Login / Signup
Covert Channels-Based Stealth Attacks in Industry 4.0.
Cristina Alcaraz
Giuseppe Bernieri
Federica Pascucci
Javier López
Roberto Setola
Published in:
IEEE Syst. J. (2019)
Keyphrases
</>
countermeasures
case study
information flow
watermarking scheme
malicious users
search engine
signal processing
data mining
image watermarking
chosen plaintext
malicious attacks
security risks
traffic analysis
leading edge
java card
computer security
world wide