Login / Signup
Towards provably invisible network flow fingerprints.
Ramin Soltani
Dennis Goeckel
Don Towsley
Amir Houmansadr
Published in:
ACSSC (2017)
Keyphrases
</>
network flow
linear programming
minimum cost
capacity constraints
integer programming
traffic control
network flow problem
optimization model
min cost
set cover
fingerprint verification
integer program
bipartite graph
fingerprint matching
fingerprint images
scheduling problem
multi objective
genetic algorithm