A combinatorial approach to network covert communications with applications in Web Leaks
- Xiapu Luo
- , Peng Zhou
- , Edmond W.W. Chan
- , Kow Chuen Chang
- , Wenke Lee
Research output: Chapter in book / Conference proceeding › Conference article published in proceeding or book › Academic research › peer-review
16
Link opens in a new tab
Citations
(Scopus)