Author:
Fang Peng,Huang Liusheng,Xu Hongli,He Qijian
Publisher
Springer International Publishing
Reference21 articles.
1. Al-Shehari, T., Shahzad, F.: Improving operating system fingerprinting using machine learning techniques. Int. J. Comput. Theory Eng. 6(1), 57 (2014)
2. Lecture Notes in Computer Science;R Beverly,2004
3. Bruce, S.: Applied Cryptography, 2nd edn. Wiley, Hoboken (1996)
4. Chen, Y.C., Liao, Y., Baldi, M., Lee, S.J., Qiu, L.: OS fingerprinting and tethering detection in mobile networks. In: Proceedings of the 2014 Conference on Internet Measurement Conference, pp. 173–180. ACM (2014)
5. Gayle, D.: This is a secure line: the groundbreaking encryption app that will scrample your calls and messages (2013)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献