Login / Signup
Designing a cluster-based covert channel to evade disk investigation and forensics.
Hassan Khan
Mobin Javed
Syed Ali Khayam
Fauzan Mirza
Published in:
Comput. Secur. (2011)
Keyphrases
</>
covert channel
digital forensics
computer forensics
security requirements
main memory
network traffic
databases
information systems
data structure
software engineering
law enforcement