Synthetic Embedding of Hidden Information in Industrial Control System Network Protocols for Evaluation of Steganographic Malware.

Tom NeubertBjarne PeukerLaura BuxhoidtEric SchuelerClaus Vielhauer
Published in: CoRR (2024)
Keyphrases