A game-theoretic analysis to defend against remote operating system fingerprinting

A game-theoretic analysis to defend against remote operating system fingerprinting
-

Date : 1399-03
Article type
Journal