[1]
M. . Shehab and L. R. Alzabin, “Evaluating the Effectiveness of Stealth Protocols and Proxying in Hiding VPN Usage”, JCCE, vol. 4, no. 2, pp. 186–194, May 2025, doi: 10.47852/bonviewJCCE42023642.