Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays (2003)

by X Wang, D S Reeves
Venue:in: CCS ’03: Proceedings of the 10th ACM conference on Computer and communications security, ACM