000856334 001__ 856334 000856334 005__ 20251014090627.0 000856334 0247_ $$2datacite_doi$$a10.18154/RWTH-2022-10811 000856334 037__ $$aRWTH-2022-10811 000856334 041__ $$aEnglish 000856334 1001_ $$0P:(DE-82)IDM03205$$aPennekamp, Jan$$b0$$urwth 000856334 1112_ $$a38. Annual Computer Security Applications Conference$$cAustin, TX$$d2022-12-05 - 2022-12-09$$gACSAC ’22$$wUSA 000856334 245__ $$aCUMUL & Co: High-Impact Artifacts for Website Fingerprinting Research$$honline 000856334 260__ $$c2022 000856334 300__ $$a1-6 000856334 3367_ $$033$$2EndNote$$aConference Paper 000856334 3367_ $$0PUB:(DE-HGF)6$$2PUB:(DE-HGF)$$aConference Presentation$$bconf$$mconf 000856334 3367_ $$2BibTeX$$aINPROCEEDINGS 000856334 3367_ $$2DRIVER$$aconferenceObject 000856334 3367_ $$2DataCite$$aOther 000856334 3367_ $$2ORCID$$aLECTURE_SPEECH 000856334 500__ $$aVeröffentlicht auf dem Publikationsserver der RWTH Aachen University 000856334 591__ $$aGermany 000856334 7001_ $$0P:(DE-82)IDM00507$$aHenze, Martin$$b1$$urwth 000856334 7001_ $$aZinnen, Andreas$$b2 000856334 7001_ $$aLanze, Fabian$$b3$$eCorresponding author 000856334 7001_ $$0P:(DE-82)IDM00064$$aWehrle, Klaus$$b4$$eCorresponding author$$urwth 000856334 7001_ $$aPanchenko, Andriy$$b5$$eCorresponding author 000856334 8564_ $$uhttps://www.acsac.org/2022/program/artifacts_competition/$$yConference program 000856334 8564_ $$uhttps://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-pennekamp-cumul-artifacts.pdf$$yFulltext 000856334 8564_ $$uhttps://publications.rwth-aachen.de/record/856334/files/856334.pdf$$yOpenAccess 000856334 8564_ $$uhttps://publications.rwth-aachen.de/record/856334/files/856334_AV.pdf$$yRestricted 000856334 909CO $$ooai:publications.rwth-aachen.de:856334$$popenaire$$popen_access$$pVDB$$pdriver$$qdnbdelivery 000856334 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM03205$$aRWTH Aachen$$b0$$kRWTH 000856334 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM00507$$aRWTH Aachen$$b1$$kRWTH 000856334 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM00064$$aRWTH Aachen$$b4$$kRWTH 000856334 9141_ $$y2022 000856334 9151_ $$0StatID:(DE-HGF)0031$$2StatID$$aPeer reviewed article$$x0 000856334 915__ $$0StatID:(DE-HGF)0510$$2StatID$$aOpenAccess 000856334 9201_ $$0I:(DE-82)121710_20140620$$k121710$$lLehrstuhl für Informatik 4 (Kommunikation und verteilte Systeme)$$x0 000856334 9201_ $$0I:(DE-82)125430_20211001$$k125430$$lJuniorprofessur für Sicherheit und Datenschutz in industrieller Kooperation$$x1 000856334 9201_ $$0I:(DE-82)120000_20140620$$k120000$$lFachgruppe Informatik$$x2 000856334 961__ $$c2022-11-29T12:55:08.528042$$x2022-11-29T12:55:08.528042$$z2022-12-02 000856334 9801_ $$aFullTexts 000856334 980__ $$aI:(DE-82)120000_20140620 000856334 980__ $$aI:(DE-82)121710_20140620 000856334 980__ $$aI:(DE-82)125430_20211001 000856334 980__ $$aUNRESTRICTED 000856334 980__ $$aVDB 000856334 980__ $$aconf