1 code implementation • 18 Feb 2019 • Mohammad Saidur Rahman, Payap Sirinam, Nate Mathews, Kantha Girish Gangadhara, Matthew Wright
To further investigate the value of timing information, we perform an information leakage analysis on our proposed handcrafted features.
Website Fingerprinting Attacks Cryptography and Security