Login / Signup
Covert channel limitation via special dummy traffic generating.
Anna Epishkina
Nikolay Karapetyants
Konstantin Kogos
Philip Lebedev
Published in:
J. Comput. Virol. Hacking Tech. (2023)
Keyphrases
</>
covert channel
network traffic
real time
traffic flow
intrusion detection
security requirements
random walk
internet traffic
databases
artificial intelligence
anomaly detection
complex networks