Follow
Philipp Winter
Philipp Winter
Brave Software
Verified email at nymity.ch - Homepage
Title
Cited by
Cited by
Year
How the Great Firewall of China is Blocking Tor
P Winter, S Lindskog
Free and Open Communications on the Internet (FOCI), 2012
2372012
Inductive intrusion detection in flow-based network data using one-class support vector machines
P Winter, E Hermann, M Zeilinger
New Technologies, Mobility and Security (NTMS), 2011
1342011
ScrambleSuit: A polymorphic network protocol to circumvent censorship
P Winter, T Pulls, J Fuss
Workshop on Privacy in the Electronic Society (WPES), 213-224, 2013
1202013
Spoiled onions: Exposing malicious Tor exit relays
P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ...
Privacy Enhancing Technologies Symposium (PETS), 304-331, 2014
1112014
Examining how the Great Firewall discovers hidden circumvention servers
R Ensafi, D Fifield, P Winter, N Feamster, N Weaver, V Paxson
Internet Measurement Conference (IMC), 445-458, 2015
1082015
Analyzing the Great Firewall of China over space and time
R Ensafi, P Winter, A Mueen, JR Crandall
Proceedings on privacy enhancing technologies (PoPETs) 2015 (1), 61-76, 2015
1062015
The effect of DNS on Tor's anonymity
B Greschbach, T Pulls, LM Roberts, P Winter, N Feamster
arXiv preprint arXiv:1609.08187, 2016
472016
How China is Blocking Tor
P Winter, S Lindskog
arXiv preprint arXiv:1204.0447, 2012
442012
Identifying and Characterizing Sybils in the Tor Network.
P Winter, R Ensafi, K Loesing, N Feamster
USENIX Security Symposium, 1169-1185, 2016
422016
How do tor users interact with onion services?
P Winter, A Edmundson, LM Roberts, A Dutkowska-Żuk, M Chetty, ...
27th USENIX Security Symposium (USENIX Security 18), 411-428, 2018
292018
On detecting abrupt changes in network entropy time series
P Winter, H Lampesberger, M Zeilinger, E Hermann
IFIP International Conference on Communications and Multimedia Security (CMS …, 2011
272011
TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network
Z Liu, Y Liu, P Winter, P Mittal, YC Hu
2017 IEEE 25th International Conference on Network Protocols (ICNP), 1-10, 2017
202017
An on-line learning statistical model to detect malicious web requests
H Lampesberger, P Winter, M Zeilinger, E Hermann
International Conference on Security and Privacy in Communication Systems …, 2011
182011
The impact of user location on cookie notices (inside and outside of the European Union)
R Van Eijk, H Asghari, P Winter, A Narayanan
arXiv preprint arXiv:2110.09832, 2021
162021
Chocolatine: Outage detection for internet background radiation
A Guillot, R Fontugne, P Winter, P Merindol, A King, A Dainotti, C Pelsser
2019 Network Traffic Measurement and Analysis Conference (TMA), 1-8, 2019
162019
Flow-based brute-force attack detection
J Vykopal, M Drašar, P Winter
Fraunhofer Verlag, 2013
162013
Towards a censorship analyser for Tor
P Winter
Free and Open Communications on the Internet (FOCI), 2013
132013
Global network interference detection over the {RIPE} atlas network
C Anderson, P Winter
4th USENIX Workshop on Free and Open Communications on the Internet (FOCI 14), 2014
102014
The impact of user location on cookie notices (inside and outside of the European union)
R Eijk, H Asghari, P Winter, A Narayanan
Workshop on Technology and Consumer Protection (ConPro'19), 2019
92019
The Great Firewall of China: How it blocks Tor and why it is hard to pinpoint
P Winter, JR Crandall
Login: The Usenix Magazine 37 (6), 42-50, 2012
82012
The system can't perform the operation now. Try again later.
Articles 1–20