default search action
"A combinatorial approach to network covert communications with ..."
Xiapu Luo et al. (2011)
- Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Rocky K. C. Chang, Wenke Lee:
A combinatorial approach to network covert communications with applications in Web Leaks. DSN 2011: 474-485
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.