Article,

Designing a cluster-based covert channel to evade disk investigation and forensics.

, , , and .
Comput. Secur., 30 (1): 35-49 (2011)

Meta data

Tags

Users

  • @dblp

Comments and Reviews