Robust network covert communications based on TCP and enumerative combinatorics

Xiapu Luo, Edmond W.W. Chan, Peng Zhou, Kow Chuen Chang

Research output: Journal article publicationJournal articleAcademic researchpeer-review

31 Citations (Scopus)

Fingerprint

Dive into the research topics of 'Robust network covert communications based on TCP and enumerative combinatorics'. Together they form a unique fingerprint.

Keyphrases

Engineering

Computer Science