2Chen S, Heberlein L. Holding intruders accountable on the internet [C] //Proc of the IEEE Syrup on Security and Privacy (S&P). Piscataway, NJ: IEEE, 1995:39-49. 被引量:1
3Yoda K, Etoh H. Finding a connection chain for tracing intruders [C] //Proc of the 6th European Syrup on Research in Computer Security (ESORICS), Berlin: Springer, 2000: 191-205. 被引量:1
4Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms [J]. Communications of the ACM, 1981, 24(2) : 84-88. 被引量:1
5Dingledine R, Mathewson N, Syverson P. Tor: The second- generation onion router [OL]. E2010-04-123. https://svn. torproject.org/svn[projects/design-paper/tor-design, html. 被引量:1
6Wang X, Reeves D, Wu S. Inter-packet delay based correlation for tracing encrypted connections through stepping stones [C] //Proc of the 8th European Symp on Research in Computer Security ( ESORICS ). Berlin: Springer, 2002: 244-263. 被引量:1
7Wang X, Reeves D. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays [C]//Proc of the 10th ACM Conf on Computer and Communications Security (CCS). New York: ACM, 2003: 20-29. 被引量:1
8Wang X, Reeves D, Ning P, et al. Robust network-based attack attribution through probabilistic watermarking of packet flows[R]. Raleigh, NC: Department of Computer Science, North Carolina State University, 2005. 被引量:1
9Wang X, Chen S, Jajodia S. Tracking anonymous peer-to- peer VoIP calls on the internet [C]//Proc of the 12th ACM Conf on Computer and Communications Security (CCS). New York, ACM, 2005:81-91. 被引量:1
10Houmansadr A, Kiyavash N, Borisov N. Rainbow: A robust and invisible non-blind watermark for network flows [OL]. [2010-04-12]. https://www.isoe.org/isoc/conferenees/ndss/09/pdf/13. pdf. 被引量:1