Login / Signup
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays.
Xinyuan Wang
Douglas S. Reeves
Published in:
CCS (2003)
Keyphrases
</>
stepping stones
normal traffic
network traffic
traffic management
alert correlation