Login / Signup

Steganography for Executables and Code Transformation Signatures.

Bertrand AnckaertBjorn De SutterDominique ChanetKoen De Bosschere
Published in: ICISC (2004)
Keyphrases