6 | | -WiMAX DDoS analysis with analysis of variance finding vulnerable control parameter settings; |
7 | | -Privacy/Anonymity side-channel Hidden Markov Models (HMMs) will be inferred to break anonymity systems; |
8 | | -DDoS traffic measurement to map attack severity vs. network topology; |
9 | | -Side-channel vulnerability removal protocol tested at scale; and |
| 6 | -WiMAX DDoS analysis with analysis of variance finding vulnerable control parameter settings;[[BR]] |
| 7 | -Privacy/Anonymity side-channel Hidden Markov Models (HMMs) will be inferred to break anonymity systems;[[BR]] |
| 8 | -DDoS traffic measurement to map attack severity vs. network topology;[[BR]] |
| 9 | -Side-channel vulnerability removal protocol tested at scale; and [[BR]] |