Capturing and Obscuring Ping-Pong Patterns to Mitigate Continuous Attacks | IEEE Conference Publication | IEEE Xplore