Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/dsn/LuoZCCL11
%A Luo, Xiapu
%A Zhou, Peng
%A Chan, Edmond W. W.
%A Chang, Rocky K. C.
%A Lee, Wenke
%B DSN
%D 2011
%I IEEE Compute Society
%K dblp
%P 474-485
%T A combinatorial approach to network covert communications with applications in Web Leaks.
%U http://dblp.uni-trier.de/db/conf/dsn/dsn2011.html#LuoZCCL11
%@ 978-1-4244-9233-6
@inproceedings{conf/dsn/LuoZCCL11,
added-at = {2023-03-24T00:00:00.000+0100},
author = {Luo, Xiapu and Zhou, Peng and Chan, Edmond W. W. and Chang, Rocky K. C. and Lee, Wenke},
biburl = {https://www.bibsonomy.org/bibtex/2a6ae3d76e9a113d6d622a941835889a4/dblp},
booktitle = {DSN},
crossref = {conf/dsn/2011},
ee = {https://doi.ieeecomputersociety.org/10.1109/DSN.2011.5958260},
interhash = {59436dfcca27d51c17c0ccb418e91c8f},
intrahash = {a6ae3d76e9a113d6d622a941835889a4},
isbn = {978-1-4244-9233-6},
keywords = {dblp},
pages = {474-485},
publisher = {IEEE Compute Society},
timestamp = {2024-04-10T16:07:23.000+0200},
title = {A combinatorial approach to network covert communications with applications in Web Leaks.},
url = {http://dblp.uni-trier.de/db/conf/dsn/dsn2011.html#LuoZCCL11},
year = 2011
}