A novel method for securing critical infrastructures by detecting hidden flows of data.

Francesco BenedettoGaetano GiuntaAngelo LiguoriArno Wacker
Published in: CNS (2015)