A deception based approach for defeating OS and service fingerprinting | IEEE Conference Publication | IEEE Xplore