Login / Signup
A game-theoretic analysis to defend against remote operating system fingerprinting.
Mohammad Ashiqur Rahman
Md. Golam Moula Mehedi Hasan
Mohammad Hossein Manshaei
Ehab Al-Shaer
Published in:
J. Inf. Secur. Appl. (2020)
Keyphrases
</>
operating system
theoretic analysis
computer systems
virtual machine
memory management
microsoft windows
real time
distributed systems
windows xp
application level
multi tasking
address space
operating environment
multi threaded
database design
linux kernel
e learning
information systems