Login / Signup

A deception based approach for defeating OS and service fingerprinting.

Massimiliano AlbaneseErmanno BattistaSushil Jajodia
Published in: CNS (2015)
Keyphrases