Return to Article Details Comparison overview of an active fingerprinting application of the second and the third layer of TCP/IP stack Download Download PDF