Login / Signup
Covert communications through network configuration messages.
Ruben Rios
Jose Antonio Onieva
Javier López
Published in:
Comput. Secur. (2013)
Keyphrases
</>
network configuration
neural network
email
quality of service
attack graph
message delivery
decision making
probabilistic model
real time
information systems
web services
dynamic programming
communication channels