Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays (2003)

by X Wang, D S Reeves
Venue:in Proceedings of the 2003 ACM Conference on Computer and Communications Security (CCS