Login / Signup
Syntax and Semantics-Preserving Application-Layer Protocol Steganography.
Norka B. Lucena
James Pease
Payman Yadollahpour
Steve J. Chapin
Published in:
Information Hiding (2004)
Keyphrases
</>
application layer
end to end
network layer
application layer multicast
video streaming
transport layer
cross layer
physical layer
information security
overlay network
network congestion
ddos attacks