A systematic review on spectator behavior in esports: why do people watch?

J Rietz, K Hallmann - International journal of sports marketing and …, 2022 - emerald.com
Purpose Esports is rapidly growing in popularity and viewership. The study's purpose was
threefold:(1) to provide a systematic review and synthesis of esports spectatorship …

Decentralizing privacy: Using blockchain to protect personal data

G Zyskind, O Nathan - 2015 IEEE security and privacy …, 2015 - ieeexplore.ieee.org
The recent increase in reported incidents of surveillance and security breaches
compromising users' privacy call into question the current model, in which third-parties …

Behavior-based tracking: Exploiting characteristic patterns in DNS traffic

D Herrmann, C Banse, H Federrath - Computers & Security, 2013 - Elsevier
We review and evaluate three techniques that allow a passive adversary to track users who
have dynamic IP addresses based on characteristic behavioral patterns, ie, without cookies …

Traffic fingerprinting attacks on internet of things using machine learning

M Skowron, A Janicki, W Mazurczyk - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) concept has been widely adopted and Internet connected
devices enter more and more areas of our everyday lives. However, their limited security …

Replication: Why we still can't browse in peace: On the uniqueness and reidentifiability of web browsing histories

S Bird, I Segall, M Lopatka - … Symposium on Usable Privacy and Security …, 2020 - usenix.org
We examine the threat to individuals' privacy based on the feasibility of reidentifying users
through distinctive profiles of their browsing history visible to websites and third parties. This …

Tracked without a trace: linking sessions of users by unsupervised learning of patterns in their DNS traffic

M Kirchler, D Herrmann, J Lindemann… - Proceedings of the 2016 …, 2016 - dl.acm.org
Behavior-based tracking is an unobtrusive technique that allows observers to monitor user
activities on the Internet over long periods of time--in spite of changing IP addresses …

Observing consistency in online communication patterns for user re-identification

IR Adeyemi, SA Razak, M Salleh, HS Venter - PloS one, 2016 - journals.plos.org
Comprehension of the statistical and structural mechanisms governing human dynamics in
online interaction plays a pivotal role in online user identification, online profile …

Rethinking the proposition of privacy engineering

A Ceross, A Simpson - Proceedings of the New Security Paradigms …, 2018 - dl.acm.org
The field of privacy engineering proposes a methodological framework for designing privacy-
protecting information systems. Recognising that the utilisation of privacy-enhancing …

Domain name system security and privacy: old problems and new challenges

AR Kang, J Spaulding, A Mohaisen - arxiv preprint arxiv:1606.07080, 2016 - arxiv.org
The domain name system (DNS) is an important protocol in today's Internet operation, and is
the standard naming convention between domain names, names that are easy to read …

Never Query Alone: A distributed strategy to protect Internet users from DNS fingerprinting attacks

O Arana, H Benítez-Pérez, J Gomez… - Computer Networks, 2021 - Elsevier
Abstract The Domain Name System (DNS) plays an essential role in everyday Internet
activities. However, unauthorized access to DNS-generated traffic also poses some serious …