Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays (0)

by X Wang, D S Reeves
Venue:in CCS ’03: Proceedings of the 10th ACM conference on Computer and communications security