has been cited by the following article(s):
[1]
|
A Walk-through towards Network Steganography Techniques
Informatics and Automation,
2023
DOI:10.15622/ia.22.5.6
|
|
|
[2]
|
Information Hiding Using Minification
IEEE Access,
2021
DOI:10.1109/ACCESS.2021.3077197
|
|
|
[3]
|
Exploiting minification for data hiding purposes
Proceedings of the 15th International Conference on Availability, Reliability and Security,
2020
DOI:10.1145/3407023.3409209
|
|
|
[4]
|
Exploiting minification for data hiding purposes
Proceedings of the 15th International Conference on Availability, Reliability and Security,
2020
DOI:10.1145/3407023.3409209
|
|
|
[5]
|
Efficient Non-Linear Covert Channel Detection in TCP Data Streams
IEEE Access,
2020
DOI:10.1109/ACCESS.2019.2961609
|
|
|