Abusing Glype proxies: attacks, exploits and defences

Aditya K. Sood, Peter Greko, Richard J. Enbody. Abusing Glype proxies: attacks, exploits and defences. Network Security, 2012(12):8-15, 2012. [doi]

References

No references recorded for this publication.

Cited by

No citations of this publication recorded.