S Fujii, T Sato, S Aoki, Y Tsuda, N Kawaguchi… - IEEE …, 2023 - ieeexplore.ieee.org
Malicious hosts have come to play a significant and varied role in today's cyber attacks.
Some of these hosts are equipped with a technique called cloaking, which discriminates …