Abusing Glype proxies: attacks, exploits and defences

Aditya K. Sood, Peter Greko, Richard J. Enbody. Abusing Glype proxies: attacks, exploits and defences. Network Security, 2012(12):8-15, 2012. [doi]

Authors

Aditya K. Sood

This author has not been identified. Look up 'Aditya K. Sood' in Google

Peter Greko

This author has not been identified. Look up 'Peter Greko' in Google

Richard J. Enbody

This author has not been identified. Look up 'Richard J. Enbody' in Google