Author:
Gurary Jonathan,Zhu Ye,Bettati Riccardo,Guan Yong
Reference43 articles.
1. Anagnostakis, K.G., Greenwald, M., Ryger, R.S.: Cing: measuring network-internal delays using only existing infrastructure. In: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol. 3, pp. 2112–2121. IEEE (2003)
2. Arackaparambil, C., Bratus, S., Shubina, A., Kotz, D.: On the reliability of wireless fingerprinting using clock skews. In: Proceedings of the Third ACM Conference on Wireless Network Security, pp. 169–174. ACM (2010)
3. Arkin, O.: Icmp usage in scanning. Black Hat Briefings (2000)
4. Armitage, G.J.: Inferring the extent of network address port translation at public/private internet boundaries. In: Centre for Advanced Internet Architectures, Swinburne University of Technology, Melbourne, Australia, Tech. Rep. A 20712 (2002)
5. Auffret, P.: Sinfp, unification of active and passive operating system fingerprinting. J. Comput. Virol. 6(3), 197–205 (2010)