Login / Signup
Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking.
Xinyuan Wang
Douglas S. Reeves
Published in:
IEEE Trans. Dependable Secur. Comput. (2011)
Keyphrases
</>
stepping stones
image watermarking
traffic analysis
digital images
watermarking technique
alert correlation
geometric attacks
watermarking scheme
watermarking method