[1]
M. . Shehab and L. R. Alzabin, “Evaluating the Effectiveness of Stealth Protocols and Proxying in Hiding VPN Usage”, JCCE, vol. 4, no. 2, pp. 186–194, Sep. 2024, doi: 10.47852/bonviewJCCE42023642.