Folgen
Andrew M. White
Andrew M. White
Zugehörigkeit unbekannt
Bestätigte E-Mail-Adresse bei cs.unc.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks
AM White, AR Matthews, KZ Snow, F Monrose
Security and Privacy (SP), 2011 IEEE Symposium on, 3-18, 2011
1872011
iSpy: Automatic reconstruction of typed input from compromising reflections
R Raguram, AM White, D Goswami, F Monrose, JM Frahm
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1162011
Seeing double: reconstructing obscured typed input from repeated compromising reflections
Y Xu, J Heinly, AM White, F Monrose, JM Frahm
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1062013
Methods, systems, and computer readable media for rapid filtering of opaque data traffic
AM White, F Monrose, S Krishnan, PA Porras, MD Bailey
US Patent 9,973,473, 2018
80*2018
Identification and classification of web traffic inside encrypted network tunnels
M Christodorescu, X Hu, DL Schales, R Sailer, MP Stoecklin, T Wang, ...
US Patent 9,106,536, 2015
522015
Clear and Present Data: Opaque Traffic and its Security Implications for the Future
AM White, S Krishnan, M Bailey, F Monrose, P Porras
Proceedings of the Network and Distributed Systems Security Symposium (NDSS), 2013
342013
Understanding domain registration abuses
SE Coull, AM White, TF Yen, F Monrose, MK Reiter
Computers and Security, 2012
292012
Understanding Domain Registration Abuses
SE Coull, AM White, TF Yen, F Monrose, MK Reiter
Proceedings of the 25th IFIP International Information Security Conference 330, 2010
292010
Emergent faithfulness to morphological and semantic heads in lexical blends
KE Shaw, AM White, E Moreton, F Monrose
Proceedings of the Annual Meetings on Phonology 1 (1), 2014
232014
On the privacy risks of virtual keyboards: automatic reconstruction of typed input from compromising reflections
R Raguram, AM White, Y Xu, JM Frahm, P Georgel, F Monrose
IEEE Transactions on Dependable and Secure Computing 10 (3), 154-167, 2013
192013
Isn't that Fantabulous: Security, Linguistic and Usability Challenges of Pronounceable Tokens
AM White, K Shaw, F Monrose, E Moreton
Proceedings of the 2014 New Security Paradigms Workshop, 25-38, 2014
72014
Practical analysis of encrypted network traffic
AM White
THE UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL, 2015
22015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–12