Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays”, (2003)

by X Wang, D S Reeves
Venue:In ACM Conference on Computer and Communications Security