Abusing Glype proxies: attacks, exploits and defences

Aditya K. Sood, Peter Greko, Richard J. Enbody. Abusing Glype proxies: attacks, exploits and defences. Network Security, 2012(12):8-15, 2012. [doi]

@article{SoodGE12,
  title = {Abusing Glype proxies: attacks, exploits and defences},
  author = {Aditya K. Sood and Peter Greko and Richard J. Enbody},
  year = {2012},
  doi = {10.1016/S1353-4858(12)70112-5},
  url = {http://dx.doi.org/10.1016/S1353-4858(12)70112-5},
  researchr = {https://researchr.org/publication/SoodGE12},
  cites = {0},
  citedby = {0},
  journal = {Network Security},
  volume = {2012},
  number = {12},
  pages = {8-15},
}