Login / Signup

Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking.

Xinyuan WangDouglas S. Reeves
Published in: IEEE Trans. Dependable Secur. Comput. (2011)
Keyphrases
  • stepping stones
  • image watermarking
  • traffic analysis
  • digital images
  • watermarking technique
  • alert correlation
  • geometric attacks
  • watermarking scheme
  • watermarking method