Login / Signup

Forensic Trace Analysis for MP3 based Stego-Malware: Exemplary Study for Stego-Algorithm and Capacity Attribution to derive YARA Rules for Malware Identification.

Jana DittmannChristian KraetzerJost AlemannBernhard Birnbaum
Published in: IH&MMSec (2024)
Keyphrases