Application of Perfectly Undetectable Network Steganography Method for Malware Hidden Communication.
Patryk BakJedrzej BieniaszMichal KrzeminskiKrzysztof SzczypiorskiPublished in: ICFSP (2018)
Keyphrases
- communication networks
- preprocessing
- network model
- pairwise
- detection method
- objective function
- peer to peer
- significant improvement
- similarity measure
- digital images
- cost function
- segmentation method
- high precision
- complex networks
- computer networks
- computational complexity
- reverse engineering
- communication protocol