Author image not provided
 Alex Maltinsky

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article1.00
Citation Count1
Publication count1
Publication years2017-2017
Available for download1
Average downloads per article100.00
Downloads (cumulative)100
Downloads (12 Months)100
Downloads (6 Weeks)10
SEARCH
ROLE


AUTHOR'S COLLEAGUES
See all colleagues of this author




BOOKMARK & SHARE


1 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 1 of 1
Sort by:

1 published by ACM
May 2017 ACM Transactions on Intelligent Systems and Technology (TIST) - Special Issue: Cyber Security and Regular Papers: Volume 8 Issue 4, July 2017
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 13,   Downloads (12 Months): 103,   Downloads (Overall): 103

Full text available: PDFPDF
Network level surveillance, censorship, and various man-in-the-middle attacks target only specific types of network traffic (e.g., HTTP, HTTPS, VoIP, or Email). Therefore, packets of these types will likely receive “special” treatment by a transit network or a man-in-the-middle attacker. A transit Internet Service Provider (ISP) or an attacker may pass ...
Keywords: Adversarial model



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us