A combinatorial approach to network covert communications with applications in Web Leaks.
Xiapu LuoPeng ZhouEdmond W. W. ChanRocky K. C. ChangWenke LeePublished in: DSN (2011)
Keyphrases
- information flow
- communication networks
- website
- web applications
- peer to peer
- network architecture
- complex networks
- network management
- communication systems
- computer networks
- web pages
- network configuration
- distributed network
- network model
- network traffic
- network structure
- web mining
- wireless sensor networks
- neural network
- web documents
- communication patterns
- key players
- communication medium
- web content
- link analysis
- information sources
- citation networks
- digital libraries
- massive scale