Exploiting IP telephony with silence suppression for hidden data transfers.
Sabine S. SchmidtWojciech MazurczykRadoslaw KuleszaJörg KellerLuca CaviglionePublished in: Comput. Secur. (2018)
Keyphrases
- data sets
- database
- data analysis
- raw data
- training data
- data collection
- data processing
- complex data
- knowledge discovery
- end users
- probability distribution
- data points
- data structure
- high quality
- experimental data
- machine learning
- original data
- data objects
- data sources
- image data
- website
- missing data
- network structure
- neural network