A game-theoretic analysis to defend against remote operating system fingerprinting - doi 10.1016/j.jisa.2020.102456 Date : 1399-03 Article type Journal