h1

h2

h3

h4

h5
h6
000856334 001__ 856334
000856334 005__ 20251014090627.0
000856334 0247_ $$2datacite_doi$$a10.18154/RWTH-2022-10811
000856334 037__ $$aRWTH-2022-10811
000856334 041__ $$aEnglish
000856334 1001_ $$0P:(DE-82)IDM03205$$aPennekamp, Jan$$b0$$urwth
000856334 1112_ $$a38. Annual Computer Security Applications Conference$$cAustin, TX$$d2022-12-05 - 2022-12-09$$gACSAC ’22$$wUSA
000856334 245__ $$aCUMUL & Co: High-Impact Artifacts for Website Fingerprinting Research$$honline
000856334 260__ $$c2022
000856334 300__ $$a1-6
000856334 3367_ $$033$$2EndNote$$aConference Paper
000856334 3367_ $$0PUB:(DE-HGF)6$$2PUB:(DE-HGF)$$aConference Presentation$$bconf$$mconf
000856334 3367_ $$2BibTeX$$aINPROCEEDINGS
000856334 3367_ $$2DRIVER$$aconferenceObject
000856334 3367_ $$2DataCite$$aOther
000856334 3367_ $$2ORCID$$aLECTURE_SPEECH
000856334 500__ $$aVeröffentlicht auf dem Publikationsserver der RWTH Aachen University
000856334 591__ $$aGermany
000856334 7001_ $$0P:(DE-82)IDM00507$$aHenze, Martin$$b1$$urwth
000856334 7001_ $$aZinnen, Andreas$$b2
000856334 7001_ $$aLanze, Fabian$$b3$$eCorresponding author
000856334 7001_ $$0P:(DE-82)IDM00064$$aWehrle, Klaus$$b4$$eCorresponding author$$urwth
000856334 7001_ $$aPanchenko, Andriy$$b5$$eCorresponding author
000856334 8564_ $$uhttps://www.acsac.org/2022/program/artifacts_competition/$$yConference program
000856334 8564_ $$uhttps://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-pennekamp-cumul-artifacts.pdf$$yFulltext
000856334 8564_ $$uhttps://publications.rwth-aachen.de/record/856334/files/856334.pdf$$yOpenAccess
000856334 8564_ $$uhttps://publications.rwth-aachen.de/record/856334/files/856334_AV.pdf$$yRestricted
000856334 909CO $$ooai:publications.rwth-aachen.de:856334$$popenaire$$popen_access$$pVDB$$pdriver$$qdnbdelivery
000856334 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM03205$$aRWTH Aachen$$b0$$kRWTH
000856334 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM00507$$aRWTH Aachen$$b1$$kRWTH
000856334 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM00064$$aRWTH Aachen$$b4$$kRWTH
000856334 9141_ $$y2022
000856334 9151_ $$0StatID:(DE-HGF)0031$$2StatID$$aPeer reviewed article$$x0
000856334 915__ $$0StatID:(DE-HGF)0510$$2StatID$$aOpenAccess
000856334 9201_ $$0I:(DE-82)121710_20140620$$k121710$$lLehrstuhl für Informatik 4 (Kommunikation und verteilte Systeme)$$x0
000856334 9201_ $$0I:(DE-82)125430_20211001$$k125430$$lJuniorprofessur für Sicherheit und Datenschutz in industrieller Kooperation$$x1
000856334 9201_ $$0I:(DE-82)120000_20140620$$k120000$$lFachgruppe Informatik$$x2
000856334 961__ $$c2022-11-29T12:55:08.528042$$x2022-11-29T12:55:08.528042$$z2022-12-02
000856334 9801_ $$aFullTexts
000856334 980__ $$aI:(DE-82)120000_20140620
000856334 980__ $$aI:(DE-82)121710_20140620
000856334 980__ $$aI:(DE-82)125430_20211001
000856334 980__ $$aUNRESTRICTED
000856334 980__ $$aVDB
000856334 980__ $$aconf