A game-theoretic analysis to defend against remote operating system fingerprinting

A game-theoretic analysis to defend against remote operating system fingerprinting
-

Article type
Journal