Abusing Glype proxies: attacks, exploits and defences

Aditya K. Sood, Peter Greko, Richard J. Enbody. Abusing Glype proxies: attacks, exploits and defences. Network Security, 2012(12):8-15, 2012. [doi]

Abstract

Abstract is missing.