Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels.
Aleksandra MilevaAleksandar VelinovLaura HartmannSteffen WendzelWojciech MazurczykPublished in: Comput. Secur. (2021)
Keyphrases
- comprehensive analysis
- key players
- case study
- communication networks
- computer networks
- network traffic
- network parameters
- communication channels
- network model
- complex networks
- network structure
- peer to peer
- wireless sensor networks
- database
- network architecture
- digital libraries
- multimedia
- data mining
- mac protocol
- real time