Shining light in dark places: Understanding the Tor network D McCoy, K Bauer, D Grunwald, T Kohno, D Sicker Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 …, 2008 | 581 | 2008 |
Low-resource routing attacks against Tor K Bauer, D McCoy, D Grunwald, T Kohno, D Sicker Proceedings of the 2007 ACM workshop on Privacy in electronic society, 11-20, 2007 | 483 | 2007 |
Changing of the guards: A framework for understanding and improving entry guard selection in Tor T Elahi, K Bauer, M AlSabah, R Dingledine, I Goldberg Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, 43-54, 2012 | 118 | 2012 |
Congestion-aware path selection for Tor T Wang, K Bauer, C Forero, I Goldberg Financial Cryptography and Data Security: 16th International Conference, FC …, 2012 | 118 | 2012 |
Enhancing Tor's performance using real-time traffic classification M AlSabah, K Bauer, I Goldberg Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 112 | 2012 |
{ExperimenTor}: A testbed for safe and realistic tor experimentation K Bauer, M Sherr, D Grunwald 4th Workshop on Cyber Security Experimentation and Test (CSET 11), 2011 | 106 | 2011 |
An Empirical Evaluation of Relay Selection in Tor. C Wacek, H Tan, KS Bauer, M Sherr NDss, 2013 | 104 | 2013 |
DefenestraTor: Throwing out windows in Tor M AlSabah, K Bauer, I Goldberg, D Grunwald, D McCoy, S Savage, ... Privacy Enhancing Technologies: 11th International Symposium, PETS 2011 …, 2011 | 98 | 2011 |
Methodically Modeling the Tor Network. R Jansen, KS Bauer, N Hopper, R Dingledine CSET, 2012 | 89 | 2012 |
The path less travelled: Overcoming Tor’s bottlenecks with traffic splitting M AlSabah, K Bauer, T Elahi, I Goldberg Privacy Enhancing Technologies: 13th International Symposium, PETS 2013 …, 2013 | 80 | 2013 |
Practical defenses for evil twin attacks in 802.11 H Gonzales, K Bauer, J Lindqvist, D McCoy, D Sicker 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010 | 69 | 2010 |
Mitigating evil twin attacks in 802.11 K Bauer, H Gonzales, D McCoy 2008 IEEE International Performance, Computing and Communications Conference …, 2008 | 58 | 2008 |
Have no phear: Networks without identifiers R Skowyra, K Bauer, V Dedhia, H Okhravi Proceedings of the 2016 ACM workshop on moving target defense, 3-14, 2016 | 41 | 2016 |
Physical layer attacks on unlinkability in wireless lans K Bauer, D McCoy, B Greenstein, D Grunwald, D Sicker Privacy Enhancing Technologies: 9th International Symposium, PETS 2009 …, 2009 | 41 | 2009 |
The directional attack on wireless localization-or-how to spoof your location with a tin can K Bauer, D McCoy, E Anderson, M Breitenbach, G Grudic, D Grunwald, ... GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009 | 36 | 2009 |
BitBlender: Light-weight anonymity for BitTorrent K Bauer, D McCoy, D Grunwald, D Sicker Proceedings of the workshop on Applications of private and anonymous …, 2008 | 34 | 2008 |
Bitstalker: Accurately and efficiently monitoring bittorrent traffic K Bauer, D McCoy, D Grunwald, D Sicker 2009 First IEEE International Workshop on Information Forensics and Security …, 2009 | 33 | 2009 |
Moving target techniques: Leveraging uncertainty for cyber defense H Okhravi, WW Streilein, KS Bauer Lincoln Laboratory Journal 22 (1), 100-109, 2016 | 32 | 2016 |
A distributed authentication scheme for a wireless sensing system K Bauer, H Lee Proceedings of the 2nd International Workshop on Networked Sensing System …, 2005 | 28 | 2005 |
Predicting Tor path compromise by exit port K Bauer, D Grunwald, D Sicker 2009 IEEE 28th International Performance Computing and Communications …, 2009 | 12 | 2009 |