1. Detecting stepping-stones;Zhang,2000
2. Holding intruders accountable on the internet;Staniford-Chen,1995
3. Finding connection chain for tracing intruders;Yoda,2000
4. Detection of interactive stepping-stones: algorithms and confidence bounds;Blum,2004
5. Detecting encrypted stepping-stone connections;He;Proc. IEEE Trans. Signal Process.,2007