A game-theoretic analysis to defend against remote operating system fingerprinting - doi 10.1016/j.jisa.2020.102456 2020-06 Article type Journal