Login / Signup

A game-theoretic analysis to defend against remote operating system fingerprinting.

Mohammad Ashiqur RahmanMd. Golam Moula Mehedi HasanMohammad Hossein ManshaeiEhab Al-Shaer
Published in: J. Inf. Secur. Appl. (2020)
Keyphrases