Understanding and preventing network device fingerprinting.
Lloyd G. GreenwaldTavaris J. ThomasPublished in: Bell Labs Tech. J. (2007)
Keyphrases
- heterogeneous networks
- wireless sensor networks
- peer to peer
- computer networks
- network topologies
- network structure
- complex networks
- network traffic
- remote server
- artificial intelligence
- deeper understanding
- network management
- communication cost
- communication networks
- bayesian networks
- case study
- web services
- social networks