Asya Mitseva

According to our database1, Asya Mitseva authored at least 15 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Security and performance implications of BGP rerouting-resistant guard selection algorithms for Tor.
Comput. Secur., September, 2023

2022
Challenges and Pitfalls in Generating Representative ICS Datasets in Cyber Security Research.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

2021
GuardedGossip: Secure and Anonymous Node Discovery in Untrustworthy Networks.
Proceedings of the Security and Privacy in Communication Networks, 2021

WhisperChord: Scalable and Secure Node Discovery for Overlay Networks.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Analyzing PeerFlow - A Bandwidth Estimation System for Untrustworthy Environments.
Proceedings of the Sicherheit 2020, Sicherheit, 2020

Security and Performance Implications of BGP Rerouting-Resistant Guard Selection Algorithms for Tor.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Analysis of Multi-path Onion Routing-Based Anonymization Networks.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

POSTER: Traffic Splitting to Counter Website Fingerprinting.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
The state of affairs in BGP security: A survey of attacks and defenses.
Comput. Commun., 2018

2017
Analysis of Fingerprinting Techniques for Tor Hidden Services.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

2016
POSTER: Fingerprinting Tor Hidden Services.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2014
Mobile Adhoc Offloading.
CoRR, 2014


  Loading...