Toward Exposing Timing-Based Probing Attacks in Web Applications. Mao, J., Chen, Y., Shi, F., Jia, Y., & Liang, Z. In Yang, Q., Yu, W., & Challal, Y., editors, WASA, volume 9798, of Lecture Notes in Computer Science, pages 499-510, 2016. Springer. Link Paper bibtex @inproceedings{conf/wasa/MaoCSJL16,
added-at = {2016-08-04T00:00:00.000+0200},
author = {Mao, Jian and Chen, Yue and Shi, Futian and Jia, Yaoqi and Liang, Zhenkai},
biburl = {https://www.bibsonomy.org/bibtex/25493dbbbae715fdb29c3dbfb6a57c899/dblp},
booktitle = {WASA},
crossref = {conf/wasa/2016},
editor = {Yang, Qing and Yu, Wei and Challal, Yacine},
ee = {http://dx.doi.org/10.1007/978-3-319-42836-9_44},
interhash = {894fb04ed6d4d3cc457d2760da16ad20},
intrahash = {5493dbbbae715fdb29c3dbfb6a57c899},
isbn = {978-3-319-42835-2},
keywords = {dblp},
pages = {499-510},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2016-08-05T11:39:00.000+0200},
title = {Toward Exposing Timing-Based Probing Attacks in Web Applications.},
url = {http://dblp.uni-trier.de/db/conf/wasa/wasa2016.html#MaoCSJL16},
volume = 9798,
year = 2016
}
Downloads: 0
{"_id":"Gw7NjXQ3XmwoTgTZf","bibbaseid":"mao-chen-shi-jia-liang-towardexposingtimingbasedprobingattacksinwebapplications-2016","downloads":0,"creationDate":"2018-08-25T18:21:09.940Z","title":"Toward Exposing Timing-Based Probing Attacks in Web Applications.","author_short":["Mao, J.","Chen, Y.","Shi, F.","Jia, Y.","Liang, Z."],"year":2016,"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/yue chen?items=1000","bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2016-08-04T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Mao"],"firstnames":["Jian"],"suffixes":[]},{"propositions":[],"lastnames":["Chen"],"firstnames":["Yue"],"suffixes":[]},{"propositions":[],"lastnames":["Shi"],"firstnames":["Futian"],"suffixes":[]},{"propositions":[],"lastnames":["Jia"],"firstnames":["Yaoqi"],"suffixes":[]},{"propositions":[],"lastnames":["Liang"],"firstnames":["Zhenkai"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/25493dbbbae715fdb29c3dbfb6a57c899/dblp","booktitle":"WASA","crossref":"conf/wasa/2016","editor":[{"propositions":[],"lastnames":["Yang"],"firstnames":["Qing"],"suffixes":[]},{"propositions":[],"lastnames":["Yu"],"firstnames":["Wei"],"suffixes":[]},{"propositions":[],"lastnames":["Challal"],"firstnames":["Yacine"],"suffixes":[]}],"ee":"http://dx.doi.org/10.1007/978-3-319-42836-9_44","interhash":"894fb04ed6d4d3cc457d2760da16ad20","intrahash":"5493dbbbae715fdb29c3dbfb6a57c899","isbn":"978-3-319-42835-2","keywords":"dblp","pages":"499-510","publisher":"Springer","series":"Lecture Notes in Computer Science","timestamp":"2016-08-05T11:39:00.000+0200","title":"Toward Exposing Timing-Based Probing Attacks in Web Applications.","url":"http://dblp.uni-trier.de/db/conf/wasa/wasa2016.html#MaoCSJL16","volume":"9798","year":"2016","bibtex":"@inproceedings{conf/wasa/MaoCSJL16,\n added-at = {2016-08-04T00:00:00.000+0200},\n author = {Mao, Jian and Chen, Yue and Shi, Futian and Jia, Yaoqi and Liang, Zhenkai},\n biburl = {https://www.bibsonomy.org/bibtex/25493dbbbae715fdb29c3dbfb6a57c899/dblp},\n booktitle = {WASA},\n crossref = {conf/wasa/2016},\n editor = {Yang, Qing and Yu, Wei and Challal, Yacine},\n ee = {http://dx.doi.org/10.1007/978-3-319-42836-9_44},\n interhash = {894fb04ed6d4d3cc457d2760da16ad20},\n intrahash = {5493dbbbae715fdb29c3dbfb6a57c899},\n isbn = {978-3-319-42835-2},\n keywords = {dblp},\n pages = {499-510},\n publisher = {Springer},\n series = {Lecture Notes in Computer Science},\n timestamp = {2016-08-05T11:39:00.000+0200},\n title = {Toward Exposing Timing-Based Probing Attacks in Web Applications.},\n url = {http://dblp.uni-trier.de/db/conf/wasa/wasa2016.html#MaoCSJL16},\n volume = 9798,\n year = 2016\n}\n\n","author_short":["Mao, J.","Chen, Y.","Shi, F.","Jia, Y.","Liang, Z."],"editor_short":["Yang, Q.","Yu, W.","Challal, Y."],"key":"conf/wasa/MaoCSJL16","id":"conf/wasa/MaoCSJL16","bibbaseid":"mao-chen-shi-jia-liang-towardexposingtimingbasedprobingattacksinwebapplications-2016","role":"author","urls":{"Link":"http://dx.doi.org/10.1007/978-3-319-42836-9_44","Paper":"http://dblp.uni-trier.de/db/conf/wasa/wasa2016.html#MaoCSJL16"},"keyword":["dblp"],"downloads":0},"search_terms":["toward","exposing","timing","based","probing","attacks","web","applications","mao","chen","shi","jia","liang"],"keywords":["dblp"],"authorIDs":[],"dataSources":["XZHajSY3FQzRht7Pv"]}