Login / Signup

Designing a cluster-based covert channel to evade disk investigation and forensics.

Hassan KhanMobin JavedSyed Ali KhayamFauzan Mirza
Published in: Comput. Secur. (2011)
Keyphrases
  • covert channel
  • digital forensics
  • computer forensics
  • security requirements
  • main memory
  • network traffic
  • databases
  • information systems
  • data structure
  • software engineering
  • law enforcement