Zhangguo Tang

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
In order to monitor the use of network transmission software, the network penetrating technique based on encrypted proxy is discussed. By comparing the behavior of related penetration software, the concept of communication fingerprint is introduced to expand the extension of the communication features. The fingerprints database of encrypted proxy software(More)
  • 1