Login / Signup

Abusing Glype proxies: attacks, exploits and defences.

Aditya K. SoodPeter GrekoRichard J. Enbody
Published in: Netw. Secur. (2012)
Keyphrases
  • countermeasures
  • security threats
  • denial of service attacks
  • attack detection
  • digital image watermarking
  • malicious attacks
  • terrorist attacks
  • detect malicious
  • website
  • cooperative
  • security protocols
  • security risks