Philipp Winter
Philipp Winter
Verified email at - Homepage
Cited by
Cited by
How the Great Firewall of China is Blocking Tor
P Winter, S Lindskog
Free and Open Communications on the Internet (FOCI), 2012
Analyzing the Great Firewall of China over space and time
R Ensafi, P Winter, A Mueen, JR Crandall
Proceedings on privacy enhancing technologies (PoPETs) 2015 (1), 61-76, 2015
Inductive intrusion detection in flow-based network data using one-class support vector machines
P Winter, E Hermann, M Zeilinger
New Technologies, Mobility and Security (NTMS), 2011
ScrambleSuit: A polymorphic network protocol to circumvent censorship
P Winter, T Pulls, J Fuss
Workshop on Privacy in the Electronic Society (WPES), 213-224, 2013
Examining how the Great Firewall discovers hidden circumvention servers
R Ensafi, D Fifield, P Winter, N Feamster, N Weaver, V Paxson
Internet Measurement Conference (IMC), 445-458, 2015
Spoiled onions: Exposing malicious Tor exit relays
P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ...
Privacy Enhancing Technologies Symposium (PETS), 304-331, 2014
Identifying and Characterizing Sybils in the Tor Network.
P Winter, R Ensafi, K Loesing, N Feamster
USENIX Security Symposium, 1169-1185, 2016
The Effect of DNS on Tor's Anonymity
B Greschbach, T Pulls, LM Roberts, P Winter, N Feamster
arXiv preprint arXiv:1609.08187, 2016
How China is Blocking Tor
P Winter, S Lindskog
arXiv preprint arXiv:1204.0447, 2012
How do tor users interact with onion services?
P Winter, A Edmundson, LM Roberts, A Dutkowska-Żuk, M Chetty, ...
27th USENIX Security Symposium (USENIX Security 18), 411-428, 2018
The impact of user location on cookie notices (inside and outside of the European union)
R Van Eijk, H Asghari, P Winter, A Narayanan
arXiv preprint arXiv:2110.09832, 2021
Chocolatine: Outage detection for internet background radiation
A Guillot, R Fontugne, P Winter, P Merindol, A King, A Dainotti, C Pelsser
2019 Network Traffic Measurement and Analysis Conference (TMA), 1-8, 2019
On detecting abrupt changes in network entropy time series
P Winter, H Lampesberger, M Zeilinger, E Hermann
IFIP International Conference on Communications and Multimedia Security (CMS …, 2011
C Anderson, P Winter
Global Network Interference Detection Over the RIPE Atlas Network. In USENIX …, 2014
TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network
Z Liu, Y Liu, P Winter, P Mittal, YC Hu
2017 IEEE 25th International Conference on Network Protocols (ICNP), 1-10, 2017
Flow-based Brute-force Attack Detection
M Drašar, J Vykopal, P Winter
Fraunhofer Verlag, 2013
An on-line learning statistical model to detect malicious web requests
H Lampesberger, P Winter, M Zeilinger, E Hermann
International Conference on Security and Privacy in Communication Systems …, 2011
The impact of user location on cookie notices (inside and outside of the European union)
R Eijk, H Asghari, P Winter, A Narayanan
Workshop on Technology and Consumer Protection (ConPro'19), 2019
The Great Firewall of China: How it blocks Tor and why it is hard to pinpoint
P Winter, JR Crandall
Login: The Usenix Magazine 37 (6), 42-50, 2012
Geo-locating BGP prefixes
P Winter, R Padmanabhan, A King, A Dainotti
2019 Network Traffic Measurement and Analysis Conference (TMA), 9-16, 2019
The system can't perform the operation now. Try again later.
Articles 1–20