A game-theoretic analysis to defend against remote operating system fingerprinting

A game-theoretic analysis to defend against remote operating system fingerprinting
-

Article type
Journal
https://people.iut.ac.ir/en/manshaei/content/1607359