Login / Signup

Covert channel limitation via special dummy traffic generating.

Anna EpishkinaNikolay KarapetyantsKonstantin KogosPhilip Lebedev
Published in: J. Comput. Virol. Hacking Tech. (2023)
Keyphrases
  • covert channel
  • network traffic
  • real time
  • traffic flow
  • intrusion detection
  • security requirements
  • random walk
  • internet traffic
  • databases
  • artificial intelligence
  • anomaly detection
  • complex networks