ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1402.1940
  4. Cited By
No NAT'd User left Behind: Fingerprinting Users behind NAT from NetFlow
  Records alone

No NAT'd User left Behind: Fingerprinting Users behind NAT from NetFlow Records alone

9 February 2014
Nino Vincenzo Verde
G. Ateniese
E. Gabrielli
L. Mancini
A. Spognardi
ArXiv (abs)PDFHTML

Papers citing "No NAT'd User left Behind: Fingerprinting Users behind NAT from NetFlow Records alone"

10 / 10 papers shown
Title
CADeSH: Collaborative Anomaly Detection for Smart Homes
CADeSH: Collaborative Anomaly Detection for Smart Homes
Yair Meidan
D. Avraham
H. Libhaber
A. Shabtai
55
9
0
02 Mar 2023
Domain Name Encryption Is Not Enough: Privacy Leakage via IP-based
  Website Fingerprinting
Domain Name Encryption Is Not Enough: Privacy Leakage via IP-based Website Fingerprinting
Nguyen Phong Hoang
Arian Akhavan Niaki
Phillipa Gill
M. Polychronakis
67
26
0
16 Feb 2021
A Survey on Analyzing Encrypted Network Traffic of Mobile Devices
A Survey on Analyzing Encrypted Network Traffic of Mobile Devices
Ashutosh Bhatia
Ankit Agrawal
Kamlesh Tiwari
K. Haribabu
D. Vishwakarma
12
19
0
22 Jun 2020
Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of
  IoT Traffic with Neural Networks
Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks
Shuaike Dong
Zhou Li
Di Tang
Jiongyi Chen
Menghan Sun
Kehuan Zhang
65
57
0
31 Aug 2019
Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping
Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping
Noah J. Apthorpe
D. Huang
D. Reisman
Arvind Narayanan
Nick Feamster
60
159
0
03 Dec 2018
Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT
  Traffic
Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic
Noah J. Apthorpe
D. Reisman
S. Sundaresan
Arvind Narayanan
Nick Feamster
59
237
0
16 Aug 2017
The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic
  Analysis
The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis
Mauro Conti
Qian Qian Li
Alberto Maragno
Riccardo Spolaor
34
88
0
12 Aug 2017
No Place to Hide that Bytes won't Reveal: Sniffing Location-Based
  Encrypted Traffic to Track a User's Position
No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position
G. Ateniese
Briland Hitaj
L. Mancini
Nino Vincenzo Verde
Antonio Villani
46
20
0
28 May 2015
Can't you hear me knocking: Identification of user actions on Android
  apps via traffic analysis
Can't you hear me knocking: Identification of user actions on Android apps via traffic analysis
Mauro Conti
L. Mancini
Riccardo Spolaor
Nino Vincenzo Verde
56
111
0
29 Jul 2014
Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data
  from Machine Learning Classifiers
Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers
G. Ateniese
G. Felici
L. Mancini
A. Spognardi
Antonio Villani
Domenico Vitali
106
464
0
19 Jun 2013
1