Skip to main navigation Skip to search Skip to main content

A combinatorial approach to network covert communications with applications in Web Leaks

  • Xiapu Luo
  • , Peng Zhou
  • , Edmond W.W. Chan
  • , Kow Chuen Chang
  • , Wenke Lee

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

Fingerprint

Dive into the research topics of 'A combinatorial approach to network covert communications with applications in Web Leaks'. Together they form a unique fingerprint.
Sort by

Keyphrases

Computer Science