Title of article
Understanding when location-hiding using overlay networks is feasible
Author/Authors
Ju Wang، نويسنده , , Andrew A. Chien، نويسنده ,
Issue Information
روزنامه با شماره پیاپی سال 2006
Pages
18
From page
763
To page
780
Keywords
overlay network , Proxy network , Security , Penetration attack , Correlated vulnerabilities , Location-hiding
Journal title
Computer Networks
Serial Year
2006
Journal title
Computer Networks
Record number
299677
Link To Document