Article,

A game-theoretic analysis to defend against remote operating system fingerprinting.

, , , and .
J. Inf. Secur. Appl., (2020)

Meta data

Tags

Users

  • @dblp

Comments and Reviews