Title of article :
Understanding when location-hiding using overlay networks is feasible
Author/Authors :
Ju Wang، نويسنده , , Andrew A. Chien، نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 2006
Pages :
18
From page :
763
To page :
780
Keywords :
overlay network , Proxy network , Security , Penetration attack , Correlated vulnerabilities , Location-hiding
Journal title :
Computer Networks
Serial Year :
2006
Journal title :
Computer Networks
Record number :
299677
Link To Document :
https://search.isc.ac/dl/search/defaultta.aspx?DTC=10&DC=299677