A combinatorial approach to network covert communications with applications in Web Leaks

Xiapu Luo, Peng Zhou, Edmond W.W. Chan, Kow Chuen Chang, Wenke Lee

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

16 Citations (Scopus)

Fingerprint

Dive into the research topics of 'A combinatorial approach to network covert communications with applications in Web Leaks'. Together they form a unique fingerprint.

Keyphrases

Computer Science