Philipp Winter
Philipp Winter
The Tor Project
Verified email at nymity.ch - Homepage
Title
Cited by
Cited by
Year
How the Great Firewall of China is Blocking Tor
P Winter, S Lindskog
Free and Open Communications on the Internet (FOCI), 2012
1932012
Inductive intrusion detection in flow-based network data using one-class support vector machines
P Winter, E Hermann, M Zeilinger
New Technologies, Mobility and Security (NTMS), 2011
932011
ScrambleSuit: A polymorphic network protocol to circumvent censorship
P Winter, T Pulls, J Fuss
Workshop on Privacy in the Electronic Society (WPES), 213-224, 2013
872013
Spoiled onions: Exposing malicious Tor exit relays
P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ...
Privacy Enhancing Technologies Symposium (PETS), 304-331, 2014
842014
Examining how the Great Firewall discovers hidden circumvention servers
R Ensafi, D Fifield, P Winter, N Feamster, N Weaver, V Paxson
Internet Measurement Conference (IMC), 445-458, 2015
662015
Analyzing the Great Firewall of China over space and time
R Ensafi, P Winter, A Mueen, JR Crandall
Proceedings on privacy enhancing technologies (PoPETs) 2015 (1), 61-76, 2015
552015
How China is Blocking Tor
P Winter, S Lindskog
arXiv preprint arXiv:1204.0447, 2012
362012
Identifying and Characterizing Sybils in the Tor Network.
P Winter, R Ensafi, K Loesing, N Feamster
USENIX Security Symposium, 1169-1185, 2016
252016
On detecting abrupt changes in network entropy time series
P Winter, H Lampesberger, M Zeilinger, E Hermann
IFIP International Conference on Communications and Multimedia Security (CMS …, 2011
242011
The effect of DNS on Tor's anonymity
B Greschbach, T Pulls, LM Roberts, P Winter, N Feamster
arXiv preprint arXiv:1609.08187, 2016
222016
Flow-based brute-force attack detection
J Vykopal, M Drašar, P Winter
Fraunhofer Verlag, 2013
142013
An on-line learning statistical model to detect malicious web requests
H Lampesberger, P Winter, M Zeilinger, E Hermann
International Conference on Security and Privacy in Communication Systems …, 2011
142011
TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network
Z Liu, Y Liu, P Winter, P Mittal, YC Hu
2017 IEEE 25th International Conference on Network Protocols (ICNP), 1-10, 2017
112017
How do Tor users interact with onion services?
P Winter, A Edmundson, LM Roberts, A Dutkowska-Żuk, M Chetty, ...
27th {USENIX} Security Symposium ({USENIX} Security 18), 411-428, 2018
102018
Towards a censorship analyser for Tor
P Winter
Free and Open Communications on the Internet (FOCI), 2013
92013
The Great Firewall of China: How it blocks Tor and why it is hard to pinpoint
P Winter, JR Crandall
Login: The Usenix Magazine 37 (6), 42-50, 2012
72012
Global censorship detection over the RIPE Atlas network
C Anderson, P Winter, Roya
Free and Open Communications on the Internet (FOCI), 2014
5*2014
Chocolatine: Outage detection for internet background radiation
A Guillot, R Fontugne, P Winter, P Merindol, A King, A Dainotti, C Pelsser
2019 Network Traffic Measurement and Analysis Conference (TMA), 1-8, 2019
42019
The impact of user location on cookie notices (inside and outside of the European union)
R Eijk, H Asghari, P Winter, A Narayanan
Workshop on Technology and Consumer Protection (ConPro'19), 2019
42019
Measuring and circumventing Internet censorship
P Winter
Karlstads Universitet, 2014
42014
The system can't perform the operation now. Try again later.
Articles 1–20