| 001 | 856334 | ||
| 005 | 20251014090627.0 | ||
| 024 | 7 | _ | |2 datacite_doi |a 10.18154/RWTH-2022-10811 |
| 037 | _ | _ | |a RWTH-2022-10811 |
| 041 | _ | _ | |a English |
| 100 | 1 | _ | |0 P:(DE-82)IDM03205 |a Pennekamp, Jan |b 0 |u rwth |
| 111 | 2 | _ | |a 38. Annual Computer Security Applications Conference |c Austin, TX |d 2022-12-05 - 2022-12-09 |g ACSAC ’22 |w USA |
| 245 | _ | _ | |a CUMUL & Co: High-Impact Artifacts for Website Fingerprinting Research |h online |
| 260 | _ | _ | |c 2022 |
| 300 | _ | _ | |a 1-6 |
| 336 | 7 | _ | |0 33 |2 EndNote |a Conference Paper |
| 336 | 7 | _ | |0 PUB:(DE-HGF)6 |2 PUB:(DE-HGF) |a Conference Presentation |b conf |m conf |
| 336 | 7 | _ | |2 BibTeX |a INPROCEEDINGS |
| 336 | 7 | _ | |2 DRIVER |a conferenceObject |
| 336 | 7 | _ | |2 DataCite |a Other |
| 336 | 7 | _ | |2 ORCID |a LECTURE_SPEECH |
| 500 | _ | _ | |a Veröffentlicht auf dem Publikationsserver der RWTH Aachen University |
| 591 | _ | _ | |a Germany |
| 700 | 1 | _ | |0 P:(DE-82)IDM00507 |a Henze, Martin |b 1 |u rwth |
| 700 | 1 | _ | |a Zinnen, Andreas |b 2 |
| 700 | 1 | _ | |a Lanze, Fabian |b 3 |e Corresponding author |
| 700 | 1 | _ | |0 P:(DE-82)IDM00064 |a Wehrle, Klaus |b 4 |e Corresponding author |u rwth |
| 700 | 1 | _ | |a Panchenko, Andriy |b 5 |e Corresponding author |
| 856 | 4 | _ | |u https://www.acsac.org/2022/program/artifacts_competition/ |y Conference program |
| 856 | 4 | _ | |u https://www.comsys.rwth-aachen.de/fileadmin/papers/2022/2022-pennekamp-cumul-artifacts.pdf |y Fulltext |
| 856 | 4 | _ | |u https://publications.rwth-aachen.de/record/856334/files/856334.pdf |y OpenAccess |
| 856 | 4 | _ | |u https://publications.rwth-aachen.de/record/856334/files/856334_AV.pdf |y Restricted |
| 909 | C | O | |o oai:publications.rwth-aachen.de:856334 |p driver |p VDB |p open_access |p openaire |q dnbdelivery |
| 910 | 1 | _ | |0 I:(DE-588b)36225-6 |6 P:(DE-82)IDM03205 |a RWTH Aachen |b 0 |k RWTH |
| 910 | 1 | _ | |0 I:(DE-588b)36225-6 |6 P:(DE-82)IDM00507 |a RWTH Aachen |b 1 |k RWTH |
| 910 | 1 | _ | |0 I:(DE-588b)36225-6 |6 P:(DE-82)IDM00064 |a RWTH Aachen |b 4 |k RWTH |
| 914 | 1 | _ | |y 2022 |
| 915 | 1 | _ | |0 StatID:(DE-HGF)0031 |2 StatID |a Peer reviewed article |x 0 |
| 915 | _ | _ | |0 StatID:(DE-HGF)0510 |2 StatID |a OpenAccess |
| 920 | 1 | _ | |0 I:(DE-82)121710_20140620 |k 121710 |l Lehrstuhl für Informatik 4 (Kommunikation und verteilte Systeme) |x 0 |
| 920 | 1 | _ | |0 I:(DE-82)125430_20211001 |k 125430 |l Juniorprofessur für Sicherheit und Datenschutz in industrieller Kooperation |x 1 |
| 920 | 1 | _ | |0 I:(DE-82)120000_20140620 |k 120000 |l Fachgruppe Informatik |x 2 |
| 980 | 1 | _ | |a FullTexts |
| 980 | _ | _ | |a I:(DE-82)120000_20140620 |
| 980 | _ | _ | |a I:(DE-82)121710_20140620 |
| 980 | _ | _ | |a I:(DE-82)125430_20211001 |
| 980 | _ | _ | |a UNRESTRICTED |
| 980 | _ | _ | |a VDB |
| 980 | _ | _ | |a conf |
| Library | Collection | CLSMajor | CLSMinor | Language | Author |
|---|