![]() |
Volumn , Issue , 2013, Pages 73-81
|
A game-theoretic approach for deceiving remote operating system fingerprinting
|
Author keywords
[No Author keywords available]
|
Indexed keywords
NETWORK SECURITY;
DYNAMIC MECHANISM;
INFORMATION GAIN;
NASH EQUILIBRIUM STRATEGIES;
OPERATING SYSTEM FINGERPRINTING;
PERFORMANCE ANALYSIS;
PERFORMANCE DEGRADATION;
POTENTIAL ATTACK;
PROBABILITY OF SUCCESS;
GAME THEORY;
|
EID: 84893599604
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/CNS.2013.6682694 Document Type: Conference Paper |
Times cited : (31)
|
References (19)
|