Anonymity B Greschbach, T Pulls, LM Roberts, P Winter, N Feamster arXiv preprint arXiv:1609.08187, 2016 | 57 | 2016 |
How China is Blocking Tor P Winter, S Lindskog arXiv preprint arXiv:1204.0447, 2012 | 52 | 2012 |
How do tor users interact with onion services? P Winter, A Edmundson, LM Roberts, A Dutkowska-Żuk, M Chetty, ... 27th USENIX Security Symposium (USENIX Security 18), 411-428, 2018 | 46 | 2018 |
The impact of user location on cookie notices (inside and outside of the European union) R Van Eijk, H Asghari, P Winter, A Narayanan arXiv preprint arXiv:2110.09832, 2021 | 35 | 2021 |
Chocolatine: Outage detection for internet background radiation A Guillot, R Fontugne, P Winter, P Merindol, A King, A Dainotti, C Pelsser 2019 Network Traffic Measurement and Analysis Conference (TMA), 1-8, 2019 | 33 | 2019 |
On detecting abrupt changes in network entropy time series P Winter, H Lampesberger, M Zeilinger, E Hermann IFIP International Conference on Communications and Multimedia Security (CMS …, 2011 | 32 | 2011 |
Roya C Anderson, P Winter Global Network Interference Detection Over the RIPE Atlas Network. In USENIX …, 2014 | 26 | 2014 |
TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network Z Liu, Y Liu, P Winter, P Mittal, YC Hu 2017 IEEE 25th International Conference on Network Protocols (ICNP), 1-10, 2017 | 24 | 2017 |
Flow-based Brute-force Attack Detection M Drašar, J Vykopal, P Winter Fraunhofer Verlag, 2013 | 20 | 2013 |
An on-line learning statistical model to detect malicious web requests H Lampesberger, P Winter, M Zeilinger, E Hermann International Conference on Security and Privacy in Communication Systems …, 2011 | 18 | 2011 |
The impact of user location on cookie notices (inside and outside of the European union) R Eijk, H Asghari, P Winter, A Narayanan Workshop on Technology and Consumer Protection (ConPro'19), 2019 | 15 | 2019 |
The Great Firewall of China: How it blocks Tor and why it is hard to pinpoint P Winter, JR Crandall Login: The Usenix Magazine 37 (6), 42-50, 2012 | 14 | 2012 |
Geo-locating BGP prefixes P Winter, R Padmanabhan, A King, A Dainotti 2019 Network Traffic Measurement and Analysis Conference (TMA), 9-16, 2019 | 13 | 2019 |