@dblp

A game-theoretic approach for deceiving Remote Operating System Fingerprinting.

, , and . CNS, page 73-81. IEEE, (2013)

Links and resources

Tags